1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
4 years ago
6

Your computer has been showing signs of a malware infection, and today it started up in Safe Mode. Because your computer is not

a member of an Active Directory domain, what all-powerful built-in account can you log on with?
Computers and Technology
1 answer:
son4ous [18]4 years ago
3 0

Answer:

You can log in to the administrator account.

Explanation:

Since your computer is not part of an active domain, you can log in to the admin account, its a built-in account in all Windows OS, this will grant you all privileges, and will allow you to perform any change you want to the computer. It will help you to find and effectively eliminate any malware present in the system.  

You might be interested in
Two DHCP servers, Server1 and Server2, are running Windows Server 2016. As the administrator, you create a scope called Scope1.
kumpel [21]

Answer:

The answer is "Option a"

Explanation:

Split-scope is also an easy and simple approach to deliver DHCP consistency and workload management into your system. Server 2008 R2 provides a convenient divide-scope guide which removes several operational efforts but can only be to use if all databases run on R2, and wrong choices can be described as follows:

  • In option b, It uses the Ip address for multicast, that's why it is wrong.
  • In option c, It is wrong because it uses a windows interface, that works on policies.  
  • In option d, It is wrong because it is an administrative feature.

5 0
3 years ago
Please can someone help me answer this question.
Westkost [7]

Answer:

Upload an image to help people

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ

7 0
3 years ago
Write down the three part of a computer.<br>​
Nostrana [21]

Answer:

1 system unit 2 monitor 3 keyboard

5 0
3 years ago
What do I do if my friend wants me to watch a video at my house?
steposvetlana [31]

Have him email the link to you and click on the it.

hope this helps, have a great day!

3 0
3 years ago
Read 2 more answers
__________ is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, an
sergiy2304 [10]

Answer:

Computer-based Information System

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being described is called a Computer-based Information System (CBIS). This is (like mentioned in the question) a data processing system into a high-quality information and can be used to support decision-making, coordination and control as well as visualizing and analyzing data.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
Other questions:
  • What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information
    10·1 answer
  • What is the lowest layer of the osi model at which wired and wireless transmissions share the same protocols?
    11·1 answer
  • "Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media
    12·1 answer
  • There are only three active stations in a slotted aloha network: a, b, andc. each station generates a frame in a time slot with
    15·1 answer
  • Design a class FileArray that has a static method named writeArray. The method should take two arguments: the name of a file and
    11·1 answer
  • Write a C class, Flower, that has three member variables of type string, int, and float, which respectively represent the name o
    12·1 answer
  • Which of the following protocols help IP in multicast service?
    9·2 answers
  • Iam trying to find a way to code in Scratch that will let me take away the first two and last two letters of a word. For example
    15·1 answer
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
  • 6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!