nancieabreu70732 nancieabreu70732
  • 22-04-2018
  • Computers and Technology
contestada

E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​

Respuesta :

lilaipo
lilaipo lilaipo
  • 01-05-2018
E-mail administrators may make use of Circular Logging which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​Circular logging is a method or feature used to conserve hard disk space by overwriting individual log files, thus keeping the transactional  log to a minimum.
Answer Link

Otras preguntas

What is the length of AC in the given triangle?
Rule of Man can impede foreign investment mostly through Except. A. Operational Risk B. Country Risk C. Financial Risk D. Cultural Risk
The psychiatric disease SAD a. is another form of psychosis b. is treated with Wellbutrin c. occurs in the winter when there is little sunshine d. Band C
which stalemate accurately describes an objects weight and mass
y78jhnbybytgnhujimvfgbhnujimktfvgybhunjimk,tvfgybhunjimko,v6bhnujimko,
Across the planet, coral reefs are dying due to a phenomenon called coral___
Which is NOT a feature of party list PR systems? A. ranking of preferred parties on ballot B. parties submit a list of candidates before the election C. voters
Stacy drew a triangle to explain the relationship between the angles of a triangle and an exterior angle. She labeled the interior angles 1, 2, and 3. She label
for television sent in the function g(w)
Production of which neurotransmitter causes sleep?A) Adrenaline B) Dopamine C) Serotonin D) Epinephrine