____ are used in Microsoft operating systems to provide a consistent working environment for one or more users.
A. Environments
B. Settings
C. Templates
D. Profiles
Answer: D
Computer Science & Information Technology
You might also like to view...
Java programs communicate with databases using what API?
a. DBMS. b. JDBC. c. RDBMS. d. Database.
Computer Science & Information Technology
?Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?
A. ?Messages from the IDS are routed to the network security team B. ?The IDS warns the firewall of suspicious traffic C. The network router sends traffic to the firewall as well as to the IDS D. Network security team decides to block traffic from that IP address
Computer Science & Information Technology