1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
2 years ago
6

Security administrators can use either the PowerShell command line or the graphical user interface of the Server Managerâs Roles

and Features wizard to:
a. Allow or deny access to resources on the network.
b. Promote a Windows server to a domain controller.
c. Build hierarchical directory structures.
d. Set up a filesystem to be shared by multiple users.
Computers and Technology
1 answer:
AleksAgata [21]2 years ago
3 0

Answer:

Security administrator can use power shell command line or the GUI to "Promote a windows server to a domain controller".

Explanation:

A domain controller is a type of server that is used to authenticate the access of the system to the users to resources of windows. Power shell is an important tool that is used to perform different tasks of administration. We can user this tool as security administrator to Promote a Windows server to a domain controller.

You might be interested in
The records in a database table are generally visualized as​ ________.
Misha Larkins [42]
<span>The records in a relational database table are generally visualized as fields.
</span>The data in database  is stored in records that contains all the data about one particular item in the database. Each record is composed of fields. <span>The field is a single piece of data such as name, date of birth or telephone number. </span>
T<span>he </span>fields of all records form the columns.
6 0
3 years ago
In Microsoft Word, when you highlight existing text you want to replace, you're in <br>     
IRISSAK [1]
You are in a formatting toolbar.
5 0
3 years ago
Read 2 more answers
What does this mean?
8090 [49]

Answer:

That you have just wasted your time typing up a seemingly random number sequence.

4 0
2 years ago
Read 2 more answers
Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better main
finlep [7]

Answer: <em>Uninstall utility</em>

Explanation:

From given case/scenario, we can state that Andrea advises Dean to delete unnecessary programs and application from his PC using an uninstall utility. An uninstaller also known as a de-installer, is referred to as a sort of utility software designed in order to remove software or section of it. It is known as opposite of installer. These are mostly useful when components are being downloaded in several directories.

6 0
3 years ago
Why should data anaylst should learn about computer arichtecture.
torisob [31]
The knowledge serves as good foundation for me to understand how technology works behind the scene as well. So I must say a good understanding of computer architecture gives the data scientist the ability to propose feasible solution in capturing and maintaining data, implementing models and algorithms in IT systems.
8 0
2 years ago
Other questions:
  • Pressing the Ctrl+Home keys moves the insertion point to the
    5·1 answer
  • Discuss the importance of employee security awareness training. What innovative ways should company’s implement security trainin
    14·1 answer
  • 1. What is the global marketplace?
    9·2 answers
  • If a tire fails or you have a blowout you should immediately concentrate your attention on
    6·2 answers
  • 100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
    11·2 answers
  • private members of a class are accessible only from _____________ of the same class or from their friends
    12·1 answer
  • What are the things that a computer literate understands?Name thems.​
    14·1 answer
  • If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
    11·2 answers
  • The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
    13·1 answer
  • you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!