1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
6

Security administrators can use either the PowerShell command line or the graphical user interface of the Server Managerâs Roles

and Features wizard to:
a. Allow or deny access to resources on the network.
b. Promote a Windows server to a domain controller.
c. Build hierarchical directory structures.
d. Set up a filesystem to be shared by multiple users.
Computers and Technology
1 answer:
AleksAgata [21]3 years ago
3 0

Answer:

Security administrator can use power shell command line or the GUI to "Promote a windows server to a domain controller".

Explanation:

A domain controller is a type of server that is used to authenticate the access of the system to the users to resources of windows. Power shell is an important tool that is used to perform different tasks of administration. We can user this tool as security administrator to Promote a Windows server to a domain controller.

You might be interested in
With ____ editing, Word automatically displays a Paste Options button near the pasted or moved text.
harina [27]
The answer is drag and drop. 
 With drag and drop editing, word automatically displays a paste option button near the pasted or moved text. 
8 0
3 years ago
I need help making a survey for highschool students in my school any topics/questions?
givi [52]

Answer:

depends is it just a survey? because if it doesent matter about the questions ou can do basic quuestions such as "what is your favorite video games" or "what is your favorite food"?

Explanation:

4 0
3 years ago
A vast global network that is made up of many smaller interconnected networks is known as:
Galina-37 [17]

The answer is The Internet.   It is a vast global network that is made up of many smaller interconnected networks. It connects to millions of computer units world wide, in which any computer can communicate with any other computer as long as they are both connected to the Internet. It also made access to information and communication easier.

6 0
3 years ago
Read 2 more answers
My HTC Desire 510's mobile data stopped working, how to I make it work again?
denis-greek [22]
Ask your mobile operator
2.go to hrs service
3. Turn on and turn off
4 0
3 years ago
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and
sdas [7]

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

8 0
3 years ago
Other questions:
  • What is the danger in judging someone according to his or her social networking profile
    12·1 answer
  • Explain how to use fortran programming in details
    14·1 answer
  • How do social media sites illustrate kindness?
    15·1 answer
  • What is the main role of LDAP?
    14·1 answer
  • The convergence of information technology and operations technology, offering the potential for tremendous improvements in effic
    14·1 answer
  • What is the value of variable num after the following code segment is executed?
    5·1 answer
  • How is the internet made?
    7·1 answer
  • What is the computer system cycle called?
    13·1 answer
  • Additional metadata data is stored alongside the binary colour values for each pixel. Give two examples of metadata?
    9·1 answer
  • Aii so is anyone pushing P?<br> if u are u a g
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!