1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
10

I need help plzzzzzzzz

Computers and Technology
2 answers:
Eduardwww [97]3 years ago
8 0
I think this Refers to both
Blababa [14]3 years ago
4 0

Answer:

The output is second half of the month, refers to both

You might be interested in
What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
tatiyna

Answer:

hold on i wrote this  in my engineeering class hold on

Explanation:

but just wait

3 0
3 years ago
Read 2 more answers
What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
Katarina [22]

SID filtering enables to control of the sid history attribute from being utilized to falsely gain administrative privileges in a trusting forest.

<h3>What is  SID filtering?</h3>

SID filtering renders the domain controllers (DCs) in a trusting domain to remove all SIDs that aren't members of the trusted domain. In other words, if a user in a trusted domain exists as a member of groups in other domains in the forest, the trusting domain will withdraw those groups' SIDs from the user's access token.

For a newly set up trust between two domains or two forests, the SID Filtering exists activated by default. The filter extracts all foreign SIDs from the user's Access Token while accessing a resource through trust in a trusting domain.

SID filtering enables to control of the sidhistory attribute from being utilized to falsely gain administrative privileges in a trusting forest.

To learn more about SID filtering refer to:

brainly.com/question/23814085

#SPJ4

3 0
2 years ago
Describe the different non-printing characters,​
irakobra [83]

Answer:

or formatting marks are characters for content designing in word processors, which aren't displayed at printing. It is also possible to customize their display on the monitor. The most common non-printable characters in word processors are pilcrow, space, non-breaking space, tab character etc.

Explanation:

5 0
3 years ago
Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a
Neporo4naja [7]

Answer:

Active listening is used to make things more clear when talking to other people. Whether it is on the phone or face to face active listening can reduce any unwanted barriers of communication. Getting rid of barriers can help a company save time rather than trying to explain things multiple times. This ultimately would lead to more goods or services being produced therefore making the company more efficient. There are many more reasons why this workplace tacit is useful but I personally believe this is one of the more used ways.

I really hope this works for you!

5 0
3 years ago
1. A database table can hold ??
IRINA_888 [86]

Answer:

who are interested and I have been trying to

3 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • In what ways us cyberspace is real? list at least 3 examples to support your response .
    9·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
    10·1 answer
  • How you use ict today and how will you use it tomorrow
    14·1 answer
  • Types of digital divide ​
    15·1 answer
  • Matt uploads a malware sample to a third-party malware scanning site that uses multiple antimalware and antivirus engines to sca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!