Where would you find the system and security log files on a Windows 10 machine?

A) Under My Computer
B) In the Task Manager
C) In Event Viewer
D) In Internet Explorer


C) In Event Viewer

Computer Science & Information Technology

You might also like to view...

Valid arguments to the System.out object’s println method include:

a. “Anything with double quotes” b. String variables c. Variables of type int d. All of the above

Computer Science & Information Technology

Which one of the following statements about a cable Internet connection is TRUE?

A) It is less costly than dial-up. B) It has faster transfer speeds than fiber-optic. C) It suffers from signal interference. D) It requires a modem.

Computer Science & Information Technology

In Query Design view, the query design ________ is where fields are selected and criteria is entered

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ use human interaction to manipulate people into gaining access to systems, unauthorized areas, and confidential information.

A. Script kiddies B. White hats C. Social engineers D. Bots

Computer Science & Information Technology