1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
15

Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attache

d. Which setting must molly change?.
Computers and Technology
1 answer:
creativ13 [48]3 years ago
5 0

A computer is made up of different network. The setting that molly must change is network type.

A computer network is known to be a group of computers that are linked to each other so as to help the computer to communicate with another computer and share their resources, data, and applications.

A computer network can be classified based on their sizes. A computer network is of four types. They are:

  • LAN(Local Area Network)

  • PAN(Personal Area Network)

  • MAN(Metropolitan Area Network)

  • WAN(Wide Area Network)

Learn more from

brainly.com/question/14200752

You might be interested in
Learning Task 2: Identify what is being asked. Write your answers on your notebook 1. What Microsoft Office program is used for
GenaCL600 [577]

Answer:

hi how are you Good afternoon

3 0
3 years ago
Keyboards and printers are two examples of _________ devices.
galben [10]
Input device your welcome
8 0
3 years ago
What is the difference between a rack and a tower?
mash [69]

Answer:

A rack is a metal frame used to hold various hardware devices such as servers, hard disk drives, modems and other electronic equipment.

A tower is a metal chassis that holds all of the computer's components.

I hope this helped you !

3 0
4 years ago
What is not true of efs
Lemur [1.5K]

Answer:

EFS cannot store files encrypted.

Explanation:

EFS) is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. EFS is useful for mobile computer users, whose computer are subject to physical theft, and for storing highly sensitive data. Encryption itself is the method where the information is converted into secret code that hides the information's true meaning. (EFS) is used to encrypt files and folders. EFS is easy to use, with nothing more than a check box in a file’s properties. It is not fully supported on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium!

3 0
3 years ago
Which principle suggests that specific single responsibility interfaces are better than one general purpose interface?
ElenaW [278]

Answer:Interface segregation principle

Explanation: Interface-segregation principle (ISP) is amongst the major principles of the object-oriented design which describes that none of the users/clients can be forced for indulging and depending on the unknown methods or methods that they don't have knowledge about.

It functions by making the interfaces visible to the user that specifically fascinates them and keeping other smaller interfaces.Interfaces are made by splitting process and making the small interfaces from them.

8 0
3 years ago
Other questions:
  • One type of technology that can verify a person's identity is _____.
    6·2 answers
  • Ziffcorp, an it firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whene
    13·1 answer
  • 5 What is the effect of the author proposing athought experiment at the beginning of the text? ​
    5·2 answers
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • Test Average and Grade
    12·1 answer
  • Which information is considered free for use?
    9·2 answers
  • Write a python program that requests a word (with lowercase letters) as input and translates the word into pig latin. The rules
    15·2 answers
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • I Just Realized................
    7·2 answers
  • Which type of boot authentciation is more secure?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!