I think the answer should be answer D.
Answer:
The system’s non-user-specific configurations are stored in the HKEY_LO-
CAL_MACHINE root key of the Registry.
Explanation:
The security Log is your Answer.
Answer:
The answer is "Option a".
Explanation:
The B.I. is a method, methodology, software, and development set that makes raw data usable and relevant, which facilitates improved decision-making and competitive opportunities, and certain choices were wrong, which can be described as follows:
- In option b, The A.I is uses in the machines, that's why it is not correct.
- In option c, It is used to analyze the data, which used in business. that's why it is not correct.
- In option d, It is wrong, because it a part of A.I.