1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
9

Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate

d without a proper shutdown. a. Event log b. Password log c. Word log d. Io.sys
Computers and Technology
1 answer:
Hoochie [10]3 years ago
7 0

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

You might be interested in
5 examples of a linear motion in object.
NNADVOKAT [17]

An example of linear motion is an athlete running 100m along a straight track. Linear motion is the most basic of all motion. ... Neglecting the rotation and other motions of the Earth, an example of linear motion is the ball thrown straight up and falling back straight down.


3 0
3 years ago
What could be the reasons of Blue Screen of Death on Windows computers?
muminat

Answer:

The reasons for  Blue Screen Of Death are as following:-

  1. Faulty Memory.
  2. Power Supply Issue.
  3. Overheating of Components.
  4. Malfunctioning Hardwares.
  5. Poorly coded device drivers.
  6. Hardware runnign beyond it's capacity.
  7. Bugs in the Operating System Kernel.

These are the some of the reasons why the blue screen of death is caused.

6 0
3 years ago
Which two graphs best represent the motion of an object falling freely?
larisa [96]
The graph would have to be pointing completely down to be falling freely.
4 0
3 years ago
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will b
ahrayia [7]

Mapping to the IP address of the logged-in user<u>-will detect  a credential theft</u>

<u></u>

Explanation:

In the "Domain Credential Filter" method the firewall matches the username and the password submitted by the user with the corporate user id and password.

In order to match the credentials submitted by the user the firewalls retrieves data from the bloom filter which is further connected  to windows  User-ID credential service add-on.

The firewall also looks in its Mapping Table for the IP address of the logged-in user

3 0
3 years ago
Identity any five system unit components and explain the use for each [apart from processor]<br>​
saw5 [17]

Answer:

RAM

ROM

PROCESSOR

MOTHER BOARD

HARD DISK

Explanation:

Random access memory or RAM store data temporary

Read only memory or ROM permanently store data and have a programming needed to start (PCs) or other electronic device

CPU or processor refers to brain of computer

Mother board the main internal hardware component of system unit

Hard disk is electro mechanical data storage

8 0
3 years ago
Other questions:
  • By defeaut, Excel cells are top aligned<br><br> a. True<br><br> b. False
    12·1 answer
  • The transitions between slides in a presentation are one type of powerpoint ____.
    6·1 answer
  • A risk handling technique in which the organization chooses to simply do nothing, as the cost of the risk being actualized is lo
    15·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • When a block of steel at 90 degrees Celsius is placed in a bucket of water at 30 degrees Celsius, what happens?
    10·1 answer
  • In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
    6·2 answers
  • When Adobe Photoshop was released for the first time? A: 1984 B: 1990 C: 1991 D: 1992
    8·1 answer
  • Four example of computer software?​
    15·1 answer
  • When creating a multi-dimensional array dynamically in C/C++ the Memory Manager will go to great pains to make sure the array is
    7·1 answer
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!