answersLogoWhite

0

📱

Microsoft Windows

Windows is a consumer and enterprise grade family of operating systems developed by Microsoft Corporation. First released in 1985, it has become the best-selling operating system in computer history, and has 90% of the total operating system market.

18,535 Questions

Difference between a Local Group Policy and a Domain Group Policy?

Microsoft recommends that access control to computer resources be administered by using groups. In this way, many users that have similar needs for resources can be dropped into a group that has the correct permissions already configured instead of individually modifying each user account.

Group permissions to access resources are configured using group policy. A policy usually addresses one very specific aspect of a system's configuration. There are many policies that can be configured for a group to control system access and behavior.

Local group policy addresses only users who are physically logging into one particular machine such as the server itself or a stand alone operating system. To log into a machine locally, a user must create a unique ID/Password pair that authenticates the local user to the local physical system. Once authenticated to the local physical machine, group policy according to which local group the user is assigned is initiated.

Domain authentication as well as domain group policy is maintained centrally by the server for the domain. Even if a user has configured a local ID/Password pair for their local physical computer, a different and unique ID/Password pair is created to log onto the domain. When a domain user is created, they also must be assigned to a domain group. Once the server for the domain authenticates the domain user, the policy for the domain group the user belongs to is initiated. These policies are centrally administered by the domain administrator instead of each computer in the domain being configured separately for each user. Domain group policy can be configured to control access and behavior for any resource on the entire domain including resources on client computers. Local group policy can only control what is on the local machine at which a user is sitting. Finally, domain group policy supersedes any local group policy.

How do you setup a Computer to Computer Workgroup?

if its windows xp right click on my computer, then select properties, then click on computer name tab then on the network id button and change the workgroup in the workgroup box. Any computer you want to be in the workgroup you need to make sure all those computers say the same thing

Is Microsoft Office 2003 compatible with Windows NT 4.0?

Windows NT 3.51 lacks the common controls of Windows NT 4 and Windows 95 (basic graphical elemnts of each window, like buttons and scrollbars). This is because it is designed to have the interface of Windows 3.1. Installing "newshell", an alpha version of the Windows NT 4 / Windows 95 interface, should provide the necessary components. The installer may do a version check to make sure you are running NT 4 or later, but I doubt it will.

What are the Five tasks of a user of a personal computer?

Due to the overall Naivety of Computer users worldwide, the duties of said users are not defined. Therefore the only real requirements of a computer user are to be able to turn on the computer and monitor. Additional requirements are often imposed on users under the age of 13, often including that they be able to ignorantly slander anyone they come in contact with on the internet

How do you convert a while loop to do-while loop?

A for loop is classified as an iteration statement. A simple example might be...

For x = 1 To 10

'loop body

Next x

The same loop expressed as a while loop (classified as a control flow statement) could be...

x = 0

Do While x < 11

'loop body

x = x + 1

Loop

.

How do you fix a computer with a buffering problem?

how do i fix buffering problem. A technician has now uppedthe power to 3000mg. But I am still have the same problem of constant rebuffering on anything that is streamed. Is there a program that can fix this? Do I need yet more power? Thanks, MNP

Answer

To fix this issue visit the Microsoft kb

Answer:

Most of computer problems occur along with registry problems. So you'd better select a professional registry repair program for your Windows PC as soon as possible.

Diff between windows and Windows?

One is made out of glass and often (but not always) used as a component in a shelter and/or building. The other is made out of mathematics and usually stored in a non physical form on a device which a computer may read from and understand.
WindowsTM is an OS and a window is a plate of glass.

On your computer, any application and any dialog box that you have running will be running in a "window" Often the window will have a frame (but it does not have to).

How do you find my computer's system info?

For PC, simply typing "system information" in the start menu search bar will bring up a program titled "system information", containing all information one could need about the system they are running.

How does a server differ from a typical PC?

The difference between a desktop computer and a is in the components. A desktop is just a computer while a workstation will contain all the basic components used in an office like a computer, telephone, printer and so much more.

What is the name of the head cook Keebler elf who makes magic cookies?

his name is unicorn because unicorns are magical and his oarents wanted his name to be magical which would make him magical so his name is unicorn.

What operating system was used before Microsoft was invented?

hi,

First of all let me tell you one thing that before Microsoft there was very little scope for personal computers and softwares related to those computers. Still there were some softwares and software building programming languages. FORTRAN or formula translation, the first high level programming language, was invented by John Backus for IBM, in 1954, and released commercially, in 1957. It is still used today for programming scientific and mathematical applications. Fortran began as a digital code interpreter for the IBM 701 and was originally named Speedcoding. John Backus wanted a programming language closer to human language, which is the definition of a high level language.

At that time the softwares available were Aldus Pagemaker, Trillian, Wordstar, Computer Chess, VisiCalc Spreadsheet. WordStar - The First Word Processor Released in 1979 by Micropro International, WordStar was the first commercially successful word processing software program produced for microcomputers and the best selling software program of the early eighties. first desktop publishing program was created by Paul Brainard and a company called Aldus, the program called "Aldus Pagemaker 1.0" was released in July, 1985 for the "Macintosh" and in December, 1986, for the "IBM". If you go with the history of operating system than previously there was nothing except UNIX.

How many bits are bit addressable in the internal RAM and what is the range of the address?

Of the 128-byte internal RAM of the 8051, only 16 bytes are bit-addressable. The rest must be accessed in byte format. The bit-addressable RAM locations are 20H to 2FH.

Where can you download the latest version of windows messenger?

MSN Messenger now known as Windows Live Messenger can be downloaded as a free download from many sites such as CNET and Tucows. They have an excellent reputation for providing free and shareware programs without added surprises such as viruses and trojans.

What state are cmos setting usually placed after a bios update?

To the contrary, it depends on the motherboard. For example, with Gigabyte motherboards, the current settings can be maintained even during a flash update of the BIOS. This is probably accomplished by virtue of the fact that unlike most other manufacturers, Gigabyte uses two BIOS chips on the board so that in case one goes bad or a flash update goes awry, the backup will either take over and operate the machine or it will erase and repopulated the primary with a copy of itself to get the machine restored to proper operation.

So, if you use Gigabyte and select the option to keep the settings, it will do so. With other manufacturers, Idisjunction is correct that the BIOS will most often be set back to defaults, thus requiring you to go back into the BIOS to make whatever settings changes you had before to get things back to normal.

What are some types of file extensions used to store text?

.txt is the usual extension used with text files. There is also .rtf (rich text format) and .html (hypertext markup language) which are stored in plain text format, although they are not specifically text files.

Where is a document saved?

They are stored wherever the user wants to save them to. There is usually a default folder to save them to that can be set in the options in Excel. Normally it is the user's My Documents folder. It can be changed and the user is free to save a file wherever they want to if they don't want it to go to the default folder, so there is no single answer to the question.

How can you take everything off of an old computer and reinstall Windows 98?

You can take off applications that you want to keep but you must have a good means of storing that application like with a zip drive or flash USB storage device. Can I ask a question, what do you mean when you say "take everything off" in computer terms that means a "format" which means you will be formatting your hard drive which will remove EVERYTHING, I mean start you from the beginning. This means you will not have an operating system and will need to reinstall Windows to get back going, but be mindful, EVERYTHING you had on that computer will be erased.

LOTS Better Find yourself a "zero-fill" utility. There are plenty of free ones online; most of the major hard drive makers supply one with every drive they sell. The "zero-fill" utility should be on a bootable disk, be it a CD-ROM or a floppy, depending on your system. Run the "zero-fill" utility on your PC. Be patient! It takes time to write billions of zeroes! When the "zero-fill" utility is finished, your hard drive will be in the condition it enjoyed the day it left the factory.

To install Windows 98, you should have both an installation CD and a bootable floppy. If your system will boot from a CD (most will these days), you won't need the floppy. Insert the CD or floppy disk, turn the thing on, and you're off to the races.

Why does your DVD player skip?

Two possible things I can think of off hand. The first is that the sled is hanging up or that the laser's out of focus. Oh, and here's a third, it may be that the laser or associated circuitry gone bad.

What does oem means in Windows OS?

It stands for 'original equipment manufacturer'. It's not just applied to computers.

Where does windows store windows media player music data?

u have to click windows live and go to my computer and u will see a disc slot u click that and put a disck in and there u have your disk music

What kind of encryption is used with 802.11n?

WEP is kind of old so I'm guessing WPA or WPA2

Moose

The original standard released in 1999 was WEP. WEP uses the stream cipher RC4 for confidentiality. Exploitable weaknesses in this protocol prompted the development of WPA.

WPA was introduced as an interim solution while the 802.11i standard was developed. WPA added Temporal Key Integrity Protocol (TKIP) to WEP. TKIP encryption replaces WEP's 40-bit or 128-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP is a 128-bit per-packet key, meaning that it dynamically generates a new key for each packet and thus prevents collisions.

WPA2 - also known as IEEE 802.11i-2004 replaced the TKIP encryption protocol of WPA with CCMP to provide additional security. CCMP is an AES-based encryption mechanism that is stronger than TKIP. (CCMP is sometimes referred to simply as AES instead of CCMP.) Equipment developed under 802.11i was backwards compatible with earlier equipment and supported the use of WPA and WEP.

802.11n requires AES encryption to be enabled on WLANs used by 802.11n clients.