1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
4 years ago
14

Select below the Active Directory server role that provides the functions of Active Directory without the requirements of forest

s, domains, and domain controllers.
Computers and Technology
1 answer:
sasho [114]4 years ago
3 0

Answer:

​AD DS

Explanation:

Active Directory Domain Service is an active directory server role found in windows server and it permits admins in a network environment store and also manages information from a particular source in a network, there are no requirements for forests, domains, and domain controllers. It works both on intranet and internet networks.

You might be interested in
Search for and list an internet websites that defines plagiarism and discusses how to avoid it
Korvikt [17]
Here are the sites that defines plagiarism and how to avoid it:
1. http://www.plagiarism.org/article/what-is-plagiarism
2. https://en.wikipedia.org/wiki/Plagiarism
3. https://writingcenter.unc.edu/tips-and-tools/plagiarism/
4. http://gethelp.library.upenn.edu/guides/engineering/ee/plagiarize.html
5. http://www.aresearchguide.com/6plagiar.html
8 0
3 years ago
Which is the best information to determine an athlete's abilities and needed areas of improvement?
katen-ka-za [31]

Answer:

4

Explanation:

7 0
3 years ago
Read 2 more answers
What is the process or technique of "making something that allows" human beings to share their knowledge, perform a task, or ful
Mashcka [7]

Answer:Technology

Explanation: it can be define as process or technique of making something that allows human beings to share their knowledge, perform a task or fulfill a function

-tool or invention that, once created and used, is intended to solve a problem or improve on past understandings of how to do something.

7 0
3 years ago
_________ devices often pose special challenges to investigators because they can be configured to use advanced encryption and t
scoray [572]

Answer:

Portable

Explanation:

Most of electronic devices can be programmed in a way that cant deny investigator access to certain information on the device and also, devices can be manipulated by an external hands to implicate people.

due to those uncertainty, some states place little wait on evidences obtained from those devices.

4 0
3 years ago
What should you adjust to make your hard hat fit properly?
schepotkina [342]
You should adjust the headband to make your hard hat fit properly.
5 0
3 years ago
Other questions:
  • Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
    12·1 answer
  • In one to two sentences, describe one method for launching or opening a program.
    5·2 answers
  • What are short handled screwdrivers used for?
    12·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • Where do you place the logical test argument in an IF function formula?
    6·2 answers
  • Which of these is NOT a reason for an IP Address?
    15·2 answers
  • Describe the steps which should be taken after a cyber-attack has taken place
    7·1 answer
  • Characteristics of first generation computers​
    9·1 answer
  • What are the three computer components that hold a dangerous amounts of electricity? Even when it’s unplugged.
    15·1 answer
  • if a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, i
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!