1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
8

Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to

retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?
A. Domain-level group policies
B. Antivirus domain-level policies
C. Corrupted registry settings
D. Incorrect local-level user policies
Computers and Technology
1 answer:
ivann1987 [24]3 years ago
6 0

Answer:

A. Domain-level group policies

Explanation:

Because domain-level polices are automatically implement all users that are login on the PC and PC is connect to the domain. From domain polices you can set what user can open and what can not open, Joe Windows PC he is using automatically locks also through domain policy, Administrator set the time when any end-user leave their PC automatically after the time set administrator screen saver run and asked password of that user to return back in the windows.

You might be interested in
A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
dimaraw [331]
Perhaps instead of cubicles, desks are organized in an open workspace which promotes collaboration (and makes it easier).
7 0
3 years ago
Read 2 more answers
What is a disruptive technology? Give an example of an aspect of society that has been impacted by technological change.
Ray Of Light [21]

Answer:

A disruptive technology sweeps away the systems or habits it replaces because it has attributes that are recognizably superior. Recent disruptive technology examples include e-commerce, online news sites, ride-sharing apps, and GPS systems.

4 0
3 years ago
What are the total number of rows and columns on a worksheet?.
Margaret [11]

Answer:

1,048,576 rows

Explanation:

hahha cause im smart

3 0
2 years ago
Read 2 more answers
What are smart mobile devices
Nezavi [6.7K]

portable computing tool

7 0
3 years ago
Maria works for MegaCorp, a large privately owned company specializing in sales of ball bearings. MegaCorp introduces filtering
ololo11 [35]

Answer:

No, because it would be generally free for private-sector employees by using filtering software to restrict access to some websites.

Explanation:

Maria working for the following Corporation, a major private-owned company that specializes throughout ball bearings production. That corporation establishes filtering software to restrict access to some of these sites linked to non-work, and also some sites with poπnographic images.

So, Maria could not challenge that policy lawfully, as private-sector employees are usually free to always use filtering software to restrict access to some of these Websites

3 0
3 years ago
Other questions:
  • What event in the 1970s contributed to the current
    6·2 answers
  • In Windows 7/Vista, the information that establishes basic settings such as the location of the operating system and other key s
    7·1 answer
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • 12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE fun
    7·1 answer
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • Suppose cell C5 contains the formula =B$6+C1.
    6·1 answer
  • Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,
    11·1 answer
  • Where is the flash drive listed in a windows 7 save as dialog box?
    9·1 answer
  • Which of the following do nylon and Kevlar fibers have in common?
    14·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!