1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
15

Gigantic Life Insurance is organized as a single domain. The network manager is concerned that dividing into multiple domains to

apply individual group policies will be a lot of work and disrupt users. Explain why this is not a concern.
Computers and Technology
1 answer:
Ne4ueva [31]3 years ago
8 0

Answer and Explanation:

Group policy can be simplified by just providing policy based administration for users, groups, workstations and servers. This is not a concern because with multiple domains users are not confined to a particular domain, they have all access with their personalized settings as per the domain they belong to and can be made available on all computers. It enhances the security.

You can start with one single policy for all users and seggregate them on domain basis. This will allow more of domain-specific access, which will also overcome flaws, if any at organization Level.

You might be interested in
almost every school or university has a or council or organization that works towards provision of providing education training
disa [49]

Answer:

In education, the term stakeholder typically refers to anyone who is invested in the welfare and success of a school and its students, including administrators, teachers, staff members, students, parents, families, community members, local business leaders, and elected officials such as school board members, city ...

Explanation:

6 0
3 years ago
You use the same five shell functions every day and are looking for a way to ensure they are available as soon as you log into y
ANTONII [103]

Answer:

.c. Load them via your login script.

Explanation:

Given that using functions in shell scripts enhances programming output and login script comprises the functions and statements required to effectively execute at any given time the user logs into their account.

Hence the moment these functions are formulated, they are then executed through a single command statement thereby reducing the time of re-writing another set of code repeatedly in every program.

Therefore, in this case, what you can do is to "Load them via your login script."

4 0
3 years ago
What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
Ratling [72]

<u>Answer and explanation:</u>

There are many benefits of writing functions that use parameters and return. Some of them are:

1. Flexibility: With functions having parameters, several values of the parameters can be used at invocation time thereby making the application flexible. For example, given the following function in Java.

<em>public void showName(String name){</em>

<em>    System.out.println("Your name is " + name);</em>

<em>}</em>

To call this method (function), the programmer could use various values for the name parameter used in the function like so:

showName("John");

showName("Doe");

If the function didn't have a parameter, it is possible it will only print a hardcoded name every time the function is called.

2. Scope Control: When a function is allowed to return a value, it helps to work around scope issues since variables declared within a function are limited to that function and do not exist outside the function. This means that the values of these variables cannot be used anywhere else outside the function in which they are being declared. However, if the function returns a value, the value can be used anywhere else in the program.

For example:

<em>public String getDouble(int x){</em>

<em>    int y = x * 2</em>

<em>    return y;</em>

<em>}</em>

The function above returns twice the value of the argument supplied to it. Since the integer variable y is declared within the function, it's value cannot be used outside the function. However, since the value is being returned by the function, it could be used anywhere the function is being called. Thanks to the return keyword.

3 0
3 years ago
A = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40]
vova2212 [387]

Answer:

C = a./b

Explanation:

In MATLAB, the following command:

C = A./B

Performs the element by elemet division of A and B. This comand is called Right-array division.

So, in your case, we could divide A by B element by element, only using fully-vectorised code (ie. no loops), with the following code:

a = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40];b = [1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 43 45 47 49 50 54 59 60];C = a./b;

C would be the element by element division of A and B, with no loops.

5 0
3 years ago
What are the pros and cons of cloud computing?
Arada [10]

Answer: Cloud computing is the technology that is based network on which the services are accessed with the help of hardware and software.Internet is platform through which the accessing of information, files and other services takes place.

The advantages of cloud computing are as follows:-

  • It acts as the flexible system
  • Cost efficient
  • Easy restoration and backing -up of data
  • Almost unlimited storage capacity

Disadvantages of cloud computing are:-

  • Technical problems can occur in network
  • It can be vulnerable to network attacks and hacking
  • Has some security issues

5 0
4 years ago
Other questions:
  • Which term is used to describe a computer-based method of communication in which users can type and view informal messages sent
    8·1 answer
  • ______ engineers build prototype cars and troubleshoot them.
    8·2 answers
  • When using Identify from the IPDE cycle, you are trying to _____.
    12·2 answers
  • Why do nonprofit agencies include blogs on there website?
    10·1 answer
  • A ? is the desired value where a process should be maintained. The value may be manually set, automatically set, or programmed.
    13·1 answer
  • What is the purpose of filters in a database?
    11·1 answer
  • You have an email that you are sending to a friend. You want to ensure it retains its integrity during transit, so you decide to
    5·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • What is tha length of Mac address ?​
    15·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!