1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
15

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap

plied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?
a. Configure desktop policies in the Computer Configuration node of a GPO and link this GPO to the OU containing the demonstration computers.
b. Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.
c. Create a user named Demo. Configure Demo's desktop settings and use only this user account to sign in to demonstration computers.
d. Create a GPO with a startup script that configures desktop settings suitable for demonstration computers when these computers are started. Link the GPO to the OU containing the demonstration computers. Instruct users to restart demonstration computers before using them.
Computers and Technology
2 answers:
tiny-mole [99]3 years ago
8 0

Answer:

Option b is correct

Explanation:

For example, setting user config. Per user on a Microsoft computer

Go to config. Setting in the group management policy

Locate admin template, click group policy and enable the loop back policy.

This policy helps the computer to use set of GPO for users who log on to computers affected by this policy and this application is supported only in environment with active directory.

inessss [21]3 years ago
5 0

Answer:

B. Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

Explanation:

The best way is to configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

You might be interested in
You have this code in your program.
earnstyle [38]

The line code will create array is G = array('f',[2.5, 3, 7.4])

<h3>What is meant by array ?</h3>

As opposed to defining distinct variables for each value, arrays are used to hold numerous values in a single variable. Set the data type (such as int) and the array name, followed by square brackets [, to construct an array.

An array is a collection of elements with the same type that are kept in nearby memory  locations and may each be separately referred to using an index to a special identifier. There is no need to declare five distinct variables when declaring an array of five int values (each with its own identifier).

In the C programming language, arrays are a derived data type that may contain primitive data types like int, char, double, float, etc.

To learn more about array refer to :

brainly.com/question/28061186

#SPJ1

6 0
1 year ago
Since the 1960s, there have been five major generations, or cycles, of computing. Which represents those generations in order?
sergiy2304 [10]

Answer:a) Mainframes, miniframes, PCs, desktop Internet computing, mobile computing

Explanation: The hierarchy of the computers or computing are in the generation is:-

  • Mainframe:-designed for the execution of huge data processing , storage and execution.
  • Miniframe:-has similar functioning as the mainframe but on smaller scale and version.
  • Personal computer(PC):-It is designed for the individual purpose and according the need of the user.
  • Mobile computing:-computing that can be done on the mobile phone similar to the computing on the personal computer
  • Internet computing:-the computing of the mobile and computer system with the facility of the internet connectivity.

7 0
3 years ago
Slide transition can be defined as ____ of one slide after another​
UkoKoshka [18]

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

6 0
3 years ago
Refer to the following statement: “We have implemented several IT solutions:
Roman55 [17]

Answer:

vary best questions few minutes i solve it

4 0
3 years ago
Which process passes private and sensitive information to unscrupulous websites through clicks on random links?
QveST [7]

Answer is Phishing

Phishing is fraudulent and it attempts to steal your personal information through unscrupulous websites. A phishing website tries to steal private and sensitive information by tricking the user into believing that he/she is on legitimate website. You could easily land into a phishing website by mistyping a web address. It mainly comes through malicious links attached to an email, IM, or text messages. Do not be duped or fall victim to such links.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
    13·2 answers
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • Make sure to read all of these specifications carefully. Write a function, named array_shifter, that accepts an array of doubles
    12·1 answer
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    15·1 answer
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys
    8·1 answer
  • Which of these is a cultural form? A. Art B. Food C. Clothes D. All of the above
    8·2 answers
  • Drag the correct type of update to its definition.
    14·1 answer
  • What are the characteristics of a severe storm
    12·1 answer
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!