1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
15

You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap

plied from his or her roaming profile to any computer he or she signs in to. You think it's important for users to have this choice, but you'd like a consistent look for computers used for product demonstrations to customers. What's the best way to do this without affecting users when they sign in to other computers?
a. Configure desktop policies in the Computer Configuration node of a GPO and link this GPO to the OU containing the demonstration computers.
b. Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.
c. Create a user named Demo. Configure Demo's desktop settings and use only this user account to sign in to demonstration computers.
d. Create a GPO with a startup script that configures desktop settings suitable for demonstration computers when these computers are started. Link the GPO to the OU containing the demonstration computers. Instruct users to restart demonstration computers before using them.
Computers and Technology
2 answers:
tiny-mole [99]3 years ago
8 0

Answer:

Option b is correct

Explanation:

For example, setting user config. Per user on a Microsoft computer

Go to config. Setting in the group management policy

Locate admin template, click group policy and enable the loop back policy.

This policy helps the computer to use set of GPO for users who log on to computers affected by this policy and this application is supported only in environment with active directory.

inessss [21]3 years ago
5 0

Answer:

B. Configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

Explanation:

The best way is to configure loopback policy processing in Computer Configuration. Configure the desktop settings in User Configuration and link the GPO to the OU containing the demonstration computers.

You might be interested in
If a system's instruction set consists of an 8-bit opcode, what is the maximum number of output signal lines required for the co
otez555 [7]

Answer:

D. 256

Explanation:

Given

Instructions = 8\ bit

Required

Determine the maximum number of output

To get the required value, we make use of the following:

Maximum = 2^n

Where n is the bits of the opcode.

i.e.

n = 8

Substitute 8 for n in Maximum = 2^n

Maximum = 2^8

Maximum = 256

<em>Hence, option D answers the question</em>

6 0
3 years ago
All of the following are potential benefits of blogging except
Archy [21]
The answer should be C because most bloggers sacrifice privacy for content.
8 0
3 years ago
Read 2 more answers
Bruce needs to have a drive to rerecord data on the used DVD
Dahasolnce [82]

Answer:

DVD- RW

Explanation:

4 0
3 years ago
If a user copies the formula D15 into D16, what would the formula read in D16?
ella [17]
=B16*C16 hope that helped
4 0
3 years ago
Read 2 more answers
What are the 8 tips for<br>healthy living?​
disa [49]

Answer:

Base your meals on starchy foods.

Eat lots of fruit and vegetables.

Eat more fish.

Cut down on saturated fat and sugar.

Try to eat less salt- no more than 6g a day.

Get active and try to be a healthy weight.

Drink plenty of water

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a sequence of statements that create a file named "greeting" and write a single line consisting of "Hello, World!" to that
    5·1 answer
  • Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students lis
    15·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Through the use of a _____ system, information on prospective, current, and past customers is stored and analyzed for future pla
    15·1 answer
  • Which of the following is NOT a fixed expense?
    6·1 answer
  • Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
    10·1 answer
  • Match each word to its correct meaning.
    11·1 answer
  • What does a production proposal provide ?
    7·2 answers
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • Rocks created from compaction and cementation of sediments are called:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!