1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
9

Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate

d without a proper shutdown. a. Event log b. Password log c. Word log d. Io.sys
Computers and Technology
1 answer:
Hoochie [10]3 years ago
7 0

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

You might be interested in
Is playing hockey output force or input force?
LUCKY_DIMON [66]

Answer:

Input

Explanation:

got it right on a edunuity test

7 0
3 years ago
Read 2 more answers
Another personal question- are there any messaging sites that MIGHT work if most things are blocked via the school? I doubt anyt
noname [10]

Answer:

sort of

Explanation:

all the sites that allow you to message other people, even bots ,are all blocked , if youre trying to talk to a friend try sharing a google doc

8 0
3 years ago
Read 2 more answers
Service Level Agreements are considered the most comprehensive way to fully measure service desk performance. TRUEOR FALSE
icang [17]
Since a service level agreement is between the service provider and the client I would say yes. The feedback for products or services can help the company to ensure that they are selling to the max quality of the products.
3 0
4 years ago
You company has decided to start using AppLocker GPOs to control application access. Jeff, Stormwind’s IT Manager, would like to
miv72 [106K]

Answer:

In the Group Policy Manager, enforce the new AppLocker policy in Audit Only mode.

Explanation:

The organization has chosen to run employing AppLocker GPOs to secure access to applications. Jeff, the Information Technology Manager at the following company, also wants to evaluate the AppLocker strategy until it is implemented.  

So, In Group Policy Manager, Jeff enforces the latest AppLocker strategy to evaluate the AppLocker policy in the Audit-Only zone because he is the IT manager of the company and he wanted to check the following policy.

3 0
3 years ago
Electronic computer chips made of tiny silicon wafers now regularly contain millions of electronic switches. Unfortunately, elec
Virty [35]

Answer:

E

Explanation:

if you can reasonably shield them why would you replace the switches

8 0
4 years ago
Other questions:
  • The organization of logistics activities within a firm depends on a number of factors, including the number and location of cust
    10·1 answer
  • Write a Python program that can convert a Fahrenheit temperature to Celsius, or vice versa. The program should use two custom fu
    12·1 answer
  • ________ to a base class may be assigned the address of a derived class object.
    8·2 answers
  • Productivity, rework, and technology impact are examples of which kind of software metric?
    9·1 answer
  • When entering data into a cell, which keyboard key is used to remove characters to the left of the insertion point?
    12·1 answer
  • Which of the following is a major difference between XSS attacks and remote code exploits?
    15·1 answer
  • Write an application program in C++ to implement a class Fibonacci to print Fibonacci series upto N using member function series
    9·1 answer
  • a pair of shoes is on sale for 15% off with this discount customers will pay $9 if they buy the shoes ​
    14·1 answer
  • Hardware failure, power outages, and DOS attacks will affect:
    8·1 answer
  • A __________ is a sequence of characters.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!