1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
3 years ago
10

I’m gonna ask this again because I REALLY need an answer.

Computers and Technology
2 answers:
babymother [125]3 years ago
3 0

Answer:

the answer is what I attached to this

kow [346]3 years ago
3 0
A solenoid is a type of electromagnet, the purpose of which is to generate a controlled magnetic field through a coil wound into a tightly packed helix. The coil can be arranged to produce a uniform magnetic field in a volume of space when an electric current is passed through it.

Solenoid is the generic term for a coil of wire used as an electromagnet. It also refers to any device that converts electrical energy to mechanical energy using a solenoid. ... Common applications of solenoids are to power a switch, like the starter in an automobile, or a valve, such as in a sprinkler system.
You might be interested in
Olivia has developed a great presentation with a distinct purpose and excellent content. She delivered it in a workshop and got
Umnica [9.8K]

less time and depth is required for panel discussions

3 0
3 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
3 years ago
Which presentation guideline helps people with vision disabilities?
Alina [70]
Providing audio with images
4 0
3 years ago
Read 2 more answers
You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM
elixir [45]

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

7 0
3 years ago
Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exc
Illusion [34]

Answer:

B. Enable-PSRemoting.

Explanation:

Powershell is a command-line interface software used in windows operating system to manage the operations of the system. It is similar to the bash terminal scripting language in Linux and has some of the command prompt features.

The PS session is used to manage remote systems connected wirelessly to the administrative system. The command used to enable this process is "Enable-PSRemoting".

4 0
3 years ago
Other questions:
  • Which motherboard slot has direct access to the north bridge?
    7·1 answer
  • Write a program to calculate the area of a triangle whose base is 10cm and height is 6cm
    6·1 answer
  • You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database.
    6·2 answers
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • Why are new versions of applications packages released often ​
    9·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with
    13·1 answer
  • PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MYQUESTION WHICH IS DUE TODAY!!!!
    14·1 answer
  • If you came across an article that discussed the benefits of studying the night before a test rather than the morning of, what c
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!