1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
6

Which of the following is a correct group scope type in AD, windows server 2016?

Computers and Technology
1 answer:
djverab [1.8K]3 years ago
3 0

Answer: C) All of the listed options.

Explanation:

There are basically three groups scope type available In AD( Activation directory) that are:

  • Universal group
  • Global groups
  • Domain local groups

The main function of the active directory is that it is used to gather the various types of object together for the ease of the administration. The activation directory basically offers the potential risks in the nesting security.

Each these above mention groups define the possibility of the members in a groups and the permission of the groups are applied within the group of domain.

 

You might be interested in
What is the difference between word processing software and presentation software​
Gnesinka [82]

Answer:

Word is a word processing program. PowerPoint is presentation software. MS Word is used for preparing documents which have higher quantum of text and tables. ... On the other hand, MS Powerpoint is used in cases where you want to give a presentation.

3 0
3 years ago
2. (8 points) When creating the Academic Database, there were several instances of data
Bad White [126]

Answer:

See explaination

Explanation:

An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.

One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.

One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.

Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.

8 0
4 years ago
An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer.
aksik [14]

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

<h3>Is non-repudiation an aspect of integrity?</h3>

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

Learn more about acquisition from

brainly.com/question/11412887

#SPJ1

8 0
2 years ago
When you set code inside other code, in an orderly fashion, it is called:
V125BC [204]

Answer:

It is called Nesting

Explanation:

or in this case B

5 0
3 years ago
Initialize the list short_names with strings 'Gus', 'Bob', and 'Zoe'. Sample output for the givenprogram:Gus Bob Zoeshort_names
Gnesinka [82]

Answer:

short_names = ['Gus', 'Bob','Zoe']

Explanation:

A list is a type of data structure in python that allows us to store variables  of different types. Each item in a list has an index value which must be a integer value, and the items can be assessed by stating the index position. The syntax for creating and initializing a list is:

list_name = [item1, item2,item3]

  1. The name of the list (must follow variable naming rules)
  2. a pair of square brackets
  3. items in the list separated by commas.

The python code below shows the implementation of the solution of the problem in the question:

<em>short_names = ['Gus', 'Bob','Zoe']</em>

<em>print(short_names[0])</em>

<em>print(short_names[1])</em>

<em>print(short_names[2])</em>

The output is:

<em>Gus</em>

<em>Bob</em>

<em>Zoe</em>

6 0
3 years ago
Other questions:
  • Why is it best to run antivirus scans when the computer isn't being utilized?
    7·1 answer
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • 30 points!!! Which type of a network is the Internet?
    8·2 answers
  • Which option allows you to customize the order of your data ?
    8·2 answers
  • C++ what is wrong with my equation?
    10·1 answer
  • Given two 3x3 arrays of integer, x1 and x2, write the code needed to copy every value from x1 to its corresponding element in x2
    6·1 answer
  • WHICH COMPUTER COMPONENT CONTAINS ALL THE CIRCUITRY NECESSARY FOR THE OTHER COMPONENTS OR DEVICES TO COMMUNICATE WITH ONE ANOTHE
    12·1 answer
  • What is the difference between word processing software and email?
    12·2 answers
  • When you build a computer from parts, you usually start by deciding on which processor and motherboard you will use?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!