Hi, I just have a few questions from my digital tech assignment.

1. ___ domain indicates that the computer or DNS name does not exist.

2. Why are users able to log on to any computer in a domain?

A. because they do not need an account for each computer
B. because all computers act as workstations and servers
C. because they can reconfigure or update hardware without turning off the system
D. because networks use names to make accessing nodes easier

3. Describe, step by step, how to create an account for a computer on the domain controller.

Answers

Answer 1

Answer:

b

Explanation:

i took the test my self

Answer 2

Answer:

for number one you put system in the blank

Explanation:


Related Questions

ASAP
Which of the following explains why giving directions to a location is suitable for creating an algorithm?
1. An algorithm provides step-by-step instructions.
2. An algorithm is written in computer code.
3. An algorithm gives different steps each time it is used.
4. An algorithm posts directions on a website.

Answers

Answer:

The answer is A

Explanation:

al·go·rithm

noun

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

"a basic algorithm for division"

(a step-by-step tutorial or guide)

Answer:

A

Explanation:

A student builds a model of her bedroom. The scale is 1:25. In the scale model, the students bed is 3 inches long. How long is the students actual bed?

Answers

Answer:

The student’s actual bed is 75 inches long

Explanation:

Here in this question, we want to find out the length of the student’s actual bed.

The ratio of the model to the real is 1:25

Let the actual length of the bed be x inches

Thus;

1/25 = 3/x

By cross multiplying

1 * x = 3 * 25

x = 75 inches

Why does a business need to use effective strategies to find a solution for a problem?
- to thoroughly understand the problem
-to find several solutions to a problem
-to properly diagram the flow of information to solve the problem
- to find a solution that cannot be replicated​

Answers

Answer:

to properly diagram the flow of information to solve the problem

Explanation: 99% sure this is it

A business needs to use effective strategies to find a solution for a problem for several reasons. First, using effective strategies can help the business thoroughly understand the problem they are trying to solve.

What is business?

Business refers to an organization or an individual engaged in commercial, industrial, or professional activities with the aim of generating profit.

A business typically involves buying or producing goods or services and selling them for a profit to consumers or other businesses.

For a number of reasons, a firm has to adopt efficient methods to resolve a problem. First, employing successful tactics can aid a company in fully comprehending the issue at hand, as well as its underlying causes, potential effects, and potential solutions.

This may result in more focused and successful attempts to solve problems.

Second, excellent tactics can assist the company in locating and assessing a number of potential fixes for the issue, enabling them to select the ideal course of action in light of their particular requirements and circumstances.

Thus, finding a solution that can be replicated is often desirable, as it can help the business avoid similar problems in the future and streamline their operations.

For more details regarding business, visit:

https://brainly.com/question/15826604

#SPJ2

What is the very first step that should be taken when performing work with a computer?
A. You should back up any important data.
B. You should ground yourself.
C. You should power down the system and unplug it.
D. The components should be removed.

Answers

Answer: A back up data.

Explanation:

When connecting past and present issues, it is best to follow a series of steps. Which step is missing from the pattern? 1. Identify common issues in the past and the present. 2. Research supporting evidence. 3. __________ 4. Make connections. 5. Draw conclusions. A. Prepare an analysis report. B. Establish cause and effect. C. Validate the outcomes of the two events. D. Compose a policy to improve future issues. Please select the best answer from the choices provided A B C D

Answers

Establish Cause & Effect

Answer:

Establish Cause & Effect

Explanation:

What is authentication?
А
The process of converting data that has been converted into an unreadable form of text back to its original form
B
The process of converting data into an unreadable form of text
С
O
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
D
The process of providing proof that a transaction occurred between identified parties

Answers

Answer:

C

Explanation:

I believe that's the answer if it's not sorry

Which of the following is a unique feature of Object-oriented programming?
O They have syntax.
O They are web-based.
O They use objects that contain data and functions.
O They are interpreted by compilers into binary machine language.

Answers

Answer:

the answer is they used objects that contain data and function ( code)

Answer:

answer is C :)

Explanation:

When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a file for future use, even after the computer has been turned off.

Answers

Answer:

Memory.

Explanation:

When someone refers to "space" on a computer or device, they are usually referring to memory, which allows the user to save a file for future use, even after the computer has been turned off.

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. There are basically two (2) main types of memory;

1. Read only memory (ROM).

2. Random access memory (RAM).

Answer: Secondary Storage

Explanation: Source: trust me bro

What is the range of the set of ordered points defined below?
{(1,0), (2,0), (3, 0), (4,0), (5,0)}
A
{0, 1, 2, 3, 4, 5)
B
{1,6,3,4,5)
c С
{4}
D
{0}

Answers

Answer: D, 0

Explanation: The range is the set of y values therefore all the y values are equal to 0, thus making the answer 0. Hope this helps you.

The correct answer is D

What is the analysis stage in System development life cycle?

Answers

Answer:

Explanation:

end user business requirements are analyzed and project goals converted into the defined system functions that the organization intends to develop. The three primary activities involved in the analysis phase are as follows: Gathering business requirement. Creating process diagrams.

A person with a kinesthetic learning style learns best by
a. reading and writing.
b. moving around and interacting with objects.
c. working with numbers and patterns.
d. independent study.

Answers

B. Moving around and interacting with objects. Is the answer

what is a computer program

Answers

A computer program is a collection of instructions that can be executed by a computer to perform a specific task. A computer program is usually written by a computer programmer in a programming language.

What is the main purpose of broadcasting via satellite? A. To enable signal reception at night B. To convert analog signals to digital signals C. To enable signal reception over a wider area D. To strengthen and improve the quality of the signal

Answers

Answer:

The answer is "Option C".

Explanation:

Satellite transmission is a content distribution program, that utilizes digital signals to transmit from satellites that receive parabolic antennas widely known as satellite dishes. It's a  low noise block generator for transmitted to cooling. It also allows the user it accepts single in a wide area, and the wrong choice can be defined as follows:

In choice a, It allows the uses to receive a signal at all times, that's why it is wrong. In choice b, It provides digital signals,  that's why it is wrong. In choice d, It is wrong because it always provides quality signals.  

 

Which of the following statements are true about the growth of technology? Select 3 options. A. Individuals in the United States currently own an average of three connected devices. B. The general public began connecting to the Internet when the World Wide Web was introduced in 1991. C. By 1995, almost half of the world’s population was connected to the Internet. D. Currently, 67% of people on earth use at least one mobile device. E. The number of devices connected to the Internet of Things is expected to triple between 2018 and 2023.

Answers

Answer:

b

Explanation:

the general public began connecting to the internet when the world wide web was introduced

Answer:

The general public began connecting to the Internet when the World Wide Web was introduced in 1991.

By 1995, almost half of the world’s population was connected to the Internet.

Currently, 67% of people on earth use at least one mobile device.

Explanation:

what is the term for sending emails that imitate legitimate companies?

Answers

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

Select the correct answer.
Ben wants to reduce the file size of an image in his document. Which feature of a word processing program will help him do so?

Answers

Answer:

COMPRESS, THIS WILL MAKE IT INTO A ZIP

Explanation:

ASAP please
What is an algorithm?
1. a way to make an informed judgment
2. used only on a computer
3. used only with map directions
4. a set of directions for problem solving

Answers

I think it’s 4


a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Answer:

Answer is D :)

Explanation:

using media allows us to:
A. Contribute and create
B. Isolate ourselves from others.
C. Avoid distractions and fun
D. Be completely passive
(I will give brainlist!!!)

Answers

Answer: "Contribute and Create"

Explanation: While, yes, technology and digital media does tend to isolate us from the real world, it is a great tool for contributing to society!

Which number is equivalent to 3e-2?
3
0.3
O 30
my
0.03

Answers

Answer:

0.03

Explanation:

Edge 2020

0.03  is equivalent to 3e-2. Therefore option D is correct.

The notation 3e-2 represents 3 times 10 raised to the power of -2.

In scientific notation, the "e" indicates the exponent, which represents the number of places the decimal point must be moved to obtain the original value.

In this case, the exponent is -2, so we move the decimal point two places to the left.

Thus, 3e-2 is equivalent to 0.03. Option D (0.03) is the correct choice, as it represents the same value as 3e-2, which is three hundredths or 3/100.

Therefore option D 0.03 is correct.

know more about decimal points:

https://brainly.com/question/28338004

#SPJ6

how do you get people to add you?

Answers

Answer:

go to their profile and click the person icon and done

Explanation:

which binary number is the greatest?
11011
11001
11100
11010
11000

Answers

Answer:

the third one

Explanation:

the rest is below 28 apart from the third one which is 28 and is the most

Convert the following into binary system
and vice versa.
106​

Answers

It would be 1101010 in binary
It would be 1101010, I think

2.4 Code Practice: Question 2

Write a program that accepts a number as input, and prints just the decimal portion. Your program should also work if a negative number is inputted by the user.

Enter a number: 15.789
Sample Output
0.789

Can someone please help me with this because I’m so stuck

Answers

The code is in Java.

It calculates the decimal portion of a number by subtracting the integer portion from the number. It also uses if structure to check if the number is a negative one.

Comments are used to explain each line of code.

//Main.java

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

 //Initialize the Scanner object to be able to get input

 Scanner input = new Scanner(System.in);

 

 //Declare the variables

 double number, decimalPortion;

 

 //Ask the user to enter a number

 System.out.print("Enter a number: ");

 number = input.nextDouble();

 

 //Get the decimal portion of the number by subtracting the integer part from the number

 decimalPortion = number - (int) number;

 

 //If the number is negative one, multiply the decimal portion with -1 to convert it to a positive value

 if(number < 0)

     decimalPortion *= -1;

 

 //Print the decimal portion

 System.out.println(decimalPortion);

 

}

}

You may see a similar question in the following link:

brainly.com/question/17132559

what is one way to avoid computer-related health problems?(1 Point) a.Always use a track pad instead of a mouse. b.Position your computer so it faces a window. c.Look closely at the computer screen at all times to maintain your concentration level. d.Take frequent breaks that include moving around and stretching. Answer:__________-(/>.<)/

Answers

D. Take frequent breaks that include moving around and stretching.

PLZ HELP 50 points. 4. How did Debevec and his team keep Emily from looking like a plaster mannequin?

Answers

Answer: Debevec and his team kept Emily from looking like a plastic mannequin by capturing her in a wide variety of facial expressions, and simulating the facial muscle movements in the animation software.

Explanation:

Which of these tools can best be used as a self assessment for career planning purposes? a personality test an asset analysis a self-directed learning experience a goal development checklist

Answers

Answer:

C - a self-directed learning experience

Explanation:

The tool that can best be used as a self-assessment for career planning purposes is a self-directed learning experience. Thus the correct option is C.

What is a Career?

A career is referred to what an individual chooses as a profession to earn something. A career of an individual is based on his talents, skills, and abilities which help him to seek growth and development and achieve the goals of life.

Self-directed learning encourages the organic growth of personality, creativity, persistence, and life happiness. It promotes students' options, independence, ambition, and the development of various abilities for lifetime learning.

Finding your skills, values, hobbies, and interests is the first step in the career development process. From there, one may decide what kinds of roles might be interesting to both you and a good fit.

Therefore, option C is appropriate.

Learn more about career, here:

https://brainly.com/question/2160579

#SPJ2

is montior a visual display unit?​

Answers

Yes, definitely.
Thank you!

Hope fixes her mistake and comes up with this list. A 2 column table with 5 rows. Column 1 is labeled Gas with entries Argon, Carbon dioxide, Nitrogen, Oxygen, Other gases. Column 2 is labeled Percentage with entries .93, .04, 78, 21, .03. She thinks it is a good idea to list the gases based on the amount of the gas found in the atmosphere from largest to smallest percentage. Which options would she need to apply to do this? Check all that apply. Use the Text option. Use the Paragraph option. Use the Header Row option. Use the Descending option. Use the Percentage Field option.

Answers

It's the last 3. I'm too tired to say anything else so here's a photo.

Complete the sentence. refers to the increasing accessibility of technology, allowing more people to access information, create content, and develop applications,​

Answers

Answer:

I'm pretty sure your answer is  democratization of technology

Explanation:

The democratization of technology refers to the process by which access to technology rapidly continues to become more accessible to more people.

Answer:

democratization of technology: the increasing accessibility of technology, allowing more people to access and create content and applications

Explanation:

edge 2022

Which of the following best describes the difference between software and hardware?


A Hardware is the outside of the computer; software is the material on the inside of a computer.

B Hardware is the material produced by the computer like a business letter; software is the information in the computer.

D Hardware is the equipment; software is the instructions given to the equipment in order for the equipment to perform a task.

C Software is the equipment; hardware are the programs that run the software.

Answers

Answer:

D. Hardware is the equipment; software is the instructions given to the equipment in order for the equipment to perform a task

Explanation:

Hardware is the actual part while Software is the program that operates the Hardware

Other Questions
Martin Luther's 95 Theses led to whichreligious movement?A. The Great SchismB. The CrusadesC. The Protestant Reformation The value of GG for the conversion of glucose-6-phosphate to fructose-6-phosphate (F6P) is +1.67 kJ/mol+1.67 kJ/mol . If the concentration of glucose-6-phosphate at equilibrium is 2.95 mM2.95 mM , what is the concentration of fructose-6-phosphate? Assume a temperature of 25.0C25.0C . What two central ideas about revenge does Bacon develop over the course of the text? (Passage tittle is Of Revenge) Coastal wetlands are ecologically important because they do all of which of the following a. reduce the impact of storms coming inland b. harbor a low level of biodiversity c. help to destroy nutrients d. provide important habitats for only terrestrial species e. repel large aquatic reptiles How did the emperor constantine help the spread of christianity Convert this rate to feet per second. Round your answer to nearest tenth the average speed of a car on a stretch of the interstate is 70 miles per hour. State any eight point about China Rose. Red blood cells need iron. They store iron and typically contain more iron than the fluid around them does. Whichaction would show the blood cells doing active transport?O pushing iron outO bringing iron inO swellingO shrinking The parent or caregiver who is doing the abusing usually doesn't exhibit any signs that they arebeing abusive.A TRUEB FALSE Find surface area of the regular pyramid plz help ASAP Find the coordinates of the midpoint of XY for X(-2,3) and T(-8,-9) Suppose A and B are points. How many distinct lines contain both A and B?123infinitely many A complex movement is made up of what two types of movement? Kinda confused!! need help!! 1. How can we learn to really focus on the music all around us? The Black Codes were: The length of a rectangle is twice the width. The perimeter is 48in. Find the dimensions of the rectangle. Which statement below correctly identifies the number of subatomic particles inside and outside the nucleus of an argon atom?There are 40 particles inside the nucleus and 18 particles outside the nucleus.There are 40 particles inside the nucleus and 22 particles outside the nucleus.There are 40 particles inside the nucleus and 40 particles outside the nucleus.There are 18 particles inside the nucleus and 18 particles outside the nucleus. [tex]\huge\red{\sf Question :}[/tex]Describe in brief the various types of teeth in humans. Add a note on dental formula of man. WILL MARK BRAINLIESTIf a + b = 10, and ab = 16, then find the value of the following: i .a2 + b2 ii. a3 b3