123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Assigning Applications

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

When you assign an application to a user, the application is advertised to the CompTIA Network+ certification user on the Start menu the next time he or she logs on to a workstation, and local registry settings, including filename extensions, are updated. The application advertisement follows the user regardless of which physical computer he or she logs on to. This application is installed the first time the user activates the application on the computer, either by selecting the application on the Start menu or by opening a document associated with the application.
When you assign an application to the computer, the application is advertised, and the installation is performed when it is safe to do so. Typically, this happens when the computer starts up so that there are no competing processes running on the computer. Assigned software is fully installed the next time the computer is restarted.
When you publish an application to users, the application does not appear installed on the users' computers. No shortcuts are visible on the desktop or Start menu, and no updates are ...
... made to the local registry on the users' computers. Instead, published applications store their advertisement attributes in Active Directory. Then, information such as the application's name and file associations is exposed to the users in the Active Directory container. The application is available for the user to install by using Add Or Remove Programs in Control Panel or by clicking a file associated with the application (such as an .xls file for Microsoft Excel).
In which Event Viewer log can you find Group Policy failure and warning messages? What type of event log records should you look for?
You can find Group Policy failure and warning messages in the application event log. Event log records comptia certification training with the Userenv source pertain to Group Policy events.
2.What diagnostic log file can you generate to record detailed information about Group Policy processing and in what location is this file generated?
You can generate a diagnostic log to record detailed information about Group Policy processing to a log file named Userenv.log in the hidden folder %Systemroot%\Debug\Usermode.
3.Which of the following actions should you take if you attempt to open a Group Policy Object Editor console for an OU GPO and you receive the message Failed
To Open The Group Policy Object?
a.Check your permissions for the GPO.
b.Check network connectivity.
c.Check that the OU exists.
d.Check that No Override is set for the GPO.
e.Check that Block Policy Inheritance is set for the GPO.
The correct answer is b. The message Failed To Open The Group Policy Object indicates a networking problem, specifically a
Free A+ exam questions problem with the Domain Name System (DNS) configuration.

Total Views: 426Word Count: 442See All articles From Author

Add Comment

System/Network Administration Articles

1. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

2. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

3. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

4. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

5. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

6. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

7. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan

8. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan

9. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services

10. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare

11. Mtp Cables: Essential Guide To Fiber Optic Connectivity
Author: Ryan

12. Facts About Polarization Maintaining (pm) Patch Cables
Author: Ryan

13. 10 Essential Cyber Security Tips To Protect Your Data
Author: GIGABITTechnologies

14. Exploring Fibre Optic Coupler Types And Their Role In Modern Network Topologies
Author: Ryan

15. What Are It Infrastructure Security Services And Why Are They Important?
Author: GIGABITTechnologies

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: