1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
14

In Windows, the log that stores events from a single application or component rather than events that might have system wide imp

act is the ____________ log. Application System Forwarded events Applications and services
Computers and Technology
1 answer:
Lina20 [59]3 years ago
5 0

Answer: Application and service  logs

Explanation:

The Application and service logs consist of the following types:

Admin logs

Operational logs

Analytic logs

 Debug logs.

Each of the logs have its own specific function to store the events from a single application or component.

You might be interested in
When you start an online course, what should you do to make sure you have access to college resources
VARVARA [1.3K]

As a student starting an online course, you should explore the college website to make sure you have access to college resources.

<h3>What is an online course?</h3>

An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.

As a student starting an online course, you should do the following to make sure you have access to college resources:

  • Explore the college website.
  • Bookmark links to your course.
  • Search for information with regards to advising, degree requirements, and financial aid.

Read more on online course here: brainly.com/question/14591988

#SPJ1

3 0
2 years ago
WOULD SOMEONE PLEASE ANSWER THIS IVE ASKED TWICE ALREADY!
Rainbow [258]
I think that’s right, hope it helps!:) brainliest??

7 0
3 years ago
Examine the efficiency the various recovery algorithms used in deadlock handling
sineoko [7]

Solution:

The process of transaction can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g; two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture, the deadlock problem becomes even worse because multiple transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a gl obal transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes.

This is the required answer.

4 0
3 years ago
Svieta is making a chart of the hours that different employees have put into a team project at work. What formula would AutoSum
grin007 [14]

Answer:

Its =SUM(B2:B7)

The worksheet range B2:B7 means B2, B3, B3, B4.....,B7.

And for finding the sum of all these cells we need to make use of the SUM, but we need to place the = sign at first, and then all aggregate function will be listed in dropdown, and then we need to pick the SUM from there, and mention the worksheet range as above to define the cells which we want to include in the formula.  

Explanation:

The answer does not require any further explanation.

8 0
3 years ago
Which is an ipsec protocol that authenticates that packets received were sent from the source?
fiasKO [112]

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

6 0
3 years ago
Other questions:
  • I need the alphabet quickly! sorry bad with remembering!
    10·1 answer
  • How many possible mac addresses are there?
    5·1 answer
  • A large flowing network of streams and rivers moving across a land area is a ______________________.
    15·1 answer
  • To activate a wizard to help in creating combo boxes and command buttons, make sure the ____ button is selected
    6·1 answer
  • This is C++
    10·1 answer
  • Budget at completion<br><br> What does this measurement tell you?
    8·1 answer
  • Write a program that creates a Date object, sets its elapsed time to 10000, 100000, 1000000, 10000000, 100000000, 1000000000, 10
    9·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • I’m trying to make the button change random colors every time you hover over it, yet I can’t seem to understand the procedure...
    8·1 answer
  • Give short answers.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!