1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
12

Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det

ected malware?
a. Departmental reports
b. System logs
c. Scheduled reports
d. Financial report
Computers and Technology
2 answers:
Marrrta [24]3 years ago
6 0

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

Umnica [9.8K]3 years ago
5 0
The answer is B System Logs
You might be interested in
Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
andriy [413]

Binary values are used to denote the 'ON' and 'OFF' state of a computer. The 'ON' state is denoted by the binary value '1'

  • The 'ON' state of a computer represents the mode when the computer system is running and can be used to perform computing operations.

  • The binary values '0' and '1' are used to designate the ON and OFF state.

  • When the computer is ON, it is designated by the binary value 1 ; while the OFF state is designated by the binary value 0.

Therefore, the number which signifies the ON state of a computer is 1.

Learn more :brainly.com/question/4722254

4 0
2 years ago
Why is it important to minimize cable clutter in a rack?
V125BC [204]

Answer: Cable clutter is the mess created due to cables of the operating system units in the rack.The reduction in the cable clutter is important because it make the computing environment clear and prevent the blockage in flow of air, reducing the litter in rack environment etc  

The clearance of the cable clutter can be done with the help of cable managers for collecting the cables and tying them into one section, organizing and clearing the cabinets of rack.

8 0
3 years ago
If a program compiles fine, but it produces an incorrect result, then the program suffers from _______________.
tatiyna
In my answer I am making an assumption that there is no runtime error, if there is then the error is “a run-time error”.

The answer is the program suffers from a Logic Error
5 0
3 years ago
Write a program that inputs numbers and keeps a
rjkz [21]

I've included my code in the picture below. Best of luck.

3 0
3 years ago
Which is a circuit board located behind an LCD screen on a laptop?
mina [271]

Answer:

Inverter is an electronic circuit that is located behind the LCD screen on a laptop.

Explanation:

Inverter is an electronic device that is used to convert DC voltage into AC voltage. This will lead to control the output power that is required to Liquid Crystal display. The Output power is limit up to the requirement of Florescent light that are used in Liquid crystal display to make picture visible.

This Inverter is just behind the LCD in laptop to control the lights on the display of screen.

4 0
3 years ago
Other questions:
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • What does limited access to a document mean?
    14·2 answers
  • if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake
    10·1 answer
  • When you perform an in-place upgrade to windows 8.1 from windows 7, what will be names of the “windows” folders in windows 7 and
    5·1 answer
  • 0x400C (in hexadecimal)?
    8·1 answer
  • This morning when Paul turned on his computer at work, it would not boot. Instead, Paul reported that he heard a loud clicking n
    15·1 answer
  • Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are th
    6·1 answer
  • Complete the following sentence.
    12·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
  • Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!