1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lena [83]
4 years ago
12

Which type of profile allows a user within a corporation to use the same user profie regardless of the computer that user is usi

ng?
a. Local user profileb. Persistent user profilec. Roaming user profiled. Mandatory user profile
Computers and Technology
1 answer:
zzz [600]4 years ago
8 0

Answer: c)Roaming user profiles

Explanation:Roaming user profiles are those profiles that creates the copy from the local profile and get stored in the network server. Roaming user profiles haves the function of getting logged in any computer system that the user is processing by getting downloaded.

It has the advantage of not creating profiles on every computer system that user wants to login .Thus, the correct answer is option(c) because other profiles mentioned in the option cannot copy the profile in the server and so do not have capability to be accessed in other computer system.

You might be interested in
Ultimately, there exists a ceiling on efficiency because _______________.
earnstyle [38]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
Among the choices above the answer is C which is <span>of government taxation


To complete the sentece "</span>Ultimately, there exists a ceiling on efficiency because of government taxation
5 0
3 years ago
Match each network maintenance tool with the purpose that is most closely identified with that tool - Loopback plug - Protocol a
Artist 52 [7]

Solution :

  • Loopback plug --- confirm interface functionality

It is a connector that is used to diagnose the transmission problems.

  • Protocol Analyzer --- Analyze network traffic

It is used to capture and analyze the signals as well as data traffic.

  • Throughput tester - Measure link speed
  • Time Domain Reflectometer (TDR) - Determining the location of cable fault

It is used in determining the characteristics of the electrical lines by observing the reflected waveforms

  • Locating a specific cable - Toner probe

3 0
3 years ago
Question 5 a remote access server is typically implemented on a server class operating system, such as windows server 2008 r2 ru
Reika [66]
Answer: <span>Routing & </span>Remote Access<span> (RRAS)</span>
7 0
3 years ago
A STUDENT can take many COURSES and a COURSE can have more than one STUDENT enrolled in the course. In this case, both the "stud
Marina CMI [18]

Answer:C. To eliminate possible data redundancy.

Explanation:Data redundancy is a term used in data management system or process to mean the storage of the same data in different locations, this type of situation need to prevented for effective and efficient data management system or process.The main reason for creating a new entity is to eliminate the possibility of data redundancy which not desireous and not required.

8 0
4 years ago
In a submarine battle simulation, you know all the locations the enemy units can move to. Anticipating these moves, you call for
BaLLatris [955]

Answer:

perfect information

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write the addReview method, which adds a single product review, represented by a ProductReview object, to the ReviewCollector ob
    14·1 answer
  • Your health insurance company gives you a discount if you wear a fitness-tracking bracelet. After wearing it for a few months, y
    5·1 answer
  • You are having trouble closing a program. You have tried to hit the Close button, the keyboard shortcut to close the program, an
    6·1 answer
  • ARP request is send to
    12·1 answer
  • 9. Which of the following is the<br>leading use of computer?​
    13·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    10·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • QUICK HELP ME PLEASE
    9·1 answer
  • A company wants to use online methods to target more customers. It decides to conduct a market research by collecting the data o
    9·1 answer
  • Writing down your main ideas, subpoints, and supporting material, then using geometric shapes and arrows to indicate logical rel
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!