1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
12

Which tool, first introduced in Windows Server 2008 but remains in Windows Server 2019, provides one location to set up, deploy,

and manage servers and server roles
Computers and Technology
1 answer:
Tanya [424]3 years ago
3 0

Answer:

Server Manager

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM, Windows Server 2008, Windows Server 2009, etc.

Windows Server 2008 is a Microsoft Windows Server operating system and released to the general public on the 27th of February, 2008, as part of the Windows NT family.

Server Manager is a tool that was first introduced in Windows Server 2008 (OS) but remains in Windows Server 2019 (OS). It was designed and developed by Microsoft to provide end users with one location to set up, deploy, and manage servers and server roles.

On the 14th of January, 2020, Microsoft stopped providing online technical content update, free support options, non-security and free security updates on-premises for Windows Server 2008 and Windows Server 2008 R2, as they have reached the end of their support lifecycle.

You might be interested in
When working on developing an ability, it is important to get feedback to know how you are doing.
alexgriva [62]

Answer:

T

Explanation:

You don't want to learn a skill incorrectly.

6 0
3 years ago
The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
Len [333]

Answer:

a. True                      

Explanation:

  • Euclid's algorithm for finding greatest common divisor of two integers is a very effective method which has importance in cryptography as it is being used in cryptographic schemes and algorithms.
  • This algorithm calculates gcd of  2 integers which is the largest number which divides both the integers.
  • The famous RSA public-key encryption technique also uses extended version of this algorithm to compute modular multiplicative inverse
  • Euclid algorithm is also used in Chinese remainder theorem.
  • This algorithm is not only used in cryptographic algorithm but is also used in breaking these cryptosystems using prime factorization as we know that factorization of large integers is very tough and the security of many cryptography systems depends on this.
5 0
3 years ago
The output of a computer can be seen on ( monitor, keyboard or mouse )​
son4ous [18]

Answer:

monitor

Explanation:

keyboard and mouse are inputs

6 0
3 years ago
Read 2 more answers
) Printers today have many features that include improved quality, photo printing capabilities, digital camera connectivity, bui
Sidana [21]

Explanation:

Some of the most important features needed in a printer are:

  • fast printing speed
  • support wireless connectivity
  • support colored/uncolored printing
  • include improved text quality,
  • improved photo printing capabilities

Based on market prices available on the Amazon website, a printer with the above capabilities start at a price range of <em>at least</em> $80.

4 0
3 years ago
Is a type of bullying that takes place when a person intentionally posts negative information about another that is not true
MakcuM [25]

Cyberbullying is bullying that takes place over digital devices like cell phones, ... posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else ... as well as any negative, mean, or hurtful content

6 0
3 years ago
Other questions:
  • The term composite would be used to describe an image that was altered by the Crop tool.
    15·1 answer
  • The utilization of a subset of the performance equation as a performance metric is a pitfall. To illustrate this, assume the fol
    13·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    11·1 answer
  • What type of program would you use to create a personal budget?
    9·1 answer
  • write a program that reads in the length and the width of a rectangular yard . your program should compute the time required ( i
    5·1 answer
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • Which famous individuals was born on october 31st?
    7·1 answer
  • C program To print odd numbers from 15 to 1 ​
    8·1 answer
  • Plz help Complete the sentence.
    11·2 answers
  • Explain the concepts of GIGO—garbage in, garbage out. Why do you think it’s a helpful concept in coding? How do you think it can
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!