Which Windows installation method requires the use of Windows deployment services (WDS)?
1. Network Installation
2. Repair Installation
3. Bootable flash drive installation
4. Unattended installation​

Answers

Answer 1

Answer:

1. Network Installation

Explanation:

Given

Options (1) to (4)

Required

Which requires WDS for installation

WDS are used for remote installations where users do not have to be physically present before installations can be done; in other words, it is necessary for network based installations.

Of all the given options, (a) is correct because without WDS, network installation cannot be done.


Related Questions

The process by which the kernel temporarily moves data from memory to a storage device is known as what?

Answers

Answer: Swapping

Explanation:

Swapping is referred to as the process by which the kernel temporarily moves data from memory to a storage device.

Swapping is simply a memory management scheme whereby the process can be swapped temporarily from the main memory to the secondary memory in order for the main memory to be available for other processes. Swapping is used for memory utilization.

What is the full form of USB​ ?

Answers

Answer:

universal serial bus: an external serial bus interface standard for connecting peripheral devices to a computer, as in a USB port or USB cable.

Explanation:

If x=50.7,y=25.3 and z is defined as integer z,calculate z=x+y​

Answers

Answer:

Ans: 76

Explanation:

z=x+y

=50•7 + 25•3

=76#

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. Which of the following is a step that the cloud administrator needs to perform as part of the move?
a. Migrate to an external DNS solution
b. Create a new VPC that will serve DNS needs for multiple other VPCs
c. Discontinue using DNS
d. Remove the DNS entries within the VPC that are no longer relevant

Answers

Answer:

Here the correct option is option b Create a new VPC that will serve DNS needs for multiple other VPCs.

Explanation:

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. It's not possible to maneuver an existing instance to a different subnet or VPC. Instead, you'll manually migrate the instance by creating a new VPC Image from the source instance.  

b. Create a new VPC that will serve DNS needs for multiple other VPCs

GENERATIONS OF
ACTIVITY 12
In tabular form differentiate the first four generations of computers.

Answers

Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that we use today.

5 Generations of Computer - Logo for the Webopedia Study Guide.The history of computer development is a computer science topic that is often used to reference the different generations of computing devices. Each one of the five generations of computers is characterized by a major technological development that fundamentally changed the way computers

Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using Excel over lists, paper files, or simple word documents? Summarize one thing in you home life that could be improved or more easily managed using Excel?​

Answers

Excel

Excel is a software program that contains spreadsheet. Spreadsheet is an electric document that works numbers and display results in graphs. There are vertical columns and horizontal rows.

they are several advantages of excel which is;

Excel is very efficient to use, especially when you have to calculate your data, it's not hard to calculate the computer itself calculates it for you.

they are also disadvantages of excel which is;

some users might get a little bit problem when you send Microsoft Excel, here is one sometimes the spreadsheet are difficult to share internally.

In which generation of computers are we in?​

Answers

It should be the Sixth generation

Write a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask user to guess number. Inform if high or low. Exit when entered number correct. Tell user how many tries it took to guess number.

Answers

Answer:

download the .txt file and change the file name to guess_number.py then run it in a python interpreter. I used Python 3.9.6 for this project and I used Visual Studio Code as my IDE.

Explanation:

The code has comments that tell you what is happening.

I hope this helped :) If it didn't please let me know what went wrong so I can fix it.

In a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask the user to guess the number.

What are programming used for?

The motive of programming is to discover a series of commands with the intention to automate the overall performance of a task (which may be as complicated as a running system) on a computer, regularly for fixing a given problem.

Import NumPy as np def main(): # Random variety Random Number = np.random.randint(1, 100) # A begin variable Start = Try.# This value is the handiest used to decide if the person has been known that the fee is excessive or low   High Or Low Message Displayed Already = False # Amount of guesses that the person were given incorrectly. Guess Gotten Wrong 0 # The general quantity of guess AmountOfGuesses = 0 # Beginning of some time loop in order to maintain the software jogging till the person guesses the random variety print("The fee is excessive") High Or Low Message DisplayedAlready = True Elif RandomNumber <= forty nine and High OrLow MessageDisplayedAlready == False:

           print("The fee is low")

           High Or Low Message Displayed Already = True.

AmountOfGuesses += print("Wrong! You have gotten " + str(GuessGottenWrong) + " guesses incorrect. main()

Read more about the program :

https://brainly.com/question/1538272

#SPJ2

Select the correct statement(s) regarding PONS. a. only MMF cables can be used, since MMF enables greater data capacities compared to SMF b. PONS systems require active amplifiers, since high frequency signals attenuate quickly over distance c. PONS systems use passive devices between OLT and ONT d. all are correct statements

Answers

Answer:

The correct statement regarding PONS is:

c. PONS systems use passive devices between OLT and ONT

Explanation:

PON means Passive Optical Network. Based on fiber-optic telecommunications technology, PON is used to deliver broadband network access to individual end-customers.  It enables a single fiber from a service provider to maintain an efficient broadband connection for multiple end-users (homes and small businesses).  OLT means Optical Line Terminal, while ONT means Optical Network Terminal.  They provide access to the PON.

DEFINITION of COMPONENT HARDWARE?

Answers

Answer: See explanation

Explanation:

Computer hardware refers to the physical parts of a computer, which includes the monitor, mouse, central processing unit (CPU), keyboard, computer data storage etc.

Hardware are the physical, computer devices, which helps in providing support for major functions like input, processing, output, and communication. The computer hardware is directed by the software to perform an instruction.

convert 198 / 61 to ratio​

Answers

I think the answer is

198:61

I'm not sure

Scenario You are a network engineer and it is your first day working with ASU and you have been given the job of creating a network for the IT program. You are given the following three tasks to complete. 1. Configure IP addressing settings on network devices. 2. Perform basic device configuration tasks on a router. 3. Verify Layer 3 connectivity via a routing protocol. 4. Setup some access control lists.

Answers

B because one cause…………………

There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object of D to perform some computations. Besides, C consists of two C1s and one C2 as subcomponents. Object of C2 is still reusable when its major component C is depleted. C1 has a method that takes in an object of E as argument. Which one is invalid

Answers

Answer:

are u in HS or college work

I am trying to understand

what is example of application of machine learning that can be imposed in eduction. (except brainly.)

Answers

Answer:

Machine Learning Examples

Recommendation Engines (Netflix)

Sorting, tagging and categorizing photos (Yelp)

Self-Driving Cars (Waymo)

Education (Duolingo)

Customer Lifetime Value (Asos)

Patient Sickness Predictions (KenSci)

Determining Credit Worthiness (Deserve)

Targeted Emails (Optimail)

Imagine you are trying to choose what restaurant to visit. You have a list of restaurants, each with a collection of star ratings. You also have a minimum standard; you will only go to a restaurant whose star rating is at least your minimum standard. Write a function called restaurant_rating. restaurant_rating has two parameters. The first is a dictionary, where the keys are restaurant names and the values are lists of ratings. The second parameter is your minimum rating. If a restaurant's average rating is above your minimum rating, you might visit it. If it is not, you won't. restaurant_rating should return a list of restaurants eligible for you to visit. That is, it should return a list of restaurant names from the dictionary whose average ratings (the average of the ratings in their lists) is greater than or equal to your minimum rating. This list should be sorted alphabetically. For example: rest_and_rating

Answers

Answer:

The function in Python is as follows:

def restaurant_rating(restaurants,minRatings):

   restaurantList = []

   for key in restaurants:

       if restaurants[key] >= minRatings:

           restaurantList.append(key)

           

   restaurantList.sort()

   return restaurantList

Explanation:

This declares the function

def restaurant_rating(restaurants,minRatings):

This initializes the list of eligible restaurants

   restaurantList = []

This iterates through the restaurant dictionary

   for key in restaurants:

If the ratings is greater than or equal to minimum ratings

       if restaurants[key] >= minRatings:

The restaurant name is appended to the restaurant list

           restaurantList.append(key)

Sort the eligible lists            

   restaurantList.sort()

Return the list

   return restaurantList

It's currently 1:00 in the afternoon. You want to schedule the myapp program to run automatically tomorrow at noon (12:00). What two at commands could you use

Answers

Answer:

at 12 pm tomorrow

at now +23 hours

Explanation:

The at command could be used in the command line to perform a scheduled command in Unix related systems. The at command coule be ua d to program a complex script or used to perform simple scheduled reminders.

The at command is initiated by first writing the at string followed by the condition or statement to be performed.

Currently (1:00 pm) ; To make a schedule for 12pm then that will be at noon the following day:

at 12:00 pm tomorrow

Or :

Using the number of hours between the current tone and the schedule time : 12 pm tomorrow - 1:00 pm today is a difference of 23 hours ;

Hence, it can be written as :

at +23 hours

Write a function gcdRecur(a, b) that implements this idea recursively. This function takes in two positive integers and returns one integer.
''def gcdRecur(a, b):
'''
a, b: positive integers
returns: a positive integer, the greatest common divisor of a & b.
'''
# Your code here
if b == 0:
return a
else:
return gcdRecur(b, a%b)
#Test Code
gcdRecur(88, 96)
gcdRecur(143, 78)
© 2021 GitHub, Inc.

Answers

Answer & Explanation:

The program you added to the question is correct, and it works fine; It only needs to be properly formatted.

So, the only thing I did to this solution is to re-write the program in your question properly.

def gcdRecur(a, b):

   if b == 0:

       return a

   else:

       return gcdRecur(b, a%b)

gcdRecur(88, 96)

gcdRecur(143, 78)

which animal is the computer to store data information and instruction ​

Answers

Answer:

human is the answwr of the quest

I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.

Answers

The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked

Write the correct statements for the above logic and syntax errors in program below.

#include
using namespace std;
void main()
{
int count = 0, count1 = 0, count2 = 0, count3 = 0;
mark = -9;
while (mark != -9)
{
cout << "insert marks of students in your class, enter -9 to stop entering";
cin >> mark;
count++;

if (mark >= 0 && mark <= 60);
count1 = count1 + 1;
else if (mark >= 61 && mark <= 70);
count2 = count2 + 1;
else if (mark >= 71 && mark <= 100);
count3 = count3 + 1;
}
cout <<"Report of MTS3013 course" << endl;
cout <<"Mark" << count << endl << endl;
cout << "0-60" << "\t\t\t\t" << count1 << endl;
cout << "61-70" << "\t\t\t\t" << count2 << endl;
cout << "71-100" << "\t\t\t\t" << count3 << endl<< endl << endl;
cout << "End of program";
}

Answers

Mark is gonna be the answer for question 1

How has Linux affected the market for proprietary software?​

Answers

Answer:

Linux is an operating system made up of free software, which can be installed and run on a wide variety of computer systems, from small devices such as mobile phones to large computer systems and supercomputers.

Linux is often offered to the user in various Linux distributions. A characteristic of the distributions is the great possibility of customization and selection that they offer since each one is aimed at a different type of user. Depending on the philosophy, each distribution can provide a greater foundation for ease of use, multimedia applications, ease of configuration, system simplicity, only free software, low resource requirements, and more.

Because of its low cost, high configurability and availability on various platforms, Linux is becoming increasingly popular not only among specialized users, but also among domestic users.

Use the Internet to research external storage devices. Find at least three devices, with a minimum storage size of 1 terabyte (TB), from three different manufacturers. Write a paragraph, IN YOUR WORDS, for each device explaining the features and benefits. Provide the retail cost and include a reference link to each device. Next, write

Answers

Hi, you've asked an incomplete question. However, I provided suggestions on getting the desired information.

Explanation:

Considering the fact that you are required to find information about not just the cost, but also the features and benefits of three storage devices having a minimum storage size of 1 terabyte, it is recommended that you check this on a reputable e-commerce site (eg Amazon).

There you could find information about their features and benefits, as well as customer feedback about their experience using these devices.

User-Defined Functions: Miles to track lapsOne lap around a standard high-school running track is exactly 0.25 miles. Define a function named MilesToLaps that takes a float as a parameter, representing the number of miles, and returns a float that represents the number of laps.Then, write a main program that takes a number of miles as an input, calls function MilesToLaps() to calculate the number of laps, and outputs the number of laps. Ex: If the inout is 1.5the output is 6.0 Ex: If the input is 2.2the output is 8.8 Your program should define and call a function Function Miles ToLaps(float userMiles) returns float userLaps 12 // Deine Milestola hert. 34 // Deine Minhert. Your code ust call llestola 5

Answers

Answer:

Explanation:

The following is written in Java. The MilesToLaps method creates a variable called laps and gives it the value of the input parameter miles divided by 0.25. Then it returns the variable laps to the user. In the main method a Scanner object was created and asks the user for the number of miles which are passed to the MilesToLaps method which returns the number of laps. This can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("How many miles?");

       float miles = in.nextFloat();

      System.out.println("This is " + MilesToLaps(miles) + " laps");

   }

   public static float MilesToLaps(float miles) {

       float laps = (float) (miles / 0.25);

       return laps;

   }

}

Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking.

Answers

Answer:

20

Explanation:

I hope it helps choose me the brainst

when describing a software lincense what does the phrase "open source" mean?

Answers

Open source is like we’re you can your your notes

Select the correct answer.
What testing approach does a development team use when testing the developed code rather than just the functionality of the code?
A.
white box testing
B.
black box testing
C.
acceptance testing
D.
usability testing

Answers

Answer:

D. usability testing

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis and requirements.

3. Software design and prototyping.

4. Development (coding).

5. Integration and testing

6. Deployment.

7. Operations and maintenance.

Usability testing is a testing technique used by a software development team to test a developed code rather than just the functionality of the code.

The main purpose of usability (user experience) testing is to determine how easy, user-friendly or difficult it is for end users (real people) to use a software application or program.

What are some of the advantages and disadvantages of connection-oriented WAN/Man as opposed to connection-less?

Answers

Answer and Explanation:

Connection oriented WAN/MAN as opposed to connection less network is a type of wide area network that requires communicating entities in the network to establish a dedicated connection for their communication before they start communicating. This type of network will use these established network layers only till they release it, typical of telephone networks.

Advantages include:

Connection is reliable and long.

Eliminates duplicate data issues.

Disadvantages include:

Resource allocation while establishing dedicated connection slows down speed and may not fully utilize network resources.

There are no plan B's for network congestion issues, albeit occurring rarely with this type of network.

Consider a system with seven processes: E, F, G, H, I, J, K and six resources: U, V, W, X, Y, Z. Process E holds U and wants V. Process F holds nothing but wants W. Process G holds nothing but wants V. Process H holds X and wants V and W. Process I holds W and wants Y. Process J holds Z and wants V. Process K holds Y and wants X. Is this system deadlocked?

a. Yes
b. No

Answers

Answer:

a. Yes

Explanation:

System is deadlock due to process HIK. Process H holds X and wants V and W. Process I holds W and wants Y. Process K holds Y and wants X. The system will become deadlock due to these three different processes.

What are the advantages of using a database management system (DBMS) over using file-based data storage?

Answers

Answer:

Advantage of DBMS over file system

No redundant data: Redundancy removed by data normalization. No data duplication saves storage and improves access time.

Data Consistency and Integrity: As we discussed earlier the root cause of data inconsistency is data redundancy, since data normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it

Data Security: It is easier to apply access constraints in database systems so that only authorized user is able to access the data. Each user has a different set of access thus data is secured from the issues such as identity theft, data leaks and misuse of data.

Privacy: Limited access means privacy of data.

Easy access to data – Database systems manages data in such a way so that the data is easily accessible with fast response times.

Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data in case of a failure.

Flexible: Database systems are more flexible than file processing systems

Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subject. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?

a. DAC
b. RBAC
c. MAC
d. TSAC

Answers

Answer: RBAC

Explanation:

The access control methods that Kareem's company uses us the role based access control.

The Role-based access control (RBAC) simply means assigning permissions to users based on the role that such individual plays within an organization.

RBAC is a simple approach to access management and is typically less prone to error than in a scenario whereby permissions are assigned to users individually. Access rights are given to the workers based on what their job entails and what is needed and other information which isn't needed won't be accessible to them.

Other Questions
What is the business reason for China Noahs potential currency exposure? Does the company really need to subject itself to substantial exchange rate risk? Is the risk "material" to China Noah? Do you think China Noah should hedge? I always try to get out of doing the dishes.a. Its my favorite chore. b. I enjoy doing the dishes. c. Its my least favorite chore. d. I often do the dishes. Plant assets sometimes are purchased as a group in a single transaction for a lump-sum price. This transaction is called a __________, or group, bulk, or basket purchase. A woman gave birth 48 hours ago to a healthy infant girl. She has decided to do not breastfeeding. During your assessment you notice that both of her breasts are swollen, warm, and tender on palpation. The woman should be advised that this condition can best be treated by: poema de la naturaleza de 3 estrofas y cuatro versos que no sea de gogle What is the value of a? Please help hurry! Find the lateral surface area of the instant oatmeal container. Round your answer to the nearest hundredth. SA = in2 You need 675 mL of a 90% alcohol solution. On hand, you have a 25% alcohol mixture. How much of the 25% alcohol mixture and pure alcohol will you need to obtain the desired solution? Which of these best describes how to reduce wordiness in this sentence?? X ^2 + 2x + y + 6y = 15 PLEASE HELP ASAP PLEASE!!!!!!! Find the measure of GE.A. 20B. 14C. 15D. 16 Why is kristallnacht important when studying the Holocaust? SCREAMING HELP ALERT !! What is the equation of the parabola shown in the graph? compare and contrast the conflict and functionalist apporach to deviance a car gets 27 miles per gallon in the city and 35 miles per gallon on the highway. what range of miles can the car travel on 3 gallons of gas 18 Geometry question: Use an algebraic equation to find the measure of each angle that is representative in terms of X 70. We each other one day while John a bookin the library and i down beside him a. Met / was reading / sat c. Meet / is reading / have sat b. Had met / was reading / had sat d. Will meet / reads / sat Dilbert invests a total of $26,000 in two accounts paying 14% and 2% annual interest, respectively. How much was invested in each account if, after one year, the total interest was $2,560.00 A plastic dowel has a Young's Modulus of 1.50 1010 N/m2. Assume the dowel will break if more than 1.50 108 N/m2 is exerted. What is the maximum force (in kN) that can be applied to the dowel assuming a diameter of 2.30 cm? A. 52.3 kN B. 62.3 kN C. 72.3 kN D. 42.3 N