What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access

Answers

Answer 1

Windows Servers are the platforms that are the operating system of networking and services. Domain Controllers are used to authenticating accounts.

What are Domain Controllers?

Domain Controller is a windows server that gives access to the user's accounts upon receiving a request by verifying the account and details. It acts as the gatekeeper to guard the accounts.

Domain Controller (DC) responds to the Windows Server domain's request to give access and in this way protects the account from unauthentic access and theft of information from unauthorized sources.

Therefore, Domain Controller a type of Windows Server is used to authentic account.

Learn more about windows servers here:

https://brainly.com/question/15687746

#SPJ1


Related Questions

_____ oversee the work of various types of computer professionals and must be able to communicate with people in technical and nontechnical terms.

Answers

Systems analysts oversee the work of various types of computer professionals and  communicate with people in technical and nontechnical terms.

Who works in an information systems?

The information systems field is known to be made up of people in a firm who set up and build information systems, the individuals who use those systems, and the people who are known to managing them.

Note that there is high demand for IT staff whose common example includes programmers, business analysts, systems analysts, etc.

Learn more about computer from

https://brainly.com/question/24540334

When developing an output control system, it is important to implement output standards that: (Choose all that apply.)

Answers

When creating an output control system, it is important to implement output standards  or targets that managers think will have good measure efficiency, quality, etc.

What is this system about?

In an output control system, it is important for  managers to first make sure that they set of goals or output performance standards or targets that they believe will best measure in terms of efficiency, quality, etc., for their firm.

Note that this system often acts as a behavior control systems that helps in providing methods that can be used to ensure that workers do well in ways that make the work to be efficient.

Learn more about control system from

https://brainly.com/question/27334060

PLEASE HELP!

Make a code that should prompt the user for the prices and quantities of three items. The code should calculate the subtotal of the items. After the subtotal is calculated for your list your code should automatically calculate the sales tax using a tax rate of 5%.
Print out the line items with the quantity and total, and then print out the subtotal, tax amount, and total.

Answers

Answer:

subtotal = 0total = 0tax_rate = 6.5for i in range(1,4):   price = float(input("Enter the price for item " + str(i) + ": "))   quantity = int(input("Enter the quantity for item " + str(i) + ": "))   subtotal += (price * quantity)tax = subtotal * tax_rate/100total = tax + subtotalprint("Subtotal: " + str(subtotal) + ", Tax: " + str(tax) + ", Total: " + str(total))

Explanation:

- Initialize the variables- Create for loop that iterates 3 times- Ask the user for the price and quantity of each item- Calculate the subtotal with given inputs- When the loop is done, calculate the tax and total- Print the subtotal, tax, and total

What kind of specialized monitor is used for cell phones with screens that wrap around the edges of the phone and for curved monitors whose edges wrap toward the viewer

Answers

The kind of specialized monitor used for cell phones with screens that wrap around the edges of the phone are flexible screens.

What are flexible screens?

The  flexible screens example is  OLED screens. They are known to be made through the medium of organic materials that is said to often brings out light when electricity is said to be passed through it.

Note that the use of these screens do not need any form of backlights to function as they are produce to be thin enough to the give the place or point where they are said to be of  flexible screens.

Learn more about monitor from

https://brainly.com/question/1590202

In windows 10, where would you save the template so it is available in the available templates list in backstage view?.

Answers

Answer:

got to \Username\Documents\CustomOfficeTemplates

Explanation:

Dear, ( Name of Iphone store)
As soon as I bought my Iphone and got home, it didn't work. If I send it back, can you tell me what is wrong with it or get me a new one?
Thanks!
From ( Your Name )

Answers

Answer:

Yes! The apple store will help you

Explanation:

9. With each element of the list defining both a key exchange algorithm and a CipherSpec, the list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the __________ .

Answers

The list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the CipherSuite.

What is CipherSuite?

CipherSuite can be defined as a group of instructions used to produce network connections in a secure manner.

CipherSuite is associated with Transport Layer Security, which involves the usage of algorithms to protect data.

Transport Layer Security can be defined as a computational cryptographic protocol aimed at protecting information.

Learn more about Transport Layer Security here:

https://brainly.com/question/14425531

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue

Answers

The most likely cause for this issue is that the DNS server and DHCP server can be seen or found in different domains.

What is DHCP server?

A DHCP Server is known to be a kind of a network server that is said to function by automatically giving and placing IP addresses, default gateways and other kinds of parameters of a network to the computers of their client devices.

Note that  when the DNS server and DHCP server can be seen or found in different domains, the issue of updating automatically can arise.

Learn more about DHCP server from

https://brainly.com/question/10097408

#SJ1

Learning Activity 2

Directions. Complete the Venn diagram below by writing down the advantages and disadvantages of Configuring client

device systems settings. Use the rubric as your guide.​

Answers

The advantages of configuring a client device include the following:

It makes it automatically active on a computer network.Communication with other devices.

What is a command?

A command refers to a set of instructions that are used for the configuration of a client device based on specific system settings, so as to make it active on a computer network.

Some of the advantages of configuring a client device include the following:

It makes it automatically active on a computer network.The ability to communicate with other network devices.The ability to send and receive files.Access to software updates.

Converesly, the disadvantages of not configuring system settings on a client device include the following:

RedundancyObsolete software version.Vulnerability to attack.

In conclusion, it is very important that you configure system settings on a client's device with the appropraite level of security and parameters.

Read more on client devices here: https://brainly.com/question/6846967

How have computer technology entrepreneurs such as steve jobs and jeff bezos most directly affected the twenty-first-century economy?.

Answers

Answer:

Explanation:

Steve Job and Jeff Bezos has the uniques idea brought into the world, which both of them have similar ideas of how the future of technology should be like, Steve helps push with new innovations like smart devices that we uses, while Jeff use those devices to help people or consumer able to trade like buying and selling on the internet with ease, and behind the scenes, there were trillion of dollars moving around (just the number). Because of their ideas people start to believe or take an advantages of it right away since it was already there for us to be using.

Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the assembly program’s instruction set consists of 198 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. A. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. How many additional instructions could be added to this instruction set without exceeding the assigned number of bits? Discuss and show your calculations. D. What is the largest unsigned binary number that the address can hold?

Answers

The number of bits that are needed for this operation code (opcode) is equal to 8 bits.

Given the following data:

Number of operations = 198.Instruction size, I = 24 bits.

How to calculate the number of bits.

The number of bits that are needed for this operation code (opcode) is given by this mathematical expression:

[tex]2^n > 198\\\\2^8 > 198\\\\256 > 198[/tex]

n = 8 bits.

b. To determine the number of bits that are left for the address part of the instruction:

Opcode, O = 8 bits.Instruction size, I = 24 bits.

Address = Instruction size - Opcode

Address = 24 - 8

Address = 16 bits.

c. To determine the maximum allowable size for memory:

Based on the memory unit, this is given by [tex]2^{16}\times 24[/tex]

d. The largest unsigned binary number that can be accommodated in one word of memory is equal to [tex]2^{24}-1[/tex]

Read more on binary number here: https://brainly.com/question/5381889

what is a set of algorithms that uses past user data and similar content data to make recommendations for a specific user profile?

Answers

Answer:

online recommendation engine

Explanation:

The final step in the software development life cycle involves.

Answers

Answer:

Operation and maintenance

Explanation:

It involves maintenance and regular required updates.

Choose one answer for each statement, whether it is True or False:
a) CPU stands for Computer Processing Unit
b) The CPU processes all of the data and instructions that make a computer system work
c) The CPU carries out the fetch-decode-execute cycle
d) The clock speed, number of processor cores and cache size all affect CPU performance

Answers

a) false
b) true
c) true
d) true

Write a C program to do the following tasks:

a) Read the grades of students in the class from the keyboard (assume the grades are

integer in the range 0 to 100).

b) Find the average of the grades that are less than 50. If there are no grades less than 50, then display the message "No grades < 50".

c) Find the average of the grades that are greater than or equal 50. If there are no

grades greater than or equal to 50, then display the message "No grades >= 50".


The program should terminate if the input grade is negative. (Hint: Use sentinel-controlled repetition structure). Note that average of the grades might not be an integer and design your program considering that

Answers

Answer:

#include<stdio.h>

void main()

int marks;

printf("Enter your marks ");

scanf("%d",&marks);

if(marks<0 || marks>100)

printf("Wrong Entry");

else if(marks<50)

printf("Grade F");

else if(marks>=50 && marks<60)

printf("Grade D");

else if(marks>=60 && marks<70)

printf("Grade C");

else if(marks>=70 && marks<80)

printf("Grade B");}

else if(marks>=80 && marks<90)

printf("Grade A");

else:

printf("Grade A+");

#may need to replace spaces with tab

Explanation:

it works ( I hope, if it doesn’t tell me what the error is)

An ethical code may not address specific issues because…


A. Technology is such a broad area that a code cannot cover it all.


B. Technology evolves so quickly so the code may not be up to date


C. It tests the ethics of personnel and addresses general issues


D. Ethical codes have no legal authority to penalize offenders

Answers

An ethical code may not address specific issues because, technology evolves so quickly, so the code may not be up-to-date.

What is a code of ethics?

A code of ethics is the combination of ethical guidelines and the honest practices which needs to be followed in an organization.

The technology changes at a high rate. It effects on work ethics with the same rate. An ethical code may not address specific as technology moves so fast.

The options of the given problem are,

A. Technology is such a broad area that a code cannot cover it all.B. Technology evolves so quickly so the code may not be up-to-dateC. It tests the ethics of personnel and addresses general issuesD. Ethical codes have no legal authority to penalize offenders

Here, the second option is correct, which talk about the pace of technology.

Thus, an ethical code may not address specific issues because, technology evolves so quickly so the code may not be up-to-date.

Learn more about the ethical code here;

https://brainly.com/question/24606527

#SPJ1

Answer:Below

Explanation:

A(n) _____ is a flexible tool used to analyze data using reports that do not have a predetermined format.

Answers

Answer:

decision support system

Explanation:

A pivot table is a flexible tool used to analyze data using reports that do not have a predetermined format. The correct answer is the pivot.

A pivot table is a data summarization tool in spreadsheet software that allows users to rearrange and analyze data dynamically.

It provides a flexible way to aggregate and organize data based on different variables without requiring a predefined report structure.

Therefore, A pivot table is a flexible tool used to analyze data using reports that do not have a predetermined format. The correct answer is the pivot.

To know more about the pivot:

https://brainly.com/question/31261482

#SPJ4

A checkbox may ask if you want to receive news and updates or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an

Answers

When creating or browsing websites, this checkbox in the above scenario is referred to as Opt-in and Opt-out.

What is Opt-in and Opt-out?

“Opt-in” is known to be the act that entails a positive action that is needed for one to be able to subscribe as a user to a given program or a newsletter  while “Opt-out” is the opposite.

Conclusively,  When creating or browsing websites, the Opt-in and Opt-out checkbox can help one to have the right to be in or out of that service as it is not mandatory.

Learn more about checkbox from

https://brainly.com/question/20347398

#SPJ1

A _________________is a weakness that can be exploited either because it is protected by insufficient security controls, or because existing security controls are overcome by an attack. A. Confidentiality B. Integrity C. Authenticity D. Vulnerability

Answers

Has to be D. Vulnerability

If you really had no idea look at your options and notice that D is the only noun too

If a password is entered wrongly three times the computer will

Answers

Answer:lock

Explanation:its a sicuraty thing

Type the correct answer in the box. Spell all words correctly.
Which is a network of devices built around a person, typically within 10 meters of range?
А
is a network of devices built around a person, typically within a diameter of 10 meters
Reset
Next

Answers

Answer:

A PAN (Personal Area Network) is a network of devices built around a person, typically within a diameter of 10 meters

Explanation:

______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide decision support to all organizational users. chapter 14

Answers

Q:

__ is used to extract knowledge from sources of data—NoSQL databases, Hadoop data stores, and data warehouses—to provide decision support to all organizational users.

A:

data analytics

You are using Linux and need to perform a reverse lookup of the IP address 10.0.0.3. Which command would you use to accomplish this

Answers

Answer:

nslookup

Explanation:

you could also use ping or tracert

To perform a reverse lookup of the IP address 10.0.0.3 in Linux, you would use the nslookup command.

What is the nslookup command

The nslookup command is a network administration tool used to query the Domain Name System (DNS) to obtain domain name or IP address mapping information.

To perform the reverse lookup, open a terminal and type the following command:

nslookup 10.0.0.3

After running this command, you should see the corresponding domain name (if available) associated with the IP address 10.0.0.3. If there is a valid DNS entry for the given IP address, it will be displayed in the output. If there is no DNS mapping for the IP address, the command will indicate that no information is available.

Learn more about Linux  at

https://brainly.com/question/12853667

#SPJ2

An arrangement in which local businesses team up with schools, hiring students to perform jobs that use knowledge and skills taught in their school classes is called a _____. a. vocational education program b. cooperative program c. internship d. service learning

Answers

An arrangement in which local businesses team up with schools, hiring students to do jobs that use skills taught in their classes is called a cooperative program.

What is cooperative program.

The cooperative program in which different firms cooperate with schools to balance the classroom study and practices, enhancing the practical knowledge and develop required skill of students.

Advantages of cooperative program-

Practical learning-Apart from theory learning, in the cooperative program students get the knowledge of practical working and concepts.Experience-In this program, students get the working experience before they graduate.Enhance Network-The students can enhance their network with cooperative team members, with the help of this program.

Thus, an arrangement in which local businesses team up with schools, hiring students to do jobs that use skills taught in their classes is called a cooperative program.

Learn more about the cooperative program here;

https://brainly.com/question/9794781

Answer:

b

Explanation:

im a knower

A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart

Answers

Commerce Server

An application program that runs on a server tier computer. A typical commerce server obtains product data from a database, manages items in users' shopping carts, and coordinates the checkout process.

A computer ______ is a potentially damaging program that affects a computer or device negatively by altering the way it works.

Answers

Hello!

The answer would be: virus.

Explanation, if you’d like to read it:
A computer virus is a type of program that can cause damage to a computer by causing a system failure, corrupting data, and wasting computer resources, among other things.

I hope that this helps you!

Jhon bought a new printer for his desktop computer. It does not work even though he checked all the cables and cords. What do you think he forgot to connect? *


A. The installer
B. The ports and plugs
C. The Device Driver
D. The Utility Software

Answers

i think it’s d sorry if it ain’t ..

Which of the following is considered true regarding the future of technology?

It is evolving quickly and always changing.
There will be limited jobs in the future.
Only programmers will work in the computer science industry.
It will replace the need for human workers.

Answers

Hello!

The answer is:
-It is evolving quickly and always changing.

I hope that this helps you!

The range of cells receiving copied content is called the ____ area. A. fill B. range C. location D. paste

Answers

Answer:

The answer is paste.

D. paste

What is a program that migrates through networks and operating systems, typically attaching themselves to different programs and databases?.

Answers

A software program that moves through networks and operating systems (OS) by attaching themselves to different programs and databases is a: virus.

What is a virus?

A virus refers to a malicious software program that is typically designed and developed to move through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.

This ultimately implies that, a virus is simply a malicious software program that has the ability to cause severe damage to a computer, databases and user files, if not detected on time and properly managed.

Read more on a virus here: https://brainly.com/question/26128220

Other Questions
. Predict how the display may look after another 20 minutes.erature you have $11.35 to buy treats for yourself and a friend. You buy 3 packs of marshmallow chicks for $1.45 each. Then u buy 2 cupcakes for $2.29 each. Which two items below could you afford to buy with your change? bunny $1.88, egg $1.05 ,jelly beans $1.37 Find the slope of the line passing through (2, 10) and (8, 7) If the bottom row as a result of synthetic division is 3, 0, 4, 0, 1. then the quotient is what? What is the difference between tidal volume and vital capacity. 1. Which equation represents the line that passes through the points (4, 8) and (2, -6)? help me decide this ! Which equation has a graph that lies entirely above the x-axis?y = (x + 7)2 + 7y = (x 7)2 7y = (x 7)2 + 7y = (x 7)2 John put away 36 of 48 shirts in his closet. Don has 84 shirts. If he put away the same percent, how many shirts did Don put in his closet? Which type of cell division creates diploid cells?. Initially, most settlers wanted to use the lands that became kansas and nebraska for factories. cities. roads. farms. John works at Kleins Dry Cleaning. He earns $8.45 per hour. If John worked 39 hours this week, what is his pay? Tori and scott have applied for an $8,000 installment loan to pay for a new car. they are told that the loan is approved and the lender fills out all the paperwork, which states that they will pay an annual percentage interest rate of 8.2 tori and scott signed the loan papers. the next day, they find another car dealer who will sell them the same car at the same price but with an interest rate of just 4.8%. they do not live in a state that has a cooling off period for auto loans. what are their options? What is the simplified form of i^14? A. -1 B. iC. -i D. 1 How did Libraries change life in Wv Question is in picture Surface area- Rectangle Please help ASAP Georgia's flag contains three principles: Wisdom, Moderation, and Justice. Which term best describes the judicial branch? *WisdomModerationJusticeNone of the above According to the Elaboration Likelihood Model, when people are more motivated, they process information ___________. Which highly successful band lost three of its members in a plane crash in 1977?.