1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dolphi86 [110]
3 years ago
14

Cuál es la capacidad de conexión de una red Intranet

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
3 0

Answer:

Hmmmmmmmmmmmmmmmmmmmmmmmmmmmm

You might be interested in
What would happen if the coils in a generator stopped spinning?
just olya [345]
The generator will start to slow down and heat up.. because sooner or later the energy that is supposed to be going to the coils spinning then it all goes to heat.. The generator will either catch on fire or stop working completely. 
8 0
4 years ago
Read 2 more answers
A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
inysia [295]

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

6 0
3 years ago
Identify the components of documents merging
Lena [83]
There are 3 components of documents merging :

- input 1  , which contain the data source

- Input 2, which contain the main document

and

- Output 3, which contained the merged the documents
8 0
3 years ago
If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
sladkih [1.3K]
Have them post more positive outcomes and help them understand that what they post stays there forever
4 0
3 years ago
Read 2 more answers
Why do software developers prefer to use high-level language to author programs?
Charra [1.4K]

Answer:

The answer to this question is given below in the explanation section

Explanation:

The correct answer to this question is: it used a more English-like syntax.

The software developer use high-level language to develop or author the program because it is more likely to English syntax and it would be easy for a software developer to author a program easily instead of using low level language and remembering ones and zeros.

Other options are not correct because:

It can be used on computers without microprocessors: Each computer has a microprocessor either you develop a program using high-level or low-level languages. Changes and modifications are easy in high-level language than in low-level languages. so, the option that prevents anyone from making changes to the software later is wrong.  However, high-level languages are less complicated in learning and in authoring the programs but it does not use zeros and ones, it uses English-like syntax. So, the last option is also wrong.  

4 0
3 years ago
Other questions:
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • Okay I need help. In the first picture, the black glasses, that was my vision last year 52:17 135 and my vision now is 52:15 135
    5·1 answer
  • Design an application that has an array of at least 20 integers. It should call a module that uses the sequential search algorit
    13·1 answer
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • Need done ASAP
    15·1 answer
  • A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the
    13·2 answers
  • How has the dependence on technology made humanity less intelligent?​
    15·1 answer
  • A _____ focuses on creating software systems like tools, utilities, antivirus programs, and operating systems.
    12·2 answers
  • The linux/unix command __________ can be used to search for files or contents of files.
    14·1 answer
  • software that opens files and scans their code to look for certain types of malware is known as software.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!