Question
(II) The scheme is a blueprint of all objects in the domain of windows 2000.
Which of the following is true?
a.
only (I)
b.
only (II)
c.
both (I) and (II)
d.
none of the above
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. (I) Each object in the active directory of windows 2000 has an access control list. (II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the...
Similar Questions
Discover Related MCQs
Q. With reference to cluster analysis in data mining, a distance measure that is NOT used is:
View solution
Q. In a mobile communication system, a geographic region is divided into cells. For each frequency set, there is a buffer ............... wide where that frequency is not used.
View solution
Q. Identify the incorrect statement:
View solution
Q. Consider a typical mobile communication system. If 840 frequencies are available, how many can be used in a given cell?
View solution
Q. Identify the incorrect statement :
View solution
Q. Dimensional modeling in Data mining refers to:
View solution
Q. The U-NII(Unlicensed National Information Infrastructure) band operates at the ............. frequency.
View solution
Q. Which digital radio technology employs an N=1 frequency-reuse plan?
View solution
Q. The frequency band allocated for the downlink in GSM is:
View solution
Q. Which of the following is an EDI standard?
View solution
Q. An INT file in Windows 95 is:
View solution
Q. Link analysis operation in data mining uses.......................technique.
View solution
Q. The maximum size of SMS in IS-95 is..............octets.
View solution
Q. MMS (Multimedia Messaging Service) uses ............... types of messages to perform messaging transactions.
View solution
Q. Downflow is the process associated with .................. and backup of data in a warehouse.
View solution
Q. Predictive modelling in data mining uses .................. technique.
View solution
Q. The use of smart card represents a form of:
View solution
Q. Which of the following is a EDI standard?
View solution
Q. Analysis of large database to retrieve information is called:
View solution
Q. PVM and MPI Library functions are implemented on the top of the:
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Current Trends and Technologies? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!