Why are there so few steps to secure
default IIS in Windows Server 2019?

Answers

Answer 1

The few steps to secure default IIS in Windows Server 2019 are:

Select the run window and type “inetmgr” After that  press enter to open IIS web server in the windows system. Go to  Default Document Option.Then select your site. Provide Default Page Name. Set Top in Priority Order.

What is the  Web Server (IIS) role in Windows Server 2019 ?

Web Server (IIS)  which is in the Windows Server 2019  helps to give secure as well as easy-to-manage, modular and extensible platform .

This platform gives a reliably hosting websites and  services, and applications.

It should be noted that Microsoft Internet Information Server (IIS) has been adopted globally and is been used especially in the enterprise, even though it posses less-than-stellar reputation for security.

However, there has been great improvement in the Microsoft's web server solution over the years.

Learn more about Windows Server  on:

https://brainly.com/question/12510017

#SPJ1


Related Questions

What would be an ideal scenario for using edge computing solutions?

Answers

An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

What is Edge computing ?

Edge computing can be regarded as the process that involves the  analyes as well as the, and storage of data closer to where it is generated .

This is been done to  enable rapid analysis and response in the process that is been used by some companies  to have consolidated operations , hence, An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

Learn more about edge computing solutions on:

https://brainly.com/question/23858023

#SPJ1

Enterprise software is designed for organizations to __________.

Answers

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?

Answers

The troubleshooting step that you should take next is to Question User.

What is Troubleshooting?

This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.

Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.

Read more about troubleshooting here:

https://brainly.com/question/13818690

#SPJ1

How the (i)?? Help me to slove this

Answers

Answer:

#include <fstream>

 ifstream inFile("bookBorrower.txt");

 ofstream outFiles ("overPayment.txt");

Explanation:

fstream has ifstream and ofstream for input and output, respectively.

Why multiprocessing operating system is more suitable for modern life?

Answers

Answer:

multiple processors and they are connected with the physical memory computer buses clocks and periprial devices the main objective of using a multiprocessor operating system is to increase the exclusion speed of the system and consume high computing power

Which statement describes an advantage of DevOps

Answers

The correct statement that describes an advantage of DevOps is that  It enables the capability to continuously release software with high confidence.

What are the advantages of DevOps?

Teams who are known to fully uses DevOps practices are known to be one that often functions more smarter and also more faster, and they tend to deliver a good and better quality to their customers.

Note that there is an increased use of automation and also that of cross-functional collaboration that tends to lower complexity and errors.

Hence, The correct statement that describes an advantage of DevOps is that  It enables the capability to continuously release software with high confidence.

See options below

A) It allows for a slower and more reasonable time frame for making fixes in production mode.

B) It enables the capability to continuously release software with high confidence.

C) It promotes individual efforts for both development and operations.

D) It provides a clear separation between application methods and infrastructure methods.

E) None of these

Learn more about DevOps from

https://brainly.com/question/24306632

#SPJ1

USPS stuck on "We are preparing your order for shipment" for 3 days. What does this mean?

Answers

What the message  "We are preparing your order for shipment" for 3 days means is that it is stuck on a loop.

What is a loop in computer science?

In programming the word loop is used to refer to the fact that an instruction or a sequence is repeated for a period that is longer or than is necessary. In order for this to change, certain modifications may have to be done on the program, else it may continue to run till it gets to when it is completed.

The condition would then be checked in order to show that it has been able to reach the prescribed number that it was supposed to for the message to terminate.

Read more on loops here: https://brainly.com/question/16922594

#SPJ1

If you had to tell that employee why it was not a good idea to send that e-mail, which of the following would you mention? (select all that apply)
The language was not professional.
The e-mail was not work-related.
The e-mail did not include an appropriate greeting.
The e-mail shows that the employee has been surfing the Internet instead of working.

the answers are A,B, and D. thats the only way I can give the answers on brainly.

Answers

The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Check more about email below.

What is non work email?

In Email Management Guidelines, the term non-work related emails are known to be “those that are not related to either private or government business.

Note that if one is sent this email during working hours, one is obligated to live it and not open it.

Hence, The options that need to be mentioned are:

The language was not professional.The e-mail was not work-related.The e-mail shows that the employee has been surfing the Internet instead of working.

Learn more about email from

https://brainly.com/question/24688558

#SPJ1

13. Document the purpose of the
Managed pipeline mode settings.

Answers

The purpose of the Managed pipeline mode settings is to enable backward compatibility.

What is a Managed Pipeline?

This refers to the process that is in use in most CMS systems to process and direct sales that would be made at a later date.

Hence, we can see that when using a managed pipeline, the mode settings have the function to enable backward compatibility and the queue length can be set by using the "Queue Length" option

Read more about backward compatibility here:

https://brainly.com/question/13684627

#SPJ1

Which of the following is a key feature of a relational database?

A) It has high scalability and performance that can enable almost unlimited growth
B) It has flexible data models that make it easy to store and combine
data of any structure and allow dynamic changes to the schema.
C) It is designed for highly available systems that should provide a consistent, high-quality experience for all users globally
D) It uses primary keys and foreign keys as a means to provide
efficient access to data and is supported directly in the database
rather than maintained in the application code.

Answers

It uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code.

Explanation: Relational databases use an expressive query language, make efficient use of indexes within the database, ensure strong consistency, and fit well within an enterprise management system. Non-relational databases have a flexible data model, have high scalability, and performance, and have always-on global deployments.

The statement which describes a key feature of a relational database is that it uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code. Thus, the correct option for this question is D.

What is a Relational database?

A relational database may be defined as a collection of information that organizes data in predefined relationships where data is stored in one or more tables or relations of columns and rows, making it easy to see and understand how different data structures relate to each other.

The key features of a relational database may include atomicity, consistency, isolation, durability, data consistency, flexibility, togetherness, data sharing, independence, etc. Each relation (table) must have a unique field that describes each record. This unique field is called a primary key.

Thus, the correct option for this question is D.

To learn more about Relational databases, refer to the link:

https://brainly.com/question/13262352

#SPJ2


[tex] { \green \bigstar}\rm \: Convert \: ( \: 268.75 \: )_{10} \: into \: binary \: equivalent. \: [/tex]






Thank uh ~​

Answers

[tex]\huge\underline{\underline{\boxed{\mathbb {SOLUTION:}}}}[/tex]

Divide 268 by 2, keeping notice of the quotient and the remainder. You will have to keep dividing the quotient by 2 until you get a quotient of zero as shown below:

[tex]\small\longrightarrow \sf{\dfrac{268}{2} =134 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{134}{2} = \: 67 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{67}{2} = \: 33 \: R \: 1 }[/tex]

[tex]\small\longrightarrow \sf{\dfrac{33}{2} = \: 16 \: R \: 1}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{16}{2} = \: 8 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{8}{2} = \: 4 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{4}{2} = \: 2 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{2}{2} = 1 \: R \: 0}[/tex]

[tex]\small\longrightarrow \sf{\dfrac{1}{2} = \: 0 \: R \: 1}[/tex]

Writing out the remainder from bottom to top will give 100001100.

Multiply the decimal 0.75 by 2 and keep noting down by integer values as shown:

[tex]\sf\longrightarrow{\small 0.75 \cdot 2 = 1.5 = 1 + 0.5}[/tex]

[tex]\sf\longrightarrow{\small 0.5 \cdot 2 = 1.0 = 1 +0}[/tex]

The equivalent binary for 0.75 will be 0.11.

▪ [tex]\sf\longrightarrow{100001100 + 0.11 = 100001100.11}[/tex]



[tex]\huge\underline{\underline{\boxed{\mathbb {ANSWER:}}}}[/tex]

[tex]\large\boxed{\bm{100001100.11}}[/tex]

Write the Python code that will create a list with 50 elements. Populate (fill) the list using a
loop that will get an integer value from the user for each element in the list.

Answers

Answer:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

Explanation:

So there is a very useful object or class in python that is called range, and this is primarily used to traverse certain values using a for loop. The syntax is defined as:

"range(start, stop, increment)"

where start is included, stop is excluded, and increment is how much the value increases after each iteration, although it is an optional value, just like stop"

So if you simply do:

"range(a)"

the start value will default to 0

the end value will be equal to "a"

the increment will default to 1

If you provide the following values:

"range(a, b)"

start will be equal to "a"

end value will be equal to "b"

increment will default to 1

If you provide all three values as such:

range(a, b, c)

start, end, and increment will be assigned to the variable values in their respective order.

You don't need to know all these 3 cases for this example, but it's best ton know in case you need to do something similar but slightly different in the future.

So, since we want to fill a list with 50 elements, and we want user input, we can loop a code 50 times and ask them to input an integer value and then append it to the list.

To run a piece of code 50 times, we can simply do:

"

for _ in range(50)

"

the "_" variable will be assigned to numeric values from 0-49 (50 is excluded), so it will run 50 times. I named it "_", because we really don't need these numeric values, we just need the for loop so we can have the code run 50 times.

So the next thing to do is initialize an empty list which we will append values to. This can simply be done by writing:

"

integers = []

"

and the variable name can really be anything (besides keywords), but I think it's the most appropriate given the context

So in the for loop, we want to ask for input using the input function, which asks the user for input, and then returns the input they input. Using this, we want to convert it to an integer using int (this is technically not a function, it's a class, you may learn about this more later if you haven't but it's not necessary to know for now), which converts strings to integers.

So using this we get the following code:

"

integers = []

for _ in range(50):
   userInput = int(input("Input an integer: "))

   integers.append(userInput)

"

the variable isn't necessary and you could just directly do

"

integers.append(int(input("Input an integer: ")))

"

but it's really for somewhat better readability, but both are equally valid, since the second statement isn't really to complicated.

One thing to note, is if the user inputs a non-integer string, the code will raise an error.

   

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which is the FASTEST way to transfer a good file to the computer?

Answers

The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

What is C$ administrative share?

The c$ share is known to be a kind of an administrative share that is often known to be the cluster or SVM administrator  that a person can be able to can use to be able to go through and manage the SVM root volume.

Note that The characteristics of the c$ share are the path for this kind of admin. share is known to be always the path to the SVM root volume and it is one that a person cannot modify.

Hence, based on the above, the The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

Learn more about file share from

https://brainly.com/question/15267859

#SPJ1

John is directing a television series. He has to shoot a scene that presents the lead character in a dominating and commanding position. What shooting technique should he use?
A.
low angle
B.
high angle
C.
Dutch tilt
D.
front angle

Answers

answer is high angle so it hits better lighting

Which statement about broadcasting a slideshow online is true?

All transitions are properly displayed to the audience when broadcasting online.
Broadcasting a slideshow online is not an option for most PowerPoint users.
Third-party desktop sharing software must be used to broadcast online.
PowerPoint has a free, built-in service for broadcasting online.

Answers

The statement about broadcasting a slideshow online that is true is D. PowerPoint has a free, built-in service for broadcasting online.

What is a Slideshow?

This refers to the presentation feature in a presentation-based system or software that makes use of images, and diagrams moving sequentially in a pre-timed manner.

Hence, we can see that based on the broadcast of slideshows online, one can see that the true statement from the list of options is option D which states that PowerPoint has a free, built-in service for broadcasting online.

Read more about slideshows here:

https://brainly.com/question/23427121

#SPJ1

what are the ways to deal with stress from workplace​

Answers

Answer:

alcohol

Explanation:

speaking from experience

The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the network.

Answers

Answer:

Save of data is the answer

During the reverse engineering process, a is
performed which identifies the design elements and principles incorporated into
the product design.

Structural Analysis
O Functional Analysis
O Visual Analysis
O Design Analysis

Answers

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

What is reverse engineering process?

Reverse engineering process involves putting or separating into parts an already made equipment or machines.

It can be done in aircraft, structural designs and many other products. It  is done to generate information on materials and design that is used in fabricating a design.

It make use of visual observation and analysis for it judgement and data collection.

Therefore,

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

Learn more on engineering below

https://brainly.com/question/17169621

#SPJ1

1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
10,9,8,7,6,5,4,3,2,1 – Worst case - Sorted in reverse order
1,3,2,5,4,7,9 ,6,8,10 – Avg case – numbers are in random order

For the given numbers, please use the following algorithms (bubble sort, insertion sort & selection
sort) to sort in ascending order. Please also find out number of comparisons and data movements
for each algorithm. Based on comparisons and data movements please rate algorithm for each input
case.

Answers

Using the knowledge in computational language in python it is possible to write a code that from a random number draw creates an order of increasing numbers

Writting the code in python:

def shellSort(array, n):

   # Rearrange elements at each n/2, n/4, n/8, ... intervals

   interval = n // 2

   while interval > 0:

       for i in range(interval, n):

           temp = array[i]

           j = i

           while j >= interval and array[j - interval] > temp:

               array[j] = array[j - interval]

               j -= interval

           array[j] = temp

       interval //= 2

data = [10,9,8,7,6,5,4,3,2,1]

size = len(data)

shellSort(data, size)

print('Sorted Array in Ascending Order:')

print(data)

See more about python at brainly.com/question/18502436

#SPJ1

You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person's BMI is calculated with the following formula: BMI = Weight × 703 ÷ Height²​

Answers

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

What is a flowchart?

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

What is a pseudocode?

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

//Ask user for height & weight//"Enter weight (in pounds):""Enter height (in inches"//Calculate the person's (BMI)//"BMI = weight * (703 / pow(height, 2));"//Display the person's (BMI)//

Read more on pseudocode here: https://brainly.com/question/13208346

#SPJ1

The main components of a computer ar a hardware and software b) disc and monitor c) system and unit d) communication devices. ​

Answers

Option A is the main component

What is computer viras? Loist 2 preventive measures against it​

Answers

A computer virus is a sort of malicious software, often known as malware, that travels across computers and causes data and software harm. Computer viruses are designed to cause system disruption, serious operational challenges, and data loss and leaking.

Types of Computer Viruses.

They include

Macro viruses – These are the largest of the three virus types.

Boot record infectors – These viruses are known also as boot viruses or system viruses.

File infectors – These viruses target

Thank you,

Eddie

For a lens with focal length f find the smallest distance possible between the object and its real image.​

Answers

Answer:

Ray optics and optical instruments show that the least possible distance between an object and its real image for convex lens is 4f where f is the focal length of lens

Assemble a client computer based on your programmed of study (e.g IT, CS, Business etc), discussing the type of components ( giving their exact names and functions) you would need and gives reasons why you need them

Answers

The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

The  reasons why I need the above hardware and software is because they are the one of the best in regards to IT and they will really help me a lot in regards to gaming and programming.

What is a client computer in regards to computer?

The term client computer is known to be one that is often used at home and also in corporate environment.

A  client is seen as an kind of computer hardware or software device that is known to often needs access to a service that is said to be provided by a server. Clients are known to be the requesting program or the user that is in a client-server base.

Therefore, The assembly of client computer based on IT  are:

The monitor -  Acer Nitro XV282K KVbmiipruzx The CPU -  64-Core TR 3990XThe mouse - Logitech MX Master 3Voltage regulator- APC Line-R Automatic Voltage RegulatorSolar battery - Tesla Powerwall 2.Microsoft office 365

Learn more client computer from

https://brainly.com/question/14753529

#SPJ1

Which term describes a Cloud provider allowing more than one company to share or rent the same server?

Answers

The term which describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy

The term that describes a cloud provider allowing more than one company to share or rent the same server is known as Multitenancy.

What is a cloud?

A third-party business offering a cloud-based platform, infrastructure, application, or storage services is known as a cloud service provider.

Companies often only pay for the cloud services they use, as business demands dictate, similar to how a homeowner would pay for a utility like electricity or gas.

Data for each renter is separated and inaccessible to other tenants. Users have their own space in a multi-tenant cloud system to store their projects and data. Multi-tenant cloud system helps in the clouding of private and public sectors.

Thus, Multitenancy is the term used to describe a cloud service that permits many businesses to share or rent the same server.

To learn more about cloud, refer to the link:

https://brainly.com/question/27960113

#SPJ2

Security hardware and software that control access to a company’s intranet and other internal networks is called a(n):_________

Answers

Answer:Firewall

Explanation:


Question 9
The boom in collaboration between U.S. companies and workforces in India created a
need for blank

Answers

Answer:

Outsourcing

Explanation:

The boom in collaboration between U.S. companies and workforces in India created a need for Outsourcing.

I believe this is correct, but I'm not 100% certain.

4:when a computer is on it is
normally termed......
A:information
B:programming
C:running ↓

Answers

Answer:

c: running

Explanation:

when the computer is turned on The operating system keeps things organized in the background so that multiple programs can run at the same time

can
Vehicles equipped with Anti-Lock Brakes (ABS)
stop in shorter distances than vehicles without ABS

Answers

No. Vehicles equipped with Anti-Lock Brakes cannot stop at shorter distances than vehicles without ABS.

A user tells you that microsoft word gives errors when saving a file. what should you do next?

Answers

Answer:try to change the name of the file not adding any symbols not accepted as file, or try to change the destination of the file, ex. an external usb. Or double check if the destination folder is not full.

Explanation:

errors when saving may occur because of the above

Other Questions
How does american society define family, parenting, childhood, and happiness? be sure to incorporate jennifer senior's ted talk into your answer 3Select the correct answer.What is the inverse of the function f(x)=19/x2 On a frictionless, horizontal air track. the glider has a head-on collision with a 0. 300-kg glider that is moving to the left with a speed of 2. 20 m>s. Find the final velocity? The budget at completion (bac) is the sum of all budgeted values established for the work to be performed on a project. as such it is equivalent to:______. Identify the sentence as an example of either an active or a passive voice:The hunter was attacked by the hawk.Active voicePassive voice The liturgy refers to the set order of services and structure of each service. a. true b. false Triangle Angle Sum Theorem What geographical knowledge did the white elites have that the slaves did not? what was the ""deliberate strategy"" of white elites regarding slaves geographical intelligence and why? Consider a circle whose equation is x2 + y2 2x 8 = 0. Which statements are true? Select three options. The radius of the circle is 3 units. The center of the circle lies on the x-axis. The center of the circle lies on the y-axis. The standard form of the equation is (x 1) + y = 3. The radius of this circle is the same as the radius of the circle whose equation is x + y = 9. How many strings of 12ternary digits (0, 1, or 2) are there that contain exactly three 0s, five 1s, and four 2s? given the graph of the function f(x)=1/x2 write the equation g(x)horizontal compression by 1/5 vertical stretch by a factor of 7reflection in y-axis translation 10 units left and 1 unit down Find the equation of the line using exact numbers Sam has 3/4 ton of stones to divide evenly among for sidewalks. how much stone will it be used in each sidewalk The bpm development cycle is essentially a one-shot process where the requirement is to get it right the first time. a. true b. false 3 precent of X is 10 What is the molality of a solution containing 3. 0 moles of nacl and 100. 0 moles of water? Pilars taco trucks sells about 400 various tacos per day for an average price of $5. on average, each tacos cost $3 (includes labor, materials and miscellaneous), pilars profit margin is? Eukaryotic cells have their chromosomes packaged in the ________. Eukaryotic cells have their chromosomes packaged in the ________. nucleus centriole nucleolus Golgi apparatus 15. Michael, the art elective programme student,is working on another assignment. He designs arectangular pattern measuring 45 mm by 42 mm.He is required to use identical rectangular patterns toform a square. The maximum area of the squareallowed is 1.6 m.(i) How many patterns does he need to form thesmallest square?(ii) What are the dimensions of the largest squarethat he can form? Which of the following is a correct example of global warming creating a positive feedback Group of answer choices Ice has a higher albedo than water so replacing ice with water causes the surface to warm. Ice has a lower albedo than water so replacing ice with water causes the surface to warm. More water evaporating will create more low level clouds causing the surface to warm. Less water evaporating will create more low level clouds causing the surface to warm.