1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
12

You are the network adminstrator for your company your network consists of two active directory domains research.westsim.local a

nd sales.westsim.local your company has two sites dallas and houston each site has two domain controllers one domain controller for each domain users in houston who are members of sales.westin.local domain report slow performance when logging in and accessing files in dallas users in dallas do not report any probles logging in and accessing local resourses you want all users in houston to experience adequate login and resource access response time what should you do?
Computers and Technology
1 answer:
nexus9112 [7]3 years ago
5 0

Answer:

We should configure the one of domain controller in the Houston to be the global catalog servers.

Explanation:

Configure the Domain controller:

1. Log in the MS Windows server host.

2. Then, click the Start Menu and goto the Tools, click on Manage Your Servers.  

  • on this wizard, you can choose the Adding Roles to your Servers.
  • in Server Role windows you can choose the Domain Controller.
  • Then, you can select the default values by the click on NEXT.
  • Then, continue accepts default values and click on the Next when the Report DNA Issues windows appears.
  • Then, select the Configure and install DNS for proceed to next window.
  • Then, continue to click on the Next when the Summary window will display then again click next.
  • After all, Active Directory Installation wizards are invoked.
You might be interested in
PLEASE HELP THIS IS CONFUSING ME
Artemon [7]

Answer:

The answer is:

Yes, because Antonio clearly copied someone else's words.

Explanation:

It is still forbidden to plagiarize Wikipedia despite it being a Open-Source Data base of information. This means, unless you directly cite in a bibliography or with in-text citations, the article, the author, and everything else needed in the proper citations for the format, it is plagiarism.

3 0
3 years ago
Read 2 more answers
You can include up to _____ logical conditions in the and function.
Margaret [11]
You can include up to 255 logical conditions in the AND function. This is to test multiple<span> conditions at the same time.
</span><span>The syntax of the AND function is the following: =AND (logical1, [logical2], ...)</span><span>
The AND function can be true (one) and false (null), only one of these two values.
</span><span>The AND function will return #VALUE if no logical values are found or created during evaluation.</span>
5 0
3 years ago
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
3 years ago
What type of data causes concern for institutions are businesses Lincoln elected stored and not secured properly
Kobotan [32]

The type of data which causes concern for institutions or business when collected, stored, and not secured properly is Personal Identifying Information. The correct option is B.

<h3>What is personal identifying information?</h3>

A personal identifying information is the representation of data or information  of an individual that can be used to identify an individual specifically.

Some examples of a personal identifying information includes Social security number (SSN), E-mail address, Driver's license number. Bank account number, Full name and Passport number.

Business organizations should secure personal identifying information  properly, in order to avoid unauthorized access by hackers.

Thus, the correct option is B.

Learn more about personal identifying information.

brainly.com/question/4997276

#SPJ1

6 0
2 years ago
When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,
pshichka [43]

Answer:

This type of attack is called Malvertising

Explanation:

Malvertising (Malware Advertising)  is a term in computer security that refers to the act of spreading computer malware through online advertisements. It is done by injecting malicious code into genuine online advertisement platforms or malicious webpages that appear as though they are genuine and from reputable third-party advertisers. While it is quite a new concept it is difficult to combact because content for advertisement can be placed in genuine and reputable websites that users trust.

3 0
3 years ago
Other questions:
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    15·1 answer
  • You need to access the registry on your windows 10 computer how do you do this
    9·1 answer
  • 6.Decreasing a telescope's eyepiece focal length will:
    7·1 answer
  • What is the best way to locate where my C program gets into an infinite loop
    5·1 answer
  • . How is using 0 / 1 or true / false in specifying digital an abstraction?
    11·1 answer
  • a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collect
    13·1 answer
  • Have all of my coins because i will delete acount there will be part 2, 3 , 4 ,5,6,7,8
    15·2 answers
  • A computer's capability of distinguishing spoken words is called?
    9·1 answer
  • Como interactua el hardware de la computadora con el ser humano
    15·1 answer
  • A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!