1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
14

It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring ca

n deter risk. To serve this goal, a ________________can be used to assemble logs from platforms throughout the network.
Computers and Technology
1 answer:
Virty [35]3 years ago
5 0

Log server can be used to assemble logs from platforms throughout the network.

<h3>Log server</h3>

A server log is a log file (or several files) automatically created and maintained by a server consisting of a list of activities it performed.

It maintains a huge server requests, information about the request, including client IP address, request date/time, the page requested, HTTP code, bytes served, user agent, and referrer are typically added to the log server format.

Server logs typically do not collect user-specific information.

Find out more on Log server at: brainly.com/question/19057393

You might be interested in
A __________ is a sequence of characters.
choli [55]
String i think:)))))
7 0
3 years ago
When is it most appropriate to quote from an e-mail message in a response?
allochka39001 [22]
I would say *d. when the quote is a part of a series of e-mails written by more than one person.*

eskettit hope this helped.
4 0
3 years ago
Read 2 more answers
You have no control over who views your social network information
AleksAgata [21]
Of course you have control, it's private and not access able to anyone else. But Social Network itself can control your info.
3 0
4 years ago
Read 2 more answers
Please help
sergey [27]

Answer:

a = 6, b = 0

Explanation:

The loop ran 3 times before b == 0. The statement "while ((b != 0)" is essentially saying: 'While b is not equal to 0, do what's in my loop'. Same general thing with "&& ((a / b) >= 0)". The "&&" is specifying that there should be another loop condition. The final part of the while loop states: 'as long as a ÷ b is greater than 0, do what's in my loop'. If all of these conditions are met, the loop will run. It will continue to run until at least one of the conditions are not met.

<em />

<em>Side note: I can't help but notice you posted the same question a while ago, so I just copied and pasted my previous response with some tweaking here and there. Hope this helps you! :)</em>

8 0
3 years ago
Which of the following are parts of the Physical Layer?
Snowcat [4.5K]

Answer:

Physical layer is the first layer of OSI model.  The detail about physical layer and its parts is given below in explanation section.

Explanation:

The physical layer is the lowest and first layer of the Open Systems Interconnection Model (OSI). The physical layer is used for the transmission of data in bit forms. For transmission of data between devices, it uses the transmission medium that is either wired or wireless.

In the wired cable the component of the psychical layer include cable and connectors that are implemented for carrying data from one place to another or simply to transmit data between two connected devices. The wireless transmission medium is used to transmit data in the form of electromagnetic signals for carrying data into a stream of bits. Over past advancements in networking technologies, rapid growth has been seen in wireless data transmission and Wi-Fi and Bluetooth communication are few names of it.

Components/Parts of Psychical Layer

In the physical layer, the hardware components used it in are the network interface cards, connectors and interfaces, intermediate devices, modems, and cables to facilitate the transmission of data between devices or from source to destination.

  • The network interface card (NIC)

NIC is a component installed in the computer to connect it to any available devices over the network.

  • Connectors and Interfaces

Connectors and interfaces are used to connect cables that are being used for transmission of data from one source to another. The decision to choose connectors and interfaces depends on the type of cable. Typical examples are RJ-45, RJ-11, V.35, HDMI, etc.

  • Cables

Cables are the physical components of the physical layer that carry optic or electromagnetic signals for transmission of data from source to destination in the network.

  • Intermediate devices

The intermediate devices are hubs and repeaters etc. The functions of these devices are to amplify or generate the signal at the intermediate point in a network.

6 0
4 years ago
Other questions:
  • Soo...My Old 3DS XL haven't been touched in around a year...So i tried to charge it but no LED lights opened..Even the power but
    14·1 answer
  • You are starting a spreadsheet, and you would like 500 to appear in cell C3. You should _____.
    11·2 answers
  • IT organizations implement powerful information systems like ERP and SCM that provide centralized data repositories. In addition
    11·2 answers
  • When typing a cell, hitting Tab will bring which result?
    12·1 answer
  • Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to rese
    6·1 answer
  • All NATE specialties are offered at two levels, A. journeyman and master. B. installation and service. C. apprentice and journey
    7·1 answer
  • have you ever had to adjust your communicatio style to egage a customer or roommate? what was the situation and outcome?
    5·1 answer
  • You can use _____ to track the state of each user in the application.
    8·1 answer
  • Activity #2
    13·1 answer
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!