1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
3 years ago
7

A technician is performing Windows preventive maintenance tasks on all computers in the organization. She wants a way to create

a custom console containing only the tools she regularly launches and then distribute this custom console to each computer. Which Windows tools will allow the technician to configure a custom console?
Computers and Technology
2 answers:
max2010maxim [7]3 years ago
8 0

Answer:

mmc.exe

Explanation:

mmc.exe is the command for Microsoft Management Console, which allows you to create, save, and open consoles.

creativ13 [48]3 years ago
7 0

Answer:

The correct answer to the following question will be mmc.exe.

Explanation:

MMC.exe (Microsoft Management Console Executable), is a type of framework which allows the user to administration and configuration of the custom console, maintenance, and management. It's a part of Microsoft, used to display various types of plug-ins such as Device manager which is accessed from Control panel.

Hence, mmc.exe is the right answer.

You might be interested in
Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:
Allushta [10]

Answer:

Explanation:

Please find attachment for the Python program

Download docx
7 0
3 years ago
Instructions:Type the correct answer in the box. Spell all words correctly.
weeeeeb [17]
The answer should be RAM = Random Access Memory

RAM memory is used to store current data while the computer is on. Bear in mind that after the computer is shutdown all data in RAM is lost.
6 0
3 years ago
Read 2 more answers
A vast global network that is made up of many smaller interconnected networks is known as:
Galina-37 [17]

The answer is The Internet.   It is a vast global network that is made up of many smaller interconnected networks. It connects to millions of computer units world wide, in which any computer can communicate with any other computer as long as they are both connected to the Internet. It also made access to information and communication easier.

6 0
3 years ago
Read 2 more answers
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Advantages of monolithic operating system? ​
Lyrx [107]

Advntage:

provides CPU scheduling, memory management, file management, and other operating system functions through system calls. The other one is that it is a single large process running entirely in a single address space.

Disadvantage: if anyone service fails it leads to an entire system failure

8 0
2 years ago
Other questions:
  • Which of these is outside the scope of an art director's responsibility?
    12·2 answers
  • Identify the correct software or hardware applications in the passage below
    10·1 answer
  • The BasicSet 2 class implements the Set ADT by wrapping an object of the Linked Collection class and:______.
    15·1 answer
  • Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
    5·1 answer
  • In the accompanying figure, the split double arrow mouse pointer____.
    7·1 answer
  • Neymar machine that Run on electricity
    11·1 answer
  • What is the difference between an activity inventory and an object inventory?
    8·1 answer
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
  • In what way, if any, are problems related to conflicts? Problems and conflicts are the same thing. Problems and conflicts are th
    9·1 answer
  • Which two features could be added to a game using an "if () then " block
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!