1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
2 years ago
7

which tool in administrative tools should you open if you want to view messages to troubleshoot errors? a. resource monitor b. e

vent viewer c. task scheduler d. system information
Computers and Technology
1 answer:
VikaD [51]2 years ago
4 0

A tool in administrative tools which you should open if you want to view messages to troubleshoot errors is an: b. event viewer.

<h3>What is an operating system?</h3>

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

<h3>What is an event viewer?</h3>

An event viewer can be defined as an administrative tool that is found in all versions of Windows Operating System (OS) which is designed and developed to enable administrators and end users in viewing the event logs of software application and system messages such as errors on a local or remote machine.

In this context, we can reasonably infer and logically deduce that an event viewer is a tool in administrative tools which you should open if you want to view messages to troubleshoot errors.

Read more on event viewer here: brainly.com/question/14166392

#SPJ1

You might be interested in
Give five examples of physical networking.
Vika [28.1K]

Answer:

Local area network (LAN), Wide area network (WAN), Metropolitan area network (MAN), Personal area network (PAN), Others

Explanation:

Others can be classified as peer to peer, bluetooth

6 0
3 years ago
What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
Arisa [49]
The answer is copyright like for example if you copy and paste a essay offline and don’t give credit to the author it called copyright
7 0
3 years ago
Read 2 more answers
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
Thomas Hill claims that a fruitful way to think about the badness of destroying the environment is
viktelen [127]
To think about what kind of human would choose to destroy the earth.To appeal to theories about God and care for the earth.To examine people’s intuitions about whether it is right to harmthe environment.To examine the rights that belong to the environment and act on<span>the basis of those rights</span>
3 0
3 years ago
9. The monumental failure of Atari's E.T Extra-terrestrial was, among other things, due to the fact that ______________
nlexa [21]

Answer:

c

Explanation:

5 0
3 years ago
Other questions:
  • Is I5 9100 is better than i5 9400
    6·1 answer
  • A(n) _____ can be used to convert digitized documents into ascii (american standard code for information interchange) text that
    6·1 answer
  • What is the<br><br> stored program concept?
    8·1 answer
  • Which piston stroke of the four-stroke cycle prepares the fuel mixture for combustion??
    8·1 answer
  • An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
    6·2 answers
  • What is an overview of your opinion of Digital Etiquette? Do not look it up bc I will know!
    7·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • Write a program (using functions) starting from directives to compute and display the transpose of a matrix of dimension m x n.
    13·1 answer
  • Only need help on f and correct me if im wrong for the other questions please
    11·1 answer
  • How do we calculate the BMI in python? <br> the formula is kg/m²
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!