1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
15

What tool do windows server administrators use to create and manage user accounts?

Computers and Technology
1 answer:
AVprozaik [17]3 years ago
8 0
Windows settings. 
1234567890
You might be interested in
5. Robotics deals with the design, construction, operation, and use of robots, as well as computer systems for their control, se
Law Incorporation [45]

The answer would be

True

3 0
3 years ago
Write a program that prompts for a positive integer and prints the factors of all integers from 1 to that input integer. For exa
xeze [42]
74(Frequency) or 34(frequency)
7 0
3 years ago
Which of these is an output device? keyboard mouse trackpad printer
Firdavs [7]
I think a printer could be wrong
6 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Can you guess why some of the nodes would still have statically assigned ip addresses?
LiRa [457]

<span>The manual assignment of an IP address to a system is called static addressing. Since the assignment of IP has been entered manually using ARP utility, the network administrators probably forgot to remove the manually configured nodes with IP addresses.  </span>

7 0
3 years ago
Other questions:
  • Kim is creating a one-page presentation in Word about her parents’ home country, Vietnam. She has inserted images that are each
    7·2 answers
  • The a0 is the part of the central processing unit that performs arithmetic calculations for the computer.
    8·1 answer
  • The page orientation in which the page width is greater than the page height is called
    8·1 answer
  • The practice of using similar but not identical domain names is called _____. domain spoofing domain masquerading domain tasting
    13·1 answer
  • What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
    7·1 answer
  • Which of the following is an example of joint problem solving?
    12·1 answer
  • HELP FAST
    14·1 answer
  • What can be used to help diagnose and fix network connection problems?
    8·1 answer
  • Select the correct answer.
    9·1 answer
  • Explain briefly the use of the computers in the advertising area​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!