1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
12

E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the

end of a specified time frame.​
Computers and Technology
1 answer:
Karolina [17]3 years ago
7 0
E-mail administrators may make use of Circular Logging which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​Circular logging<span> is a method or feature used to conserve hard disk space by overwriting individual log files, thus keeping the transactional  log to a minimum.</span>
You might be interested in
The search engine that makes it easy to find high-quality Web resources by combining Internet technology with traditional librar
mart [117]

Answer:

Digital reference

Explanation:

An abstract index is a form of service that provide shortened or summarized contents of documents and assign of descriptors for referencing documents.

A virtual library is an online database of text, images, audio, video, or and other digital contents.

A periodical database finds use when you want to find articles on personal topics of interest in magazines, journals, or newspapers.

Digital reference or virtual reference is a service by which a library reference service is conducted online.

4 0
3 years ago
Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consis
Helga [31]

Answer:

Explanation:

The language I use would do it as

h1$ = copy(h$,1,3)

This may not satisfy you, because your language could be quite different. You might want an input statement of some kind that would define h$. This assumes that somewhere h,h1 are declared as  strings.

You also have to know how to read an input. My language uses readln(input,h)

and how to write it on the screen write(h1) or writeln(h1)

6 0
3 years ago
Madison works for Google as an Ethical Hacker. Madison main job responsibility is
Ivenika [448]

Answer:

to evaluate the security and identify vulnerabilities of a business

Explanation:

Madison is an ethical hacker (white hat hacker), meaning she is hired by companies to make sure that "evil" hackers (black hat hackers) can't hack into their websites.

7 0
3 years ago
Read 2 more answers
Not everything is a success all of the time! So do you know which version of Windows was the least popular?
mario62 [17]

Answer:

windows xp

Explanation:

I think because it is not fast and don't play the games and programs which have higher requirements

7 0
3 years ago
A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
Reptile [31]

Answer:

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

Explanation:

using the direct mapping method

Number of lines = 512

block size = 8 words

word offset = log ^{8} _{2}  = 3 bit

index bit = log^{512}_{2}  = 9 bit

Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

8 0
4 years ago
Other questions:
  • Num = int(input("Enter a number: "))
    5·2 answers
  • What machine is considered by many to be the first all-programmable electronic digital computer?
    15·1 answer
  • Skinner designed a soundproof apparatus, often equipped with a lever or bar, with which he conducted his experiments in operant
    9·1 answer
  • What do you think of explaining to young people, from high school, the legitimacy of copyright and the dangers they can run on t
    11·1 answer
  • A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have d
    11·1 answer
  • I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
    13·1 answer
  • Splunk uses ________ to categorize the type of data being indexed..
    11·2 answers
  • Define foreign key. What is this concept used for?
    6·1 answer
  • Pls help I will give points
    7·1 answer
  • area of trapezium is 54cmsq if parallel sides are 10cm and 8cm long find the distance between the parallel sides​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!