1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
5

You have booted your windows workstation into safe mode and enabled boot logging. To which log file is the boot logging informat

ion now being written?.
Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

Ntbtlog.txt

Explanation:

Found in a book

Have a nice day! :)

You might be interested in
Which of the following relationships between variables could be shown with a scatter plot graph?
Wittaler [7]

Link to the Plot, plz.

8 0
3 years ago
A style ____ is a series of rules that defines the style for a web page or an entire web site.
inna [77]
Set is the answer have fun 
8 0
3 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
What is the impedance mismatch problem? Which of the three programming
kykrilka [37]

Answer:

The problem that created due to the difference in the model of programming language and the database model.

Explanation:

The practical relational model has three components which are as follows

1. Attributes

2. Datatypes

3. Tuples

To minimize this problem  

1. We switch low pass L-Network to high pass L-network

2. We switch high pass L-Network to low pass L-network

3. We use the impedence matching transformer

3 0
4 years ago
How many dimples are on the titleist pro v1 golf ball?
ICE Princess25 [194]
Hey and thanks for giving me the chance to serve you
__________________________________________________________ 

There are 392 dimples on a Pro V 1,
Hope this helped.

Have a good day.
5 0
3 years ago
Other questions:
  • What is the output of the code snippet given below? string s = "aeiou"; int i = 0; do { system.out.print(s.substring(i, i + 1));
    12·1 answer
  • Please help
    5·2 answers
  • The bluecross blueshield federal employee program (fep) is a(n) __________ health benefits program established by an act of cong
    8·1 answer
  • Which is the most used operating system? A. Windows B.Linux C.Leopard D. DOS
    14·2 answers
  • Describe security risks associated with downloading items online
    8·1 answer
  • Tiffany is writing a program to help manage a bake sale. She writes the following code which prompts the user to enter the total
    15·1 answer
  • Plz tell the answer I I'll mark u as the brainliest
    14·1 answer
  • ILL GIVE BRAINLIEST HELLP.
    10·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • What is added to brining liquid to add flavour​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!