1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
12

A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?

Computers and Technology
1 answer:
d1i1m1o1n [39]3 years ago
8 0

Answer: Nothing should be done.

Explanation:

Group Policy helps in the provision of a centralized management of operating systems, and applications. It should be noted that a group policy object (GPO) is simply referred to as the configurations involving the group policy.

Nothing should be done to manage the GPO created. When the permission to create a GPO has been given to someone, it means that they can also manage the GPO therefore, nothing needs to be done anymore.

You might be interested in
What is the unit of information called when a network adapter adds the source and destination mac address to the segment of data
Blababa [14]
MAC addresses are part of the header that's put on the packet.
3 0
3 years ago
A newer kind of mobile site can do a lot of what only apps used to do, so the line has blurred between sites and apps. what are
denis23 [38]
The answer is Progressive Website Applications. This specific type of website allows the user to have a particular website function similarly as to when you download the app natively on your device. One main advantage is that you wouldn't need to download the actual app to use its functions. As the applications we use in our mobile phone increase, the more application we need to download, and could be troublesome to have hundreds of app installed on your mobile device.
6 0
4 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
When is founded by java
Rina8888 [55]
Java was originally developed by James Gosling at Sun Microsystems (which has since been acquired by Oracle) and released in 1995 as a core component of Sun Microsystems' Java platform
1995 the answer
4 0
3 years ago
Read 2 more answers
It keeps saying telling me that this code:
Luda [366]

Answer:

your code looks correct. I think your issue is just indentation. with Python you want to be very careful with spacing.

Explanation:

c = 0

while (True):

  user_input = input("Please enter the next word: " )

  if user_input == "STOP":

     break

  c += 1

  print ("# {}: You entered {}".format(c, user_input))

  print("All done. {} words entered.". format(c))

7 0
3 years ago
Read 2 more answers
Other questions:
  • JAVA
    7·1 answer
  • Effective teams use strategies that help members work together a) smoothly b) independently c) loosely d) secretly
    5·2 answers
  • Select the correct answer. Andy wants to become a multimedia producer. Which degree can help him achieve this goal? A. bachelor’
    5·1 answer
  • One way to avoid carbon monoxide poisoning is to:<br><br> B. Open a rear window in your car
    9·1 answer
  • Average of Grades - Write a program that stores the following values in five different variables: 98, 87, 84, 100, 94. The progr
    8·1 answer
  • Given input of a number, display that number of spaces followed by an asterisk. (1 point) Write your solution within the existin
    15·1 answer
  • I have a question involving do and for loops while using arrays.
    8·1 answer
  • ________ computers are specially designed computer chips that reside inside other devices such as a car.
    11·1 answer
  • Provide a class Letter for authoring a simple letter. In the constructor, supply the names of the sender and the recipient: def
    11·1 answer
  • What is Mobile Edge Computing? Explain in tagalog.​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!