1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
7

"The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce

ntralized manner is a feature of what Windows Server 2012 R2 service?
Computers and Technology
1 answer:
Hatshy [7]3 years ago
3 0

Answer:

Active Directory

Explanation:

The 2012 R2 Windows Server  is the 6th version of  Windows Server server operating system which is made by Microsoft. It is a part of the Windows NT family of the operating systems.

Active Directory helps to store the default user profiles as well as the user login scripts.

It helps to assign the system policies, assign  permission to the users overt he network resources and also to deploy software in a centralized manner.

You might be interested in
A form letter can be customized by using different fields in a __________.
alexgriva [62]
I think the answer to this is  C.email
4 0
3 years ago
Read 2 more answers
What is a fruitful function? Explain with help of programming example?<br> plz
kupik [55]
These are the functions that return a value after their completion. A fruitful function must always return a value to where it is called from. A fruitful function can return any type of value may it be string, integer, boolean, etc. It is not necessary for a fruitful function to return the value of one variable, the value to be returned can be an array or a vector. A fruitful function can also return multiple values.
5 0
3 years ago
What enables computers to run multiple operating systems and multiple software applications at the same time and creates multipl
kondor19780726 [428]
It is virtualization that allows all of which to be ran
5 0
4 years ago
What are the differences betweenCONS, LIST, and APPEND?
den301095 [7]

Answer:

These all are constructors.

<u>CONS</u>

(CONS A B)

makes a pair like this:   (A . B)  

In other words, A is the CAR of the pair; B is the CDR of the pair.

For  example:

(CONS 4 5) ==> (4 . 5)

(CONS 4 '(5 6)) ==> (4 5 6)

[The pair (4 . (5 6)) is the same thing as (4 5 6)].

<u>APPEND  </u>

(APPEND A B)

makes a new list by replacing the final nil in A with the list B. A and  

B must be proper lists.

For example:

(APPEND '(4) '(5 6)) ==> (4 5 6)

This takes any amount of number and put in this order

<u>LIST  </u>

In this ,it will return a list whose elements are value of arguments in the order as it appeared in the LIST.It can take any amount of parameters

For example,

(LIST 4) ==> (4)

(LIST 4 5) ==> (4 5)

(LIST 4 5 '(6 7)) ==> (4 5 (6 7))

(LIST (+ 5 6)(* 5 6)) ==> (8 9)

6 0
4 years ago
How are envelopes and letterheads different
choli [55]
Envelope - a flat paper container with a sealable flap, used to hold a small letter or document.

letterhead - a printed heading on stationery stating a person's or organization's name and address. A letterhead is very important when it comes to businesses.

Hope this helps! =D
8 0
4 years ago
Other questions:
  • A phone call costs $0.58 plus $0.15 cents per minute. If the total charge for the call was $4.78, how many minutes was the call?
    15·1 answer
  • One suggested means of gaining eye contact before reversing is to:____.
    12·1 answer
  • What is illegal to search on the internet?
    5·1 answer
  • Technician A says that wheel speed sensors are a highly probable cause of illuminated EBC warning lamps. Technician B says that
    10·1 answer
  • Write a for loop that prints the values 1 2 4 8 16 32 64 by increasing the value of a counting variable by a factor of two in ea
    15·1 answer
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • Please help me!! (two questions)
    12·1 answer
  • Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
    11·1 answer
  • Universal containers wants internal support requests to be directed to any of the IT reps. They want external support requests t
    9·1 answer
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!