When using Windows Deployment Services, you do not need to have the installation media ready and sit at the server console as Windows performs the task of OS installation.

a. True
b. False

Answers

Answer 1

Answer:

True

Explanation:

because


Related Questions

Which of these scientists had the greatest contribution to early microscopy? They all made discoveries using optical microscopes. They all made discoveries based using instruments that optical technology. They invented optical microscopes and telescopes so they could make discoveries. They all made discoveries using optical telescopes.

Answers

Answer:

Hans Jansen, his son Zacharias Jansen, and Hans Lippershey

Explanation:

Three Dutch spectacle makers have received credit for inventing the compound microscope about 1590. The first portrayal of a microscope was drawn about 1631 in the Netherlands.

Which access control principle limits a user's access to the specific information required to perform the currently assigned task

Answers

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

Can some one please help The term career is usually applied to a what PLEASEEEEEEEEEEEE HEEEEELLLLLPPPPP MEEEEEE

Answers

Answer:

Position that allows for professional growth and advancement

Explanation:

Career is referring to better pay than a job because it allows the person to grow professionally and that knowledge the person can show anywhere. For example, the teacher matches this term, because the teacher will always look forward to the advancement and things that would help others.

This kind of personal and professional growth is considering a journey because the person that is growing has to learn each day about different and helpful things.

Which professionals can benefit from an understanding of statistics? Check all of the boxes that apply. magician trying to locate the most popular place to put on magic shows software developer who needs the most compatible programming language director of education who wants to know the school district’s average scores on national standardized tests

Answers

Answer:

All 3 of them

Explanation:

Answer:

all of them because i did the quiz and got it right

Explanation:

er reports that he is having problems with his monitor. He explains that his laptop's liquid crystal display (LCD) is no longer spreading the light over the entire screen. Which component of the LCD is most likely causing this problem?

Answers

Answer:

diffuser

Explanation:

Based on the scenario being described, the most likely cause of the problem is a bad diffuser. This is a component found in nearly every type of LCD backlit displays and are used to produce an even array of lighting across the entire display. If this component fails then it will cause bright spots and dim spots throughout the display, similar to what the client is reporting in this scenario since the light is not being evenly distributed.

Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task?

Answers

Answer:

Flash the BIOS

Explanation:

​ If a class is reusable, that is to say that it can be used in several different applications, then it has been designed using what good design principle? An example might be a button class.

Answers

High cohesion

fghfghdgfhgdhgh

An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access number

Answers

Answer:

Option A (dotted quad ) is the correct option.

Explanation:

A dotted quad seems to be a decimal, readable form interpretation of such an IP version 4 address. It appears in the form of xxx.xxx.xxx.xxxx.xxxx. In something like a 32-bit address, the amount across each quad symbolizes a single byte. Every other quad lies between 0 and 255. 192.168.0.1, besides instance, would have been a representation of such a dotted quad.

Other preferences presented are also not connected to the sort of situations in question. So the obvious response to the above was its completely accurate one.

A computer (mainframe, server, or workstation) that has an operating system enabling _____________ to access it at the same time for files, data and services. Programs and information may be processed at the host, or they may be downloaded to the accessing computer (client) for processing.

Answers

Answer:

The answer is "Multiple computers and Host network".

Explanation:

In the given-question, some data is missing so, the correct answer to this can be defined as follows:

A computer server with the help of an operating system enables to access the data in the multiple computers simultaneously and the Host network allows for access.

The host network is also used to access the network on the computer, which will be a client or a server. It hosting each network has a unique hostname, which can be accessed from other computers. In the device, the name of the host is a 'localhost', which is accessible for their data via a network protocol.

________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility B) flexibility C) responsiveness D) IT consumerization

Answers

Answer:

C

Explanation:

Look at the following code:
Line 1 public class ClassA
Line 2 {
Line 3 public ClassA() {}
Line 4 public void method1(int a){}
Line 5 }
Line 6 public class ClassB extends ClassA
Line 7 {
Line 8 public ClassB(){}
Line 9 public void method1(int x){}
Line 10 }
Line 11 public class ClassC extends ClassB
Line 12 {
Line 13 public ClassC(){}
Line 14 public void method1(int y){}
Line 15 }
Which method (line number) will be executed as a result of the following statements?
ClassB item1 = new ClassA();
item1.method1(5);

Answers

Answer:

The answer is "There is an error, that's why the program will crash".

Explanation:

In the given program code, three class  "A, B, and C" is defined, and inside the code, all class constructor and a method "method1" is defined, that uses an integer variable in its parameters.

At the last line class B object "item1" is created, that holds the class A instance, and in the next step, method1 is called by accepting integer value. when we create the class B object and convert it into ClassB. it is not possible that's why it will give an error.

Question 4 Which compute service lets customers supply chunks of code, which get run on-demand in response to events, on infrastructure wholly managed by Google?

Answers

Answer:

Cloud functions

Explanation:

Google Cloud functions is a computing tool that allow customers to activate their code from within Google Cloud,Google assistant, and Firebase or have it run within a web application, or a backend or mobile phone application as it does not require a server. Google Cloud Functions are billed based on the duration of the actual run time, without additional overhead costs.

Debuted by the Lumiere Brothers, a hand cranked device that showed moving pictures to an audience​

Answers

Answer:

frame is the answer

Classification, affinity grouping, and estimation are______methods used by managers to make their data more meaningful.

Answers

answer: data minding

What are the benefits of transferable skills check all the boxes that apply

Answers

Answer:

They allow easy cross-company transfers.

They help a person develop self-esteem.

They open up a variety of employment options.

Explanation:

Answer:

Las habilidades duras son cuantificables y, en ocasiones, exclusivas de una profesión (como la capacidad de un idioma

Explanation:

“Artificial intelligence is the tool of education in the near future”. Research on the possibility of “AI technology” in scientific study. Verify the advantages and disadvantages of such a system over traditional system of Education

Answers

Answer: I don't know much about technologies and artificial intelligence but I have read about it and also watched a  series about the artificial intelligent.  So, all the technologies has advantage and disadvantages. Like for mobile phone we can use it numerous ways. Like, playing games, calling someone, listening to music and so.  And the disadvantage of phone is when someone has phone if you use it in the wrong way it will be a huge problem and also if someone hacks your phone and blame you for the thing that you didn't do you can be in jail. So, yes, there are so many people in the world who are bad and uses technologies in bad ways. Artificial intelligence can be used in education by helping student learn more new things but it also can let the students to copy and cheat in exams. Because its a robot brain and whatever program you upload it will follow the directions based on the program.

I hope this is the answer you are looking for. Have a great day!

The ______ is an optional key that may be present on any PIV card, does not require PIN entry, and whose purpose is to authenticate the card and therefore its possessor.

Answers

Answer:

CAK

Explanation:

Card Authentication Key

Question 1 :George, a user, is having trouble connecting to network resources, including shared folders on the local network and Internet resources. Yesterday, he was able to connect with no problems. You need to ensure that he can connect to these resources. Which tool should you use FIRST?

Answers

Complete Question:

George, a user, is having trouble connecting to network resources, including shared folders on the local network and Internet resources. Yesterday he was able to connect with no problems. You need to ensure that he can connect to these resources. Which tool should you use FIRST?

Group of answer choices

A. ipconfig

B. Device Manager

C. My Network Places

D. Control Panel

Answer:

A. ipconfig

Explanation:

As a network administrator, to ensure that George can connect to the network resources, shared folders, and internet resources, the tool you should use first is the "ipconfig" in the command line. This is a troubleshooting process that would help to identify the problem and to establish a theory of probable cause.

Since George could connect the previous day without any problem, it is most likely that the TCP/IP settings has been altered. Therefore, to view this settings you'll have to use an ipconfig command.

Give the definition of c identifier​

Answers

Answer:

C identifiers represent the name in the C program, for example, variables, functions, arrays, structures, unions, labels, etc. An identifier can be composed of letters such as uppercase, lowercase letters, underscore, digits, but the starting letter should be either an alphabet or an underscore.

Explanation:

im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that

Answers

Answer:

18% of 7 is 1.26

Explanation:

your question was somewhat unclear

To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the system not allow access (or availability) to anyone.

a. True
b. False

Answers

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

Jessica has claimed and edited her listing, but she is still not seeing her changes live on Google Search. What step does she need to complete to finalize her listing

Answers

Answer:

Business verification

Explanation:

Verifying a business gives the business owner privilege to check the correctness of a business information such that access to edit the information in the future will be limited to the business owner.

Business verification is done mainly through email while businesses close to the highway can verify by call in and from within the search tool

Jessica has rightly started by claiming a Google My Business profile and edited her listing. She next required to verify her business with Google as outlined above.

You are the administrator for your company. You have been given the task of configuring an ISCSI-based hardware RAID for a new server. You need to configure a two disk RAID array that will have good performance while providing tolerance. Which RAID type should you choose

Answers

Answer: RAID 1

Explanation:

__________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.

Answers

Answer: email

Explanation:

Which of these might cause a STOP error in Windows? Select 2 options. bad application coding bad or incompatible driver overheating an application stops responding to commands a missing image on a web page

Answers

Answer:

i think its bad driver and coding

Explanation:

The STOP error in Windows can be found with bad application coding or bad or incompatible driver. Thus, options A and B are correct.

What is a STOP error?

STOP error in windows can be given as the blue and death screen. The screen has been found in the operating system with the fatal error and gave rise to the development of a bug enabling the operation.

The error causes the system to shut down or restart the computer system. The error can be fixed by restarting the computer or updating the windows, and other ways.

The error in Windows such as STOP can be found for the reasons such as bad coding for the application, or the incompatible driver installed in the system that gave rise to inappropriate working. Thus, options A and B are the correct reasons for the STOP error in windows.

Learn more about STOP error, here:

https://brainly.com/question/15031386

#SPJ5

A customer is building a high-end gaming PC and is seeking an appropriate power supply unit. Which of the following featuresets of a power supply should be installed? (Select THREE).A. Mini-ITX form factorB. High number of connectorsC. 24-pin main connectorD. 20-pin main connectorE. 350-450 watts of powerF. Dual 12v rails

Answers

B. High # of connectors C. 24-pin main connector F. Dual 12v rails

The three featuresets of a power supply should be installed by the customer who is high-end gaming PC are High number of connectors, 24-pin main connector, and the Dual 12v rails.

What is the gaming PC?

Gaming PCs are distinguished from standard desktop computers by the use of high-performance video cards, high-core-count central processor units with raw horsepower, and higher-performance RAM.

Other demanding jobs, such as video editing, are also performed on gaming PCs. A dedicated graphics card will be found in the majority of gaming PCs.

This comes with increased resources and processing power that will be dedicated solely to visual quality on the machine. This has a clear influence on video game quality, giving better frame rates with significantly less graphical latency.

Therefore, High number of connections, 24-pin main connector, and Dual 12v rails are the three feature sets of a power supply that should be placed by the client who is building a high-end gaming PC. So, options B, C and F are correct.

Learn more about the gaming PC, refer to:

https://brainly.com/question/6500979

#SPJ2

As the head of IT for MTS, you're explaining some security concerns to a junior administrator who has just been hired. You're trying to emphasize the need to know what is important and what isn't. Which of the following is not a consideration in key storage?
A. Environmental controls
B. Physical security
C. Hardened servers
D. Administrative controls

Answers

Environmental controls

What is the energy conversion and the law used in the given scenario?


Traditional power-generating stations do not store electrical energy. In such power stations, the original energy source spins a turbine which an electric generator. It converts [chemical, mechanical, or thermal] energy into electrical energy using a fundamental principle of physics called [Faraday's, Newton's, or Ohm's] law.

Answers

Answer:

The correct options are;

Mechanical

Faraday

Explanation:

The principle of working of electric generators is to convert kinetic energy, which is the energy present in the spinning turbine into electrical energy. Electricity is generated by the use of the electric generators has the largest share of all forms of electricity generated electricity and it is based on Faraday's law of of induction, which states that Emf = N×(ΔФ/Δt)

Where;

Emf = The induced voltage

ΔФ = Change in magnetic flux

Δt = Change in time.

Therefore, we have;

Traditional power-generating stations do not store electrical energy. In such power stations, the original energy source spins a turbine which an electric generator. It converts mechanical energy into electrical energy using a fundamental principle of physics called Faraday's law.

Answer:

The correct answer is Faraday's law.

Explanation:

I got it right on the Plato test.

3D-bioprinted human organs may be subject to ________. Select one: a. Conflicting healthcare regulations b. Conflicting religious, political, moral, and financial interests c. Skills of bio-engineers d. Technology limitations

Answers

Answer:

a. Conflicting healthcare regulations

Explanation:

3D-bioprinted human organs may be subject to  a. Conflicting healthcare regulations

The omnipresent essence of health-care legislation stems from the basic issues at stake. Most observers recognize the need for some form of supervision when factors as important as life and health are involved. Also those who are especially skeptical of heavy-handed bureaucracy in government see public interest in some sort of external oversight of this field

True or false: Your digital footprint is all the information about you online that only you post. Group of answer choices

Answers

Answer:

Your correct answer is " True. "

Other Questions
How do you think the changes in colonial land holdings affected the power of the British Empire incomparison to the French and Spanish Empires? one third divided by eight Simplify the following Questions. (IMPORTANT NOTE!!! #'s 2 AND 7 MUST BE IN SCIENTIFIC NOTATION!!!!!) 1.) (x)(2xy)^5 2.) (4x10^8)^2 3.) (-h^4)^5 4.) (3xy)(xy)^6 5.) (p^9)^-2 6.)(5k) 7.)(7x10^5) 8.)(x)(-xy) 9.)w^5(w)^-4 10.) (2x^5)^4 what is the answer to this exponent 6*6*6*6*6 The one-year call on TLM stock with a strike price of $65 is priced at $2.20 while the one-year put with a strike price of $65 is priced at $11.18. The annual risk-free rate is 3.8 percent, compounded continuously. What is the current price of TLM stock? find the first principle f(x)=1/x f(2)= can someone let me know what the answer is Which of the following choices may be hazardous to one's health if mishandled?Cleaning products such as bleach , lead , pesticides Section B1. In the adjoining figure find out perpendicular, base andhypotenuse from the given right-angled triangle with a andB as the reference angles. Also give your reason.antoBB.D niche2What is used to represent the direction of energy transfer in a food chain/web?(1 Point)linescirclesarrowsnothing What do you think has the greatest effect on your healthyour heredity (nature), or the environment (nurture)? Just curious. How does the government affect our everyday lives. Im doing an essay, I done have Taxes and Laws. A advertising agency provides a complete range of services, including marketing research, media selection, copy development, artwork, and production.a. Trueb. False Write 830,040 in expanded form with exponents.830,040 = (8 x 105) +(Use the operation symbols in the math palette as needed.) You own a portfolio that is invested 35 percent in Stock X, 20 percent in Stock Y, and 45 percent in Stock Z. The expected returns on these three stocks are 9 percent, 15 percent, and 12 percent, respectively. What is the expected return on the portfolio? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) Mark this question Select the following statement that describes non-overlapping events. A. Jon needs to roll an even number to win. When it's his turn, he rolls a two. B. Jon wants a face card so he can have a winning hand, and he receives the eight of clubs. C. Receiving the King of Hearts fulfills Jon's need of getting both a face card and a heart. D. To win, Jon needs a red card. He receives a Queen of Diamonds. Ben earns $13 per hour at Starbucks. When he works overtime, he earns time and a half. What is his regular pay for 40 hours of work? Chemical reactions can create more complex products. What evidence best explains this phenomenon? Larger macromolecules breakdown into smaller macromolecules and combine during the reaction. The basic need for oxygen makes the element essential to create macromolecules. Water molecules combine to form complex macromolecules that the body needs. The molecular structure of complex macromolecules show that a chemical reaction has occurred. I sell shoes for $250 per pair. They cost me $25 to produce. My markup on cost is:______ A. $2 B. 9096 C. 900% D. None of the above. solve for n+4 + n/6=16