1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
4 years ago
6

The Marketing Department for CSM Tech Publishing is busy producing videos and print materials (stored in PDF format) for distrib

ution and use by the Sales Department. With new products being introduced and a good bit of marketing testing, marketing materials change often, and there's often a substantial delay before the Sales Department gets access to these changes. The Sales Department is in another site and wants access to the marketing materials, but given the size of files and the number of updates, you're reluctant to give the Sales Department direct access to files across the WAN link. What DFS replication group configuration could you consider for replication and frequency of access
Computers and Technology
1 answer:
RSB [31]4 years ago
7 0

Answer:

Check the explanation

Explanation:

In choosing the member and updating the replicate files the component or members in the replication group and preliminary members of the group as being taken as authoritative during the original replication.

For any changes you will be useing the sync -dfs replications and suspend-Dfs replication group.

You might be interested in
Bunch of points!!!!!!! help pls
alex41 [277]
Most likely B. Photographs.

Hope this helps!

Have a good day!
4 0
4 years ago
Read 2 more answers
The collection of computer instructions and other files that constitute a piece of software is
lutik1710 [3]
The answer would be
A. Codebase

8 0
3 years ago
Read 2 more answers
____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation
umka21 [38]

Answer:

b. Acceptance

Explanation:

<em>"Acceptance </em><em>of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.  </em><em>"</em>

<em>Acceptance Control </em>is important as a strategy when an organization has accomplished a determined level of risk, or it has estimated potential damages that might happen due to attacks, or the organization has developed a thorough analysis related to cost benefits, or it has also evaluated the probabilities of attacks.

7 0
3 years ago
Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network already installed. Lor
Yanka [14]

Connection to the gigabit ethernet network must be done with Cat6 Cable. Using the wireless ethernet router as the network device and connecting the cable to the printer must be done with Cat5e Cable.

We can arrive at this answer because:

  • The Cat6 Cable will be responsible for establishing a bridge between the gigabyte Ethernet and the network device, allowing data delivery to be made between the two systems.
  • This connection must be made with a wireless device, to keep it more stabilized and it needs, mainly, for the notebook to receive the internet signal. This will be done using the wireless ethernet router.
  • The printer needs a softer, less rigid connection, so a Cat5e cable will be a convenient option.

In this case, we can see that using these devices will allow Lori to have a more stable and efficient connection to meet her needs.

More information on network connection at the link:

brainly.com/question/8118353

5 0
2 years ago
Read 2 more answers
Not everything is a success all of the time! So do you know which version of Windows was the least popular?
mario62 [17]

Answer:

windows xp

Explanation:

I think because it is not fast and don't play the games and programs which have higher requirements

7 0
3 years ago
Other questions:
  • The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
    5·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    7·1 answer
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • What processes are needed to transform a c++ program to a machine language program that is ready for execution?
    14·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • (14) Click on the
    7·2 answers
  • The first version of Windows to have automatic updates from the Internet was _____.
    13·1 answer
  • List 1 reason people invest in Cryptocurrency
    10·1 answer
  • Disadvantages of a grain crusher
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!