1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
5

You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard dri

ve. You attempt to remove it from the domain, but the procedure fails. You take the DC offline permanently and will replace it with another DC of the same name. What must you do before you can replace the DC?
a. Restore the system state.
b. Perform metadata cleanup.
c. Back up SYSVOL.
d. Transfer the FSMO roles.
Computers and Technology
1 answer:
Softa [21]3 years ago
5 0

Answer:C

Explanation:

You might be interested in
Whats with the bot spamming customer care numbers...kinda annoying when im trying to help people.
Norma-Jean [14]

Answer:

yes

Explanation:

5 0
3 years ago
A global clothing company is looking to create a more immersive shopping experience for customers.What is a way the company can
ollegr [7]

A way the company can utilize edge computing to help the store achieve this goal of creating a more immersive shopping experience for customers is

  • <u>D) analyzing a customer's past purchases and offering customized recommendations.</u>

Edge computing, is a method through which data sources are used in order to make tailored changes to improve a customer's experience while shopping and perform other functions.

As a result of this, if a company wants to make use of edge computing to make their customers have a more immersive experience, then they should make an analysis of past purchases.

Therefore, the correct answer is option D

Read more here:

brainly.com/question/24864146

8 0
2 years ago
Read 2 more answers
Jail and prison officials may generally limit inmate rights when the limitations serve
qaws [65]
Prison or jail with understanding that after a period of time,she or he   may petition the court to be released on probation. ......the release of an inmate into a  community supervision program at the discretion of the parole board within limits set  by state or federal law.

 
4 0
3 years ago
Read 2 more answers
Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in
morpeh [17]

Answer:

See explaination

Explanation:

PhoneLookup.java

import java.io.FileReader;

import java.io.IOException;

import java.util.Scanner;

public class PhoneLookup

{

public static void main(String[] args) throws IOException

{

Scanner in = new Scanner(System.in);

System.out.println("Enter the name of the phonebook file: ");

String fileName = in.nextLine();

LookupTable table = new LookupTable();

FileReader reader = new FileReader(fileName);

table.read(new Scanner(reader));

boolean more = true;

while (more)

{

System.out.println("Lookup N)ame, P)hone number, Q)uit?");

String cmd = in.nextLine();

if (cmd.equalsIgnoreCase("Q"))

more = false;

else if (cmd.equalsIgnoreCase("N"))

{

System.out.println("Enter name:");

String n = in.nextLine();

System.out.println("Phone number: " + table.lookup(n));

}

else if (cmd.equalsIgnoreCase("P"))

{

System.out.println("Enter phone number:");

String n = in.nextLine();

System.out.println("Name: " + table.reverseLookup(n));

}

}

}

}

LookupTable.java

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

/**

A table for lookups and reverse lookups

*/

public class LookupTable

{

private ArrayList<Item> people;

/**

Constructs a LookupTable object.

*/

public LookupTable()

{

people = new ArrayList<Item>();

}

/**

Reads key/value pairs.

atparam in the scanner for reading the input

*/

public void read(Scanner in)

{

while(in.hasNext()){

String name = in.nextLine();

String number = in.nextLine();

people.add(new Item(name, number));

}

}

/**

Looks up an item in the table.

atparam k the key to find

atreturn the value with the given key, or null if no

such item was found.

*/

public String lookup(String k)

{

String output = null;

for(Item item: people){

if(k.equals(item.getName())){

output = item.getNumber();

}

}

return output;

}

/**

Looks up an item in the table.

atparam v the value to find

atreturn the key with the given value, or null if no

such item was found.

*/

public String reverseLookup(String v)

{

String output = null;

for(Item item: people){

if(v.equals(item.getNumber())){

output = item.getName();

}

}

return output;

}

}

Item.java

public class Item {

private String name, number;

public Item(String aName, String aNumber){

name = aName;

number = aNumber;

}

public String getName(){

return name;

}

public String getNumber(){

return number;

}

}

input.txt

Abbott, Amy

408-924-1669

Abeyta, Ric

408-924-2185

Abrams, Arthur

408-924-6120

Abriam-Yago, Kathy

408-924-3159

Accardo, Dan

408-924-2236

Acevedo, Elvira

408-924-5200

Acevedo, Gloria

408-924-6556

Achtenhagen, Stephen

408-924-3522

Note: Replace all the "at" with at symbol

4 0
3 years ago
Banks use _____, which are electronic transmissions of account exchange information over private communications’ networks.
faltersainse [42]

Answer:

Wire transfer

Explanation:

Wire Transfer also known as remittance under the U.S. law is the electronic transfer of money which is carried out across a network that is run by several banks and money transfer agencies around the globe. With Wire Transfer, people at different parts of the Word can securely send money to individuals at other financial institution in any part of the world.

The following are important points to note about wire transfers:

1. It is an electronic transfer of funds across a network of banks and money transfer agencies around the world.

2. The individual or senders pays a transaction fee at their banks and must provide the receivers details including bank name and account number.

3. Wire transfers can take up to two working days to complete

4. The Office of Foreign Assets monitors and controls international wire payments, to prevent money laudering and funding of illegal activities like terrorism

7 0
3 years ago
Other questions:
  • The fast food restaurant Chipotle pulled its app from Apple's app store when customer demand caused the firm's servers to crash.
    14·1 answer
  • The specifications for ____ are developed by the world wide web consortium (w3c) and are continually evolving.
    13·1 answer
  • When using a template to compose a memorandum which key on the keyboard moves the cursor to the next field
    15·1 answer
  • Which of the following are types of home internet service? Check all that apply
    7·1 answer
  • Write a function called printEvens that prints all the even numbers between 2 and 20, inclusive. It will take no arguments and r
    6·1 answer
  • How is marketing related to the other functions of a business
    14·1 answer
  • Which tool will select the lines of a sketch in digital software?
    7·1 answer
  • When clients connect to a web server using the _________ method, the server logs them on using the iusr account, by default?
    14·1 answer
  • What is the difference between i++ and ++ii?
    6·1 answer
  • Suppose the ESPN website uses 8-bit unsigned integers to store how many points a team has scored in
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!