1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
3 years ago
11

In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the gr

oup policies
Computers and Technology
1 answer:
vekshin13 years ago
6 0
Regroup i think that is the answer

You might be interested in
When listing columns in the select list, what should you use to separate the columns?
Gala2k [10]
The answer is commas.  <span>When listing columns in the select list, commas should be used to separate the columns.</span>
6 0
4 years ago
Why are charts and graphs included in documents rather than just raw data?
trapecia [35]

Answer:

It's more organized and easier to look at

Explanation:

If it was just the raw data, it would take more time to analize, rather than it already being in a chart or graph

4 0
3 years ago
What type of measurement are each of the following
bixtya [17]

Answer:

unities

Explanation:

Every one may be counted in unities

3 0
3 years ago
__________ states that network connection speeds for high-end users will increase by 50 percent per year, enabling new companies
Liula [17]

Answer:

Nielsens law

Explanation:

4 0
2 years ago
Super Easy !!! Which of the following is one of the most primary maintenance steps for software?
charle [14.2K]

Answer:

keeping software programs up-to-date

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is a bus master?
    14·1 answer
  • He smallest network is a ______________________, which is a network of personal devices, such as the network you use when you sy
    5·1 answer
  • Where does the CPU store its computations
    6·2 answers
  • How does climate research depend on digital technology
    12·1 answer
  • Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(
    7·1 answer
  • In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner
    12·2 answers
  • Continuous data
    13·1 answer
  • To join a social network you create an avatar true or false
    6·2 answers
  • If anyone can help please and thank you before Nov 11th
    15·1 answer
  • In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add someth
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!