1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
12

E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the

end of a specified time frame.​
Computers and Technology
1 answer:
Karolina [17]3 years ago
7 0
E-mail administrators may make use of Circular Logging which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​Circular logging<span> is a method or feature used to conserve hard disk space by overwriting individual log files, thus keeping the transactional  log to a minimum.</span>
You might be interested in
The acronym LAH stands for
Nina [5.8K]
D.Limited Access Highway
5 0
3 years ago
Read 2 more answers
3.5 Code Practice: Question 1<br> (Website: Edhesive)
igor_vitrenko [27]
Sorry the website wasn’t working for me
3 0
3 years ago
Part B - Find the solutions for the following Case Study Real World Problems by applying the appropriate concepts that you learn
Monica [59]

Answer:

ok very surprised to hear that

5 0
3 years ago
Collaborative filtering is
vazorg [7]

Answer:

A: used by ISP's to filter out email SPAM

C: a way to help an individual focus on best choices when deciding what to watch or buy.

Explanation:

Collaborative filtering uses a community-based approach to filter spam. It works by collecting numerous email users from around the world. By doing this, it becomes possible for users to flag emails that are spam and those that are legitimate.

Also Collaborative Filtering is one of the most efficient techniques for building a system that can help a user when it comes to recommending best choices based on information from a large number of users.

4 0
3 years ago
Bye guys imma k.ill myself for real this time.
oksano4ka [1.4K]

Answer:

bro no- why?

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ can interpret physical addressing information.
    11·1 answer
  • Which of the following statements about the OSI is FALSE?A. The OSI model encourages modular design in networking.B. Each protoc
    8·1 answer
  • Which of the following payment types require you to pay upfront A. Money order and credit card B. Money orders and prepaid card
    9·2 answers
  • Your boss wants to utilize some sort of cloud storage for his files so that all of his
    10·2 answers
  • True or false A ClassB fire involves live electrical equipment
    5·1 answer
  • How do new sources of power assist in the development of inventions?
    15·1 answer
  • When a formula contains the address of a cell, it is called a(n) ________.
    15·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another s
    5·1 answer
  • 6.What does transgenic mean?​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!