1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
10

Which of the following is *not* true about logging user and program actions on a computer?

Computers and Technology
1 answer:
Gemiola [76]3 years ago
3 0

Answer:

The correct answer is option b. "every action on a system is recorded in the kernel log".

Explanation:

Programming using linux kernel log levels is very helpful, because logs can inform about he state of daemon, or inform whether an error has occurred. However, is not true that every action on a system is recorded in the kernel log. Only certain information is found in the kernel log, which gives messages with different levels of severity, being the level 0 the most critical, and level 7 the less critical.

You might be interested in
Interest assessments are always accurate. True False
Brums [2.3K]

Answer:

False

Explanation:

3 0
3 years ago
wooooooooo helll yeaaa made it to ACE baby now road to whatever next, lil present imma be doing You tube soon soo ideas will be
vichka [17]

Answer:yo bro I don’t know but the answer is b

Explanation:

8 0
3 years ago
Read 2 more answers
Chat messages are most likely to be found where on a computer? firewall nic internet history ram
miv72 [106K]
<span>The answer is RAM.  Chat messages are most likely to be found in the RAM of the computer.  It is Random Access Memory.  </span><span>RAM is considered volatile memory, which means that the stored information is lost when there is no more power.</span>
3 0
3 years ago
How does coding work on computers?
sleet_krkn [62]
Coding works through programming/programs. Programs have different coding languages, and text files. The code within the file is known as the "source CODE" this code is used in different ways, causing for the possibility of separate binary files that computers can directly run. Hope I helped.

5 0
3 years ago
________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have
inn [45]

Answer:

The answer to this question is "Password".

Explanation:

In computer science, any User's computer and networks and server is secured with the password to access all we use the password. for example, if we want to access any WiFi system or any User's computer. Then we will insert the password. If the password is wrong so we can't access the WiFi system or User's computer. similarly, If we want to access any server so we must know about the password. Then we use the server and change it's setting.

So the password is the primary means of authentication for all User's.  

4 0
3 years ago
Other questions:
  • How fast can the winds blow in a tornado?
    8·2 answers
  • Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research
    11·1 answer
  • Where could an identity thief access your personal information?
    13·1 answer
  • Effective display designs must provide all the necessary data in the proper sequence to carry out the task. Identify a recent pe
    12·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • What are the routes through with Virus transmitted into computer<br>system?​
    15·1 answer
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
  • How to write the algorithm to calculate the square of five numbers
    14·2 answers
  • Which statement correctly describes the difference between an IP address and a MAC address for a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!