adplus-dvertising
frame-decoration

Question

(I) Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000.

Which of the following is true?

a.

only (I)

b.

only (II)

c.

both (I) and (II)

d.

none of the above

Answer: (c).both (I) and (II)

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. (I) Each object in the active directory of windows 2000 has an access control list. (II) The scheme is a blueprint of all objects in the domain of windows 2000. Which of the...

Similar Questions

Discover Related MCQs

Q. With reference to cluster analysis in data mining, a distance measure that is NOT used is:

Q. In a mobile communication system, a geographic region is divided into cells. For each frequency set, there is a buffer ............... wide where that frequency is not used.

Q. Identify the incorrect statement:

Q. Consider a typical mobile communication system. If 840 frequencies are available, how many can be used in a given cell?

Q. Identify the incorrect statement :

Q. Dimensional modeling  in Data mining refers to:

Q. The U-NII(Unlicensed National Information Infrastructure) band operates at the ............. frequency.

Q. Which digital radio technology employs an N=1 frequency-reuse plan?

Q. The frequency band allocated for the downlink in GSM is:

Q. Which of the following is an EDI standard?

Q. An INT file in Windows 95 is:

Q. Link analysis operation in data mining uses.......................technique.

Q. The maximum size of SMS in IS-95 is..............octets.

Q. MMS (Multimedia Messaging Service) uses ............... types of messages to perform messaging transactions.

Q. Downflow is the process associated with .................. and backup of data in a warehouse.

Q. Predictive modelling in data mining uses .................. technique.

Q. The use of smart card represents a form of:

Q. Which of the following is a EDI standard?

Q. Analysis of large database to retrieve information is called:

Q. PVM and MPI Library functions are implemented on the top of the: