1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
5

Where you should go to find out what access the system and users to a file ​

Computers and Technology
1 answer:
dsp733 years ago
4 0

Answer:

To see who reads the file, open “Windows Event Viewer”, and navigate to “Windows Logs” → “Security”. There is a “Filter Current Log” option in the right pane to find the relevant events. If anyone opens the file, event ID 4656 and 4663 will be logged.

You might be interested in
Vẽ sơ đồ DFD cho của hàng bán điện thoại ( Môn phân tích và thiết kế hệ thống thông tin)
Norma-Jean [14]

Answer:

what language is this??

6 0
3 years ago
Which activity cannot be done on a social networking site?
NemiM [27]

Answer:

Blogging

Explanation:

This is confusing. I think it would be B because most people who blog have their own website which is not a social networking site.

7 0
4 years ago
There is a renewed focus among today’s parents on providing food to their family.
BlackZzzverrR [31]

Answer:

The answer is "healthful".

Explanation:

  • In ancient times the vast majority of people lacked food, parents aimed at providing their family members with adequate food. Recent months, interestingly, also made parents should be aware of providing a healthy diet for their children, including links to being enough and a wide taste of options.
  • In societies of food scarcity, it could see that the main concern of families continues and provide subsistence families with sufficient food. It is careful to prevent a common "good food".
8 0
3 years ago
An attribute whose value uniquely identifies an object is called a(n) _______.​
Juliette [100K]
This is called a key attribute!

There are different types of key attributes!

Primary key is the key that is actually chosen, for example a social security number. 

There is also a unique key, say our finger prints! they also uniquely identify humans, but usually we prefer to use social security number when we list people (a unique key could be a primary key if we chose so)

We could also identify people by their social security number and a name, but this is unnecessary, as social security number already gives a full identification. Such a reduntant key is called super key. 
6 0
3 years ago
The person responsible for setting goals and schedules, monitoring work, motivating the team, and reporting progress to managers
Naily [24]

Answer:

D. Project Manager

Explanation:

4 0
3 years ago
Other questions:
  • An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless netw
    13·1 answer
  • when reading a recipe ingredients witch substance make the rice an unhealthy choice if it is present in a high amount
    13·1 answer
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • Describe the dynamic Network Address Translation (NAT).
    9·1 answer
  • If your microwave oven is a computer, define its Operating System and User Interface.
    12·1 answer
  • Someone plz answer
    8·1 answer
  • Which of the following is not related to text formatting?​
    11·1 answer
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
  • File names should be limited to 144 characters.<br><br> true or false
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!