1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
8

The Windows Group Policy feature provides __________ that govern the way Windows operates in enterprise environments. a. a centr

alized set of rules b. user-customized scripts c. personalized security settings d. individualized guidelines
Computers and Technology
1 answer:
WITCHER [35]3 years ago
4 0

Answer:

a.

Explanation:

The Windows Group Policy feature provides a centralized set of rules that govern the way Windows operates in enterprise environments. The Windows Group Policy is found in every single Microsoft Windows operating system, and fully controls the working environment of user accounts and computer accounts. This feature allows the user to manually make restrictions and changes such as blocking access to certain sections of the Windows control panel or setting a specific website as the home page for every account on the network.

You might be interested in
Which of the following is NOT an argument used to determine how a shot is fired from an A. object the shot itself being instanti
Firdavs [7]
C. The color of the shot...
7 0
3 years ago
In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinet
s344n2d4d5 [400]

Answer:

Chernoff faces.

Explanation:

Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.

In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.

The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.

6 0
3 years ago
for my assignment 2: Room area assignment, I keep getting a negative number for room 2, and I don't know why I'm getting the wro
ivann1987 [24]

Answer:

The program in Python is as follows:

A = int(input("Side A: "))

B = int(input("Side B: "))

C = int(input("Side C: "))

D = int(input("Side D: "))

E = int(input("Side E: "))

A1 = A * B

A2 = (D - B - E)*(A - C)

A3 = 0.5 * E * (A - C)

Area = A1 + A2 + A3

print("Area:",Area)

Explanation:

One reason, you're getting a negative answer is that you probably entered a greater value for side C than A. Side A is meant to be greater than side C. Since the program do not need to be validated, you have to be careful with your inputs.

Another reason could be that your program is incorrect.

Get input for sides A to E

<em>A = int(input("Side A: "))</em>

<em>B = int(input("Side B: "))</em>

<em>C = int(input("Side C: "))</em>

<em>D = int(input("Side D: "))</em>

<em>E = int(input("Side E: "))</em>

Calculate rectangle area 1 (A1)

A1 = A * B

Calculate rectangle area 2 (A2)

A2 = (D - B - E)*(A - C)

Calculate the triangle area 3 (A3)

A3 = 0.5 * E * (A - C)

Calculate the total area

Area = A1 + A2 + A3

Print the calculated area

print("Area:",Area)

7 0
3 years ago
Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
galben [10]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Depending on the needs of the device programmers these OS have various locking frameworks. Spinlocks become beneficial for preemptive multitasking processes during which a thread will operate in such an active loop instead of risking a rest queue latency. Mutexes become beneficial to utility lockers.

  • Solaris 2 employs flexible mutexes, indicating something like this on preemptive multitasking computers, the mutex is introduced with either a spinning switch.
  • Semaphores and state variations are much more effective methods for consistency where a commodity needs to be managed for such a prolonged period of time because spinning is unstable over a prolonged time.

8 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
erica [24]

Answer:

Storing data on the cloud enables access from any location.

Explanation:

4 0
3 years ago
Other questions:
  • Variables defined inside a member function of a class have: Block scope. Class or block scope, depending on whether the binary s
    5·1 answer
  • Why should the government create money it doesn’t have?
    5·2 answers
  • A malicious program that can replicate and spread from computer to computer?
    10·2 answers
  • (Game Design) Creating and manipulating data structures is one of the primary functions of a development environment.
    12·2 answers
  • AYYOOOO CAN YOU HELP A GIRL OUUTT???
    11·1 answer
  • Daniel would like to send a letter to more than one hundred people. He should type each letter separately.
    12·1 answer
  • how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
    7·1 answer
  • What are examples of data duplication in flat files? Check all that apply.
    13·2 answers
  • With which type of test question should you leave yourself extra time to answer?
    14·2 answers
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!