answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
2 years ago
10

You are an IT manager at Gigantic Life Insurance. You have a new desktop support person starting today whose experience is limit

ed to supporting peer-to-peer networks. What do you need to tell him about how Windows 10 integrates into a domain-based network? Identify and clarify and least 5 points of reference.
Computers and Technology
1 answer:
svlad2 [7]2 years ago
4 0

A domain based network enables collaboration between an organization's department by using an hierarchical to assigning permissions to users

What the new desktop support person should be told are:

1) Upon logging in to a computer, the computer creates a user profile

2) There are different types of user profiles, including, roaming and mandatory user profiles  

  • The roaming user profile is consists of creating a copy of a local profile that is stored on the shared server, such that the user profile is updated on the shared server when the user makes changes and logs off. The profile is automatically loaded when the user logs into any of the computers located in the network
  • A mandatory profile is one that is only editable by the administrator and can therefore, be used to give specific settings to users and in which the user changes are not saved once the user logs off

3) An XML file that is defined in group policy can be used to modify the taskbar layout and the Start Menu The start menu and taskbar

Start Menu and taskbar layout modification can be done by using Windows Imaging Configuration Designer, or ICD to create a provisioning package

4) In a domain environment, chip cards, smart cards or ICC cards and virtual smart cards can be used

5) The local SAM database is used to authenticate users in a peer-to-peer network, such that automatic synchronization between computers does not occur automatically

6) The domain controller controls user authentication in a domain based network, with the credentials being stored when the user signs in such that the users can log into the computer when the domain controller is offline

Learn more about domain-based networks here:

brainly.com/question/14467998

You might be interested in
Assume the secret key is: (1, 2, 3, 4) -> (3, 1, 4, 2); assume the plaintext THEYLOVEIT. If the sub-block length is 3, what i
Alex777 [14]
I belive their were answer chocies to this question am i right 

8 0
2 years ago
Based on virtualization technologies, how many types can we classify them? Please give a brief statement on each of them?
geniusboy [140]

Answer:

Software and Hardware virtualization.

Explanation:

Virtualization is a process or the ability of a system to run multiple operating systems and virtually using all the physical resources, as though they are individual systems.

Hardware virtualization allows for hardware components like the storage, CPU, memory etc to be virtually used by multiple virtual machines. Software virtualization uses software managers to run individual guest operating systems on virtual machines.

6 0
2 years ago
Write a function that computes the average and standard deviation of four scores. The standard deviation is defined to be the sq
ZanzabumX [31]

Answer:

#include<iostream>

#include<cmath>

using namespace std;

double calAvg(double s1, double s2,double s3, double s4);

double calStandardDeviation(double s1, double s2,double s3, double s4,double average,int n);

void main()

{

 double s1,s2,s3,s4;

double avg,StandardDeviation;

char option;

   do

{

 cout<<"Enter s1:";

 cin>>s1;

 cout<<"Enter s2:";

 cin>>s2;

 cout<<"Enter s3:";

 cin>>s3;

        cout<<"Enter s4:";

 cin>>s4;

 avg=calcAvg(s1,s2,s3,s4);

        sdeviation=calcStandardDeviation(s1,s2,s3,s4,avg,4);

 cout<<"Standard deviation:"<<sdeviation<<endl;

 cout<<"Do you want to continue then press y:";

         cin>>option;

}

       while (option='y');

}

double Average(double s1, double s2,double s3, double s4)

{

return (s1+s2+s3+s4)/4;

}

double calcStandardDeviation(double s1, double s2,double s3, double s4, double mean,int n)

{

double sd;

sd=(pow((s1-mean),2)+pow((s2-mean),2)+

                     pow((s3-mean),2)+pow((s4-mean),2))/n;

sd=sqrt(sd);

return sd;

}

7 0
2 years ago
Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key sh
alekssr [168]

Answer:

Confusion.

Explanation:

She explained to a colleague how important it is to secure a cryptography key from cryptanalysis. She just tells them about the password will not refer to the cipher script in a simple way. So, she defining the security from confusion.

Cryptanalysis is the password cracking and analysis of encoded codes, ciphers, or document. Cryptanalysis requires mathematical equations to scan for flaws in algorithms and hack into cryptography.

8 0
2 years ago
Prompt: Which references and reference formats are you most likely to use? Why?<br><br><br> ED2020
Gemiola [76]

Answer:

I use the dictionary as my reference and the reference format I'd prefer is the internet because its quick and easy to access.

I used this in my journal for the prompt

6 0
2 years ago
Read 2 more answers
Other questions:
  • how do you make a circuit so 1 switch will turn on/off all the lights(3 lights) and a second switch will change the lights from
    14·2 answers
  • Why are digital calendars considered to be a convenient way to maintain a study schedule?
    10·2 answers
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • reAay ouyay aay hizway ithway igPay atin?Lay? (Translated: "Are you a whiz with Pig Latin?") Write a program that converts an En
    6·1 answer
  • Which of these are characteristics of a Python data type? Check all that apply.
    11·1 answer
  • For a data structure, such as a stack, who is responsible for throwing an exception if the stack is empty and a pop() is called:
    13·1 answer
  • Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
    11·2 answers
  • Draw a flowchart and write the algorithm to find even number between 1 to 50​
    7·1 answer
  • Write a class named Employee that has private data members for an employee's name, ID_number, salary, and email_address. It shou
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!