answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixas84 [53]
2 years ago
6

The path to the distribution share should always be referred to by the ____ path to ensure that it can be accessed over the netw

ork during unattended installations.
A) Active Directory Convention (ADC)
B) Domain Controller Convention (DCC) C) Configuration Set Convention (CSC)
D) Universal Naming Convention (UNC)
Computers and Technology
1 answer:
ch4aika [34]2 years ago
6 0

Answer:

The answer is "Option D".

Explanation:

In the network, the UNC defines a related file with the removable drive from, which the file is stored without needing interpretation. It is used to ensure, that unguarded computers can be accessed across the network and other options, that can be clarified in the following terms which are not correct:  

  • In option A, It is used to manage computers and other devices on the internet, that's why it is wrong.
  • In option B, It is also known as a server that manages network security, that's why it is wrong.
  • In option c, It is used in software designing, that's why it is wrong .
You might be interested in
Which of the following is NOT a method in which a macro can be run?
liubo4ka [24]
C....................
7 0
2 years ago
I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to se
STatiana [176]

Answer:

24 customers

Explanation:

Given

Customers = 96

p = 25\% --- proportion to sign up

Required

The number of customers to sign up

This is calculated as:

n = p * Customers

So, we have:

n = 25\% * 96

n = 24

5 0
2 years ago
"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
m_a_m_a [10]

Answer:

#include <iostream>  // includes input output functions

#include <string> // used for string functions

using namespace std;   // identifies objects like cout , cin

int main() {  // body of the main function

int index;   // index position of the elements

simonPattern = "RRGBRYYBGY";   //stores simon pattern

userPattern = "RRGBBRYBGY";   //stores user pattern

int userScore = 0;  // used to store the user score

// loop compares characters of user and simon patterns

for ( index = 0; userPattern[index] == simonPattern[index]; ++index) {

     userScore = userScore +1; // adds to the user score

     if (userPattern[index] != simonPattern[index]){

//if user and simon pattern do not match

        break;      }   } // breaks the loop

cout << "userScore is  " << userScore; // prints the user score

Explanation:

The program compares the user pattern to simon pattern character by character and keeps adding one to the user score if the characters of both simon and user patterns match. The loop breaks if the character of user pattern does not match with that of simon matter. At the end the calculated user score is displayed in the output.

3 0
2 years ago
1. Consider a client and a server connected through one router. Assume the router can start transmitting an incoming packet afte
mezya [45]

Answer:

As the total bytes are L, when h bytes out of L are sent from client to router the router immediately send these h bytes forward to next router. Thus simultaneously another set of h bytes reaches the router and therefore many actions are being performed in a simultaneous way.  

Explanation:

For finding end to end delay, calculations are done and briefed.

All the paper work along with explanation is attached for better understanding.

5 0
2 years ago
A business wants to use a new platform to help data flow between third-party platforms or between a platform and its own in-hous
lawyer [7]

Answer:

Database platform as a service

Explanation:

The database platform as a service is also called the managed databases. This software serves by giving users the opportunity to set up and also operate databases. The user would be able to use the database cloud system without having to buy hardware or install software. The cloud providers are in charge of everything which includes it's availability and security.

7 0
2 years ago
Other questions:
  • In a situation where handicapped person can only input data into the computer using a stylus or light pen, which keyboard config
    7·2 answers
  • Write an if-else statement that prints "Goodbye" if userString is "Quit", else prints "Hello". End with newline.
    11·2 answers
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • Suppose a computer using direct mapped cache has 220 bytes of byte-addressable main memory, and a cache of 32 blocks, where each
    5·1 answer
  • Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation appl
    6·1 answer
  • When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers
    15·2 answers
  • Write a program that removes all spaces from the given input.
    6·1 answer
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • It is also called teleconferencing or web conferencing,which is an online meeting wherein two or more people can see,hear,and ta
    14·1 answer
  • What should businesses do in order to remain competitive under the current Cloud<br> landscape?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!