1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
7

You are the administrator for a small network. You have approximately 50 users who are served by a single Windows server. You ar

e providing Active Directory, DNS, and DHCP with this server. Your clients all use Windows workstations. Last week, an employee quit. A replacement has been hired and will be starting next Monday. The new user will need to have access to everything the previous user had, including document files held in the Home folder. You need to set up an account for the new user that all the access required. What should you do?
Computers and Technology
1 answer:
Paladinen [302]3 years ago
4 0

Answer:

Rename the existing account, and change the name fields to match the new employee.

Explanation:

As you appoint new employer that need all the access to everything that the previous user had, including the documents files held in the Home Folder.

So, As an administrative of the network, you should Rename the existing account, and change the name fields to match the new employee.

You might be interested in
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n _
lidiya [134]
An algorithm is the set of logical steps that a computer uses to "read" instructions.

Algorithms are used when you write computer programs.

Mr. Pacey

Technology Specialist
6 0
4 years ago
To carry computer data over the long haul, wans need to have a(n) ________ in multiple towns and cities.
nika2105 [10]
<span>To carry computer data over the long haul, wan need to have a </span>POP (point of presence) <span>in multiple towns and cities. It is a</span><span>n artificial demarcation point OR interface point between communicating entities</span>


3 0
4 years ago
Implement a function inValues() that asks the user to input a set of nonzero floating-point values. When the user enters a value
elena-s [515]

Answer:

Explanation:

The following is written in Python and uses exception handling to do exactly as requested. It then goes adding all of the integer values to an array called num_list and finally adding them all together when the function ends.

def in_values():

   num_list = []

   while True:

       try:

           num = input("Input non-zero floating point: ")

           num = int(num)

           if num == 0:

               break

           else:

               num_list.append(num)

       except ValueError:

           print("No valid integer! Please try again ...")

           try:

               num = input("Input non-zero floating point: ")

               num = int(num)

               break

           except ValueError:

               break

   sum = 0

   for number in num_list:

       sum += number

   return sum

5 0
3 years ago
Suppose a linked list of 20 nodes. The middle node has a data –250. Write the pseudocode to replace the middle node of the linke
dexar [7]

Answer:

The middle node has a data –250. ... Write The Pseudocode To Replace The Middle Node Of The Linked List With ... Assume That The List's Head Pointer Is Called Head_ptr And The Data For The New Node Is Called Entry ... Assume that the list's head pointer is called head_ptr and the data for the new node is called entry ...

Explanation:

4 0
4 years ago
Read 2 more answers
A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus s
IceJOKER [234]

Answer:

The answer is "Option A"

Explanation:

Escalation is the process of manipulating a bug, design failure in software program to obtain elevated access to the resources, which are usually shielded from the user, and wrong choices can be described as follows:

  • In option B, It is wrong because It can't provide any type of problem-solving.
  • In option C, It is wrong because it is a searching module.
  • In option D, It is wrong because it is used to verify the system.
6 0
4 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • P**nhub or x-videos or other
    9·1 answer
  • How many electrons are there in an atom of carbon? A. Four B. Eight C. Six D. One
    15·2 answers
  • What is the different between 32bit anf 64 bit verision​
    11·1 answer
  • M
    15·1 answer
  • Como se diseña y produce un material audiovisual
    5·1 answer
  • A Python keyword ______________.
    15·1 answer
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans. I have TO HAVE I
    14·1 answer
  • How do even do anything on Rblx Creator?? Will give branliest for whoever gives me the most info.
    13·1 answer
  • What are two advantages of edge computing over cloud computing?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!