1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Solnce55 [7]
3 years ago
6

Your company has merged with another company that also uses Windows Server 2016 and Active Directory. You want to give the other

company's users access to your company's forest resources and vice versa without duplicating account information and with the least administrative effort. How can you achieve this goal?
Computers and Technology
1 answer:
LiRa [457]3 years ago
5 0

Answer:Creation of two-way forest trust

Explanation: In active directory, Two way forest trusty is the two way trusting condition where one forest trust the other forest and it works same for both forest.The forest domain of one forest is reliable and have trusty relationship with the other forest and vice-versa.

This function of the forest helps all the users to reliably access all the components of both the domains.Thus two-way forest trust should be created between the two organization mentioned in the question.

You might be interested in
Write a program that include a method that returns the sum of all the elements of a Linked List of Integers. Allow the user to e
Illusion [34]

Answer:

static void Main(string[] args)

       {

           //declare a blank linked list

           LinkedList<int> numList = new LinkedList<int>();

           Console.WriteLine("Enter the Numbers");

           //check if the size of the linkedlist is 10

           while(numList.Count < 10)

           {

               //read the input supplied by the user

               string val = Console.ReadLine();

               //check if the input is integer

               if(int.TryParse(val, out _) == false)

               {

                   //if not integer, display error message and prompt for new number

                   Console.WriteLine("Invalid number");

                   continue;

               }

               //add the inputted number to the linkedlist

               numList.AddLast(int.Parse(val));

               

           }

           //call the method for linkedlist sum and display it

           Console.WriteLine(SumLinkedList(numList));

           Console.Read();

       }

       //method for linkedlist summation

       private static int SumLinkedList(LinkedList<int> val)

       {

           //declare sum as zero

           int sum = 0;

           //loop through the linkedlist to display the num and sum all numbers

           foreach(int item in val)

           {

               Console.Write(item + " ");

               sum += item;

           }

           return sum;

       }

   }

Explanation:

program written with c#

8 0
3 years ago
What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
Lorico [155]

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

4 0
3 years ago
Write convert() method to cast double to int Complete the convert() method that casts the parameter from a double to an integer
alexgriva [62]

Answer:

Write convert() method to cast double to int Complete the convert() method that casts the parameter from a double to an integer and returns the result. Note that the main() method prints out the returned value of the convert() method.

Ex: If the double value is 19.9, then the output is: 19

Ex: If the double value is 3.1, then the output is: 3

Explanation:

<h3>plz bhai mera answer ko brainliest kar do.....</h3>
8 0
2 years ago
What is the output of the loop for count in range(5): print(count)?
DedPeter [7]
The answer would be the first answer
8 0
3 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________.
vaieri [72.5K]

Options:

(a) ensuring that a system is accessible when needed

(b) defining risk associated with a subject accessing an object

(c) ensuring that a system is not changed by a subject that is not authorized to do so

(d) ensuring that the right information is seen only by subjects that are authorized to see it

Answer:

(c) Ensuring that a system is not changed by a subject that is not authorized to do so.

Explanation:

Access control simply means controlling who accesses a particular data by putting necessary measures in place. The vital components of access control are explained briefly as follows:

<em>Confidentiality</em>: This refers to ensuring that sensitive information are getting to the right people and the right people only. Confidentiality ensures that data or information are getting to those that they are intended. Examples of sensitive information that require confidentiality are

i. Credit card details

ii. Passwords

<em>Integrity</em>: This refers to ensuring that the quality, consistency, accuracy and trustworthiness of an information does not change throughout its time.

It makes sure that data remains the same over a long period of time and in the event that it will be changed, it is not changed by unauthorized subject.

<em>Availability</em>: Just as the name implies, ensures that the data or information is available any time it is needed.

7 0
3 years ago
Other questions:
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren
    13·1 answer
  • In computing the present value of the lease payments, the lessee should a.use both its incremental borrowing rate and the implic
    8·1 answer
  • Write a function so that the main program below can be replaced by the simpler code that calls function mph_and_minutes_to_miles
    7·1 answer
  • Examine the efficiency the various recovery algorithms used in deadlock handling
    10·1 answer
  • Aspiring graphic designers can earn a(n) certification for graphic design software, such as Photoshop and Acrobat.
    9·2 answers
  • Definition of my computer​
    13·2 answers
  • In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used t
    11·1 answer
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • If you enter the search "genetically modified foods" in a database, the double quotes around the three words will:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!