answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
2 years ago
7

What are the two main functions of user accounts in Active Directory? (Choose all that apply.) Allow users to access resources m

ethod for user authentication to the network Provide detailed information about a user Provide auditing details
Computers and Technology
2 answers:
Alekssandra [29.7K]2 years ago
8 0

Answer:

-Allow users to access resources

-Method for user authentication to the network

Explanation:

User accounts in Active Directory give people and programs the access to resources in a windows domain. These accounts are used to allow people to access resources, manage the access users have to resources like files and directories and allow programs to be able to run in a particular context. According to this, the answer is that the two main functions of user accounts in Active Directory are: allow users to access resources and method for user authentication to the network.

irina [24]2 years ago
3 0

Answer:

method for user authentication to the network

Provide detailed information about a user

Explanation:

An in AD, a user account consists of all the information that includes user names, passwords, and groups. All these information defines a domain user in which a user account has membership access to. With the advanced features of Kerbos, mutual authentication in user accounts to a service is achieved.

You might be interested in
Check your tire pressure every _____. A. month B. two months C. six months D. year
ohaa [14]

Answer: I'd say (B) Two months

Explanation: Hope its correct and helps, Good luck :)

6 0
2 years ago
Read 2 more answers
When a file is transferred between two computers, two acknowledgment strategies are possible. in the first one, the file is chop
ra1l [238]
The TCP/IP stack is responsible for the "chopping up" into packets of the data for transmission and for their acknowledgment. Depending on the transport protocol that is used (TCP or UDP) each packet will be <span>acknowledged or not, respectively.
</span><span>the strategy when the file is chopped up into packets, which are individually acknowledged by the receiver, but the file transfer as a whole is not acknowledged is OK in situations (Applications) that do not need the whole file to be sent, Web site for example: different parts of the web site can arrive in different times.

The other strategy, in which </span><span>the packets are not acknowledged individually, but the entire file is acknowledged when it arrives is suitable for FTP (mail transfer), we need whole mail, not parts of it. </span>
5 0
2 years ago
Please help, Tech class!!
IRISSAK [1]

Answer:

Explanation:

1=A

2=A

3=A

4=True

5=A

6=D

7=D

8=B

9=True

10=C

3 0
2 years ago
Reputable firms often ask recent graduates to pay an up-front fee for a job.
koban [17]

Answer:

What is your question?

Explanation:

5 0
2 years ago
Read 2 more answers
Assume that a function named swapdoubles has been defined and is available for use in this exercise: that function receives two
Nata [24]

Answer:

C++ Code:

void sort3(double &a, double &b, double &c)

{

   if(a > b)

       swapdoubles(a,b);

   if (b > c)

       swapdoubles(b,c);

   if (a > b)

       swapdoubles(a,b);

}

Explanation:

To change the values of a,b,c within the function, we pass the values by reference. Let us assume that number a = 3.14, b = 2.71, c = 3.04. Since a > b, values of a and b will be swapped.Now a = 2.71 and b = 3.14. Similariy, since b > c, they will be swapped. This way, we move the largest number to its correct position in the first two steps. If there are only three numbers, and the largest number is in its correct position, then for the two remaining numbers, we will only need atmost one swap to exchange their positions. hence, we perform a comparison of a > b once again to see if the b is smaller than a. if its not, then all a,b,c are in sorted order.

6 0
2 years ago
Other questions:
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • Which of these is an advantage of using the Clipboard task pane? A. You are able to apply OLE easily. B. There are more paste op
    15·2 answers
  • Jeff wants to be an archeologist. He found the information below and wants to properly cite it for his own use. The information
    15·2 answers
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain t
    14·2 answers
  • What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
    11·1 answer
  • 5.6 Look carefully at how messages and mailboxes are represented in the email system that you use. Model the object classes that
    14·1 answer
  • 11.19 LAB: Max magnitude Write a function max_magnitude() with two integer input parameters that returns the largest magnitude v
    7·1 answer
  • Create two classes. The first, named Sale, holds data for a sales transaction. Its private data members include the day of the m
    8·1 answer
  • Write a program that takes a single integer input from the user and stores it in a variable. Your program should increase the va
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!