1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
4 years ago
7

_____, which are generated by web server software, record a user's actions on a web site. viruses log files junk e-mails worms

Computers and Technology
1 answer:
algol134 years ago
5 0
<span>Log files, which are generated by web server software, record a user's actions on a web site.
</span>The log file contains a list of events and actions, which have been "logged" by a computer. These events can be events that occur in the operating system, events in the software, messages between different users, accessed <span>Web sites...</span>
It is a parameter that gives feedback about the activity and performance of the server.
You might be interested in
1.Which one of the following buttons returns a window to its original size?
Ber [7]

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

7 0
3 years ago
How do ACLs work on a router?
serg [7]

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

6 0
3 years ago
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
Phantasy [73]

Answer:

Port scan targeting 192.168.1.106.

Explanation:

In the following question, there is some part of the question and options is missing.

In the following statement, when a file log is taken from the computer system which has Internet Protocol address is given in the statement and by the further details of the statement in which time and the port destination by examine those details of the Internet Protocol, the following port scan targeting the IP address 192.168.1.106.

3 0
3 years ago
Binary numbers can be shifted left or right to alter their value.
Hoochie [10]
Maybe try “01110011”
6 0
3 years ago
If something is copyrighted,
Over [174]
D. because you can’t copy a movie with credit, you have to have permission
7 0
4 years ago
Other questions:
  • A search engine displays a list of webpage names that contain the search text. what is the term for that list?
    14·1 answer
  • Telecommunications devices transmit data in the form of electrical signals. what is the technical term that we use for these sig
    14·2 answers
  • Data mining must usestatistics to analyze data.<br> True<br> False
    12·1 answer
  • What is an icon or animation used to represent a participant in an internet chat referred to as
    15·2 answers
  • I’m which part of a profession email should you try to be brief, but highly descriptive
    7·1 answer
  • What does limited access to a document mean? A. It makes a document inaccessible without a password. B. It enables a person to m
    7·1 answer
  • The function of an audio mixer is to _____. layer audio tracks at their ideal volume combine, control, and route audio signals f
    6·1 answer
  • Which option is the primary means of communication for coauthors working on PowerPoint presentations?
    10·1 answer
  • Melissa is working on her Cell class by adding new methods. However, in her most recent version, she is receiving errors in some
    14·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!