1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
10

Which of the following is *not* true about logging user and program actions on a computer?

Computers and Technology
1 answer:
Gemiola [76]3 years ago
3 0

Answer:

The correct answer is option b. "every action on a system is recorded in the kernel log".

Explanation:

Programming using linux kernel log levels is very helpful, because logs can inform about he state of daemon, or inform whether an error has occurred. However, is not true that every action on a system is recorded in the kernel log. Only certain information is found in the kernel log, which gives messages with different levels of severity, being the level 0 the most critical, and level 7 the less critical.

You might be interested in
Write a program that uses an "if" statement to determine if the number is greater than one. If the number is greater than 1, the
Vsevolod [243]

Answer:

if(i>1)

{

Console.WriteLine(i*i);

Console.WriteLine(i*i*i);

}

Explanation:

This is written in C#, and it's probably not as clean as it could be. I'm not sure what language you wanted it in, so I just picked the one I'm most familiar with.

7 0
3 years ago
Please solve in 5 mins very fast​
Dmitriy789 [7]

Answer:

a. virtual reality

b. Master Boot Records

c. Primary function of a router

d. zoom

Explanation:

4 0
3 years ago
Read 2 more answers
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
2 years ago
Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with e
docker41 [41]

Answer:

8/9

Explanation:

i remember this question on my daughters book

8 0
3 years ago
Other questions:
  • How do the following improve security <br> User Id <br> Password<br> Encryption
    10·2 answers
  • What is my credit card billing zip code??
    15·1 answer
  • Ar count = 10;
    13·1 answer
  • A speaker takes a variety of information from the results of a web search, and puts it together in an outline to make up his spe
    8·1 answer
  • Muultimedia Promo try answer this question and explaining them or give examples of that topic Thanks
    10·1 answer
  • A high school in a low-income area offers special programs to help students acquire the technical skills needed to find jobs as
    12·1 answer
  • What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digita
    5·1 answer
  • Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what a
    14·1 answer
  • Refers to the capacity to form bonds with particular
    11·2 answers
  • Create a simple JavaScript calculator.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!