1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
10

You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Altho

ugh indications are that this printer is over-utilized, there is neither space nor budget to add additional printers at this time.
There are often cases where a document is needed urgently, but when it is printed, it goes into the queue and is printed in the order received, not the order of the document's priority. You would like to allow Gladys, the administrative assistant, to have the ability to maintain the print queue. Specifically, you want her to be able to alter the order of printing for the documents waiting to be printed.

You need to permit Gladys to make this change without adding her to the local Administrators group or making significant changes to the way your office operates.

What should you do?
Computers and Technology
1 answer:
marishachu [46]3 years ago
3 0

Answer:

The answer is "Allocate permission for managing documents to the Gladys printer."

Explanation:

In the given scenario, we allow permission for managing the documents to the Gladys printer. It should enable Gladys could continue these trends by bringing something into the community of local administrators and introducing major changes to wherewith your office operates. In especially, they need her to modify its printing process regarding documentation requiring printing.

You might be interested in
I need an answer and fast What happens if a sequence is out of order?
horsena [70]

Answer:

i would say A

hope i helped <3

Explanation:

4 0
4 years ago
Read 2 more answers
This is the question
nikdorinn [45]

Answer:

I dont know it sorry

Explanation:

i would help u

4 0
3 years ago
Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appea
Jobisdone [24]

Answer:

Here you go :)

Explanation:

Change this however you'd like:

array = []

for n in range(10):

   x = int(input("Enter integer: "))

   array.append(x)

dup = set(array)

print(", ".join(str(i) for i in dup))

7 0
3 years ago
1. What is the main factor that affects Earth’s average temperature?
user100 [1]

Answer:

1. The Sun is the primary source of energy that influences any planet's temperature, including Earth. The amount of energy received from the Sun is called insolation; the ratio reflected is called the albedo.

2.There are three major ways in which global warming will make changes to regional climate: melting or forming ice, changing the hydrological cycle (of evaporation and precipitation) and changing currents in the oceans and air flows in the atmosphere

3.The warming of Earth is primarily due to accumulation of heat-trapping greenhouse gases, and more than 90 percent of this trapped heat is absorbed by the oceans. As this heat is absorbed, ocean temperatures rise and water expands. This thermal expansion contributes to an increase in global sea level.

4.The main sources of greenhouse gases due to human activity are: burning fossil fuels leading to higher carbon dioxide concentrations. farming and forestry — including land use change via agriculture and livestock. cement manufacture.

5. - Reduce, Reuse, Recycle

- Use Less Heat and Air Conditioning

-Use Less Hot Water

Explanation:

5 0
4 years ago
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that comp
dexar [7]

Answer:

c.

Explanation:

Based on the information provided within the question it can be said that the best option in this scenario would be to implement an endpoint management server appliance. This is a software or dedicated appliance that is used in order to discover, manage, and control any and all computer devices that are trying to access the corporate network. This allows you to remove individuals as well as administrative rights from those trying to connect or that are already connected.

5 0
4 years ago
Other questions:
  • Austin works as a department head and frequently uses presentations to deliver information to his staff. He relies heavily on pr
    5·2 answers
  • You will use the _____
    15·2 answers
  • Desirable workplace habits and skills include:
    6·2 answers
  • Once I have entered text into a presentation, how do I modify the font style of the text? Select the text and use options availa
    9·2 answers
  • You may have noticed that the DHCP request that Phil-F¢s iMac sends is a broadcast packet, sent to Ethernet address: ff:ff:ff:ff
    5·1 answer
  • The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effe
    14·1 answer
  • The large capacity, high-definition optical discs designed to store hi-def video and video games are _______. Group of answer ch
    13·1 answer
  • QUESTION 4 PRACTICAL EXERSIZE
    7·1 answer
  • Why is it a good practice to use functions in programming? Select the best answer.
    9·1 answer
  • Why is storage and important part of the computing process? It must be atleast five sentences.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!