1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
4 years ago
11

In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the gr

oup policies
Computers and Technology
1 answer:
vekshin14 years ago
6 0
Regroup i think that is the answer

You might be interested in
1.The small company where you work needs to implement a second server for its accounting system but does not have the funds to p
enot [183]

Answer:

The answer is "Option B"

Explanation:

Virtualization in technology reflects the fact, that everything is generated in an imaginary model, like hardware systems, storage areas, and computer system resources, and other options were wrong, which can be described as follows:

  • In option a, It is used in the network administration.
  • In option c, It is used as the process of transmission, that is used in communication.
  • In option d, It offers the instruction, that executes our process at fast speed.

5 0
3 years ago
Why should you be chosen over someone else? *
Lera25 [3.4K]

Answer:

free points

Explanation:

6 0
3 years ago
Read 2 more answers
A client has gathered a very large amount of operational data, but struggles with how to apply Artificial Intelligence (AI) to a
Ivanshal [37]

Answer:A client has gathered a very large amount of operational data, but struggles with how to apply Artificial Intelligence (AI) to address its critical business problems.

4 0
3 years ago
Select the correct answer from each drop-down menu.
DerKrebs [107]

Answer:

?

Explanation:

?!?!

3 0
3 years ago
Write a program that reads an integer, and then prints the sum of the even and odd integers.
Tasya [4]

Answer:

#include <iostream>  // header file

using namespace std;  // namespace

int main ()

{

int n, x1, i=0,odd_Sum = 0, even_Sum = 0;  // variable declaration

cout << "Enter the number of terms you want: ";

 cin >> n;  // user input the terms

cout << "Enter your values:" << endl;

  while (i<n)  // iterating over the loop

{

cin >> x1;  // input the value

if(x1 % 2 == 0)  // check if number is even

{

even_Sum = even_Sum+x1;  // calculate sum of even number

}

else

{

odd_Sum += x1; // calculate sum of odd number.

}

i++;

}

cout << "Sum of Even Numbers is: " << even_Sum << endl;  // display the sum of even number

cout << "Sum of Odd Numbers is: " << odd_Sum << endl;  // display the sum of odd number

return 0;

}

Output:

Enter the number of terms you want:3

Enter your values:2

1

78

Sum of Even Numbers is:80

Sum of Odd Numbers is:1

Explanation:

In this program we enter the number of terms by user .After that iterating over the loop less then the number of terms .

Taking input from user in loop and check the condition of even. If condition is true then adding the sum of even number otherwise adding the sum of odd number.

Finally print the the sum of the even number and odd integers.

6 0
3 years ago
Other questions:
  • One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o
    13·1 answer
  • Gathering information with your eyes is called
    13·2 answers
  • Will there be a season 3 of Gravity Falls?
    5·2 answers
  • Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
    6·1 answer
  • In the digital age we have less time to absorb and make sense of new information
    12·2 answers
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • If a base class pointer, p, points to a derived class instance, and both base and derived classes have a method void doIt() whic
    14·1 answer
  • Which of the following commands should be used if a user does NOT want the header which has been created to appear on the first
    13·1 answer
  • What would a system unit that is integrated with the display and keyboard would be considered?
    6·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!