1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
12

You have been supporting CSM Tech Publishing's Windows Server 2016 server network for over a year. The office has two Windows Se

rver 2016 servers running Active Directory and a number of other roles. Management has informed you that a small sales office is opening in the same building three floors up. The sales manager wants to install a sales application on a server located in the sales office. This server will have limited physical security because there's no special room dedicated for it, which means it will be accessible to non-IT personnel and visitors. You're considering installing Windows Server 2016 Server Core on the new server because accessing its console regularly probably won't be necessary, and this server will be managed from one of the other CSM Tech Publishing servers. What are the benefits and drawbacks of using Server Core for this branch office
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
8 0

Answer:

??

Explanation:

You might be interested in
Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate t
Sedbober [7]

I believe the answer is A. because he has to listen to what the people tell him and he information he has to think about and make a choice on what to reply with.

I hope this helps and its correct please let me know if its wrong have a great day//night.

4 0
3 years ago
An IPv4 address has 32 bits, so there are 232 (over 4 billion) possible IPv4 addresses. Since the Internet is gaining devices qu
Vladimir [108]

Answer:

Explanation:IPv4 is almost used up due to the constant increase in devices so therefore IPv6 was implemented to combat this issue, IPv6 uses 128 bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total. Which essentially means both me and you wont see IPv6 run out in our life times nor will you kids kids.

4 0
2 years ago
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
4 years ago
Technical skills are also called soft skills.<br> Question 9 options:<br> True<br> False
mestny [16]

The statement is false, technical skills are those that serve to perform a specific function and are also called hard skills.

Technical skills are skills that include knowledge in the mechanical, computer, mathematical or scientific area that will allow a good performance of specific tasks.

  • A person with technical or hard skills is able to apply specific methods, procedures and techniques in a specialized field.

  • Soft skills refers to the characteristics and personal competencies that show how a person copes with others, it is related to emotional intelligence.

Therefore, we can conclude that technical or hard skills are the practical knowledge necessary to perform specific tasks, while soft skills are those skills associated with the ability to interact effectively on a personal level.

Learn more about technical skills here: brainly.com/question/10976877

8 0
2 years ago
Help please! I need help with this question, it’s very hard.
sasho [114]

Answer:

1. PRINTER

2.Proj

3.USB

4.CAM

7 0
3 years ago
Other questions:
  • What were precomputed tables and why were they necessary?​
    12·2 answers
  • When a hardware or software interrupt occurs, the CPU calls________
    14·1 answer
  • Where (what memory location) is the data read from for the following code:
    12·1 answer
  • What icon is usually used to indicate an attachment feature?
    14·2 answers
  • Plz help fast! will mark brainliest!<br><br>List three ways that music is used in modern society.
    6·1 answer
  • What is the orbit? Define
    12·1 answer
  • Which step in the software development life cycle analyzes the scope of work?
    6·1 answer
  • Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
    15·1 answer
  • What is collaboration
    14·1 answer
  • What is computer topology​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!