1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
5

Where you should go to find out what access the system and users to a file ​

Computers and Technology
1 answer:
dsp733 years ago
4 0

Answer:

To see who reads the file, open “Windows Event Viewer”, and navigate to “Windows Logs” → “Security”. There is a “Filter Current Log” option in the right pane to find the relevant events. If anyone opens the file, event ID 4656 and 4663 will be logged.

You might be interested in
Discuss any five focus areas<br> for Green Computing you can concentrate on
BaLLatris [955]

Answer:

Five focus areas for Green Computing are:

  1. Environmental conditions
  2. Information technology (IT) systems
  3. Cooling systems
  4. Electrical systems
  5. Air management systems

Explanation:  

Green computing refers to the art of managing very effectively information technology such that the current level of productivity is maintained or exceeded.

Many of the factors listed above are more typical to data centers.

Data centers are IT systems that consume lots of electricity whilst generating lots of heat.

Sustained over a long period of time, the heat generated will contribute to green-house gases as the cooling system that is required to keep the data houses cool are big.

Hence, the green computing protocol requires where possible, minimal electricity be expended in cooling the data warehouses.

Another suggestion that has been given is for systems and appliances to be shut down when not in use rather than being left on or on standby.

Cheers

8 0
3 years ago
When a device or service causes the system to hang during a normal boot, boot into __________ and disable the device or service
Olenka [21]

You should boot into <u>safe mode</u> and disable the device or service when it causes the computer system to hang during a normal boot.

<h3>What is safe mood?</h3>

Safe mood can be defined as a boot option in which the operating system (OS) of a computer system starts in <u>diagnostic mode</u> rather than in a normal operating mode, so as to enable the user correct any problems preventing the computer system to have a normal boot.

This ultimately implies that, safe mood is a diagnostic mode of the operating system (OS) of a computer system that is designed and developed to fix most problems within an operating system (OS) and for the removal of rogue software applications.

Read more on safe mood here: brainly.com/question/13026618

5 0
2 years ago
Window to Viewport Transformation is the process of transforming a 2D world-coordinate objects to device coordinates. Objects in
klemol [59]

Answer:

It is not necessary to display data in a graph if the linear transformation, a line segment, maps the window to the port preserving relative positions of the two dimensional view. The real world object is a transformedinto relative position points to the viewing volume.

Computer graphics begins then with linear transformations called clipping.

Explanation:

When surfing the internet using your mouse through tablets and mobile phones, the wizard´s default provided viewport varies as it is a polygon or the visible window mapped in computer graphics for a user redered by device-specific coordinates, position and orientation.

You can add multiple viewpoints as it is an HTML meta tag, @ rule in CSS. Styles and other features can be set when designing websites so you can provide the site to be shown in different devices.

5 0
3 years ago
Which hardware device connects your network to the internet?
pentagon [3]
The Ethernet Cord 

Hope this helps,

kwrob :)

6 0
4 years ago
Mouse is .....ware.<br>​
lidiya [134]

Mouse is hardware.

Explanation:

because we can touch it and in the hardware definition we say that it can be touched.

5 0
3 years ago
Other questions:
  • Which option enables you to keep the last grammatical change
    15·2 answers
  • _______ is the lightest chemical element <br> A.oxygen<br> B.hydrogen<br> C.helium
    14·2 answers
  • Why is a non-trivial or predictable classification system preferred in systematics?
    8·1 answer
  • Discuss FOUR challenges that have an impact on domestic tourism
    6·1 answer
  • Suppose a computer has 1GB of memory. Operating System takes 256 MB of memory. Imagine each task takes up 196 MB of memory and t
    12·1 answer
  • Identify the error and write correct HTML program 5 Cyber Bullying Tips&lt;\head&gt;Don't Respond Talk to a trusted adult &lt;|h
    14·1 answer
  • In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
    11·1 answer
  • Create a Python program that computes the cost of carpeting a room. Your program should prompt the user for the width and length
    10·1 answer
  • What happens if the new context is in memory rather than in a register set and all the register sets are in use?
    10·1 answer
  • reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!