1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
5

You have booted your windows workstation into safe mode and enabled boot logging. To which log file is the boot logging informat

ion now being written?.
Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

Ntbtlog.txt

Explanation:

Found in a book

Have a nice day! :)

You might be interested in
Write a program that reads numbers from the user until a blank line is entered. Your
ddd [48]

Answer:

nums = []

while True:

   in = input()

   if in:

       nums.append(in)

   else:

       break

if nums:

   avg = sum(nums) / len(nums)

   for i in range(len(nums)):

       if nums[i] == avg:

           print(f"index: {i+1}")

           print(nums[i])

else:

   print(-1)  # if there aren't any values in nums

Explanation:

Assuming that you are coding in Python 3x. The last 'else' statement is an edge case that you might want to consider, I don't know what you want to put there, but I'm just going to leave it as -1.

5 0
3 years ago
What programs are most likely affected by a macro virus?
Iteru [2.4K]

Answer:

Macro viruses usually infect Microsoft Office apps like Word and Excel.

Explanation:

7 0
3 years ago
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
Match each role to the corresponding web development task.
USPshnik [31]

Answer:

1. Art director: selecting color palettes.

2. Web project manager: creating budget spreadsheets.

3. Usability lead: researching target audiences.

4. Developer: coding.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The various role performed during the web development process (task) includes;

1. Art director: selecting color palettes. This individual is saddled with the responsibility of choosing the color that best fits a website.

2. Web project manager: creating budget spreadsheets. He or she is responsible for performing tasks such as creating a financial (budget) plan, start and finish date (timing), procurement, etc.

3. Usability lead: researching target audiences. This individual is saddled with the responsibility of surveying and collecting data from the demography for which the website is designed.

4. Developer: coding. This is the technical expert referred to as a web developer and is responsible for writing the set of instructions (codes) that enables the website to work properly and serve a purpose.

8 0
3 years ago
2. Identify two real-world examples of problems whose solutions do not scale well.
DiKsa [7]

Answer:

The specification is defined downwards according to the conclusions reached.

Explanation:

Real-world instances or examples of issues that do not scale well are listed following table:

  • For different uses, such as solving the equation, respectively., multiplication matrices.
  • It still does not scales or works well to organize a wide sequence of names or numbers as the requisite measures raise as squares by around the enlargement or increment.
7 0
3 years ago
Other questions:
  • Is a component that provides a button control in a gui application or applet?
    15·1 answer
  • How did tafts accomplishments regarding conservation and trust-busting compare to roosevelt?
    11·1 answer
  • The ___ are documents which uses http ?
    9·1 answer
  • The Software Engineering Code of Ethics and Professional Practice was developed by Select one: a. Computer Professionals for Soc
    7·1 answer
  • Which is NOT an example of a "Serious Game"?
    9·1 answer
  • Which guideline should you follow when selecting the font for a presentation
    9·1 answer
  • Necesito 7 innovaciones tecnológicas de la informática para 2021
    15·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
  • What type of software is an antivirus?
    5·2 answers
  • 1. what is the purpose of giving an id to an html element when using javascript?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!