answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
2 years ago
4

In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database

operations performed by all users.
Computers and Technology
1 answer:
Feliz [49]2 years ago
4 0

Answer:

In the context of database usage monitoring, a(n) <u>audit log</u> is a file that automatically records a brief description of the database operations performed by all users.

Explanation:

Audit log can be defined as document or file that captures the information of every action and event that occurs in the system of Information Technology in a chronological way  (with passage of time).

It sometimes also known as Audit trail.

This document/file contains the following entries:

  1. Source and destination addresses
  2. Time stamp
  3. Login information of user.

In short audit log tells us that "what" has been done by "whom"  and "how" (by which process).

i hope it will help you!

You might be interested in
Suppose you are given an unknown chip which could be any one of the of the following: 7400, 7402, 7404, 7408, 7410, 7420, 7427,
Olenka [21]

The answer & explanation for this question is given in the attachment below.

3 0
2 years ago
How do you download a video from sendvid
Leona [35]
You copy the url and paste it in the box on the website

5 0
2 years ago
Read 2 more answers
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card
NemiM [27]

Answer:

Yes

Explanation:

e-commerce or electronic commerce is an online platform, where web technologies is used as a medium for business transaction between a buyer and a seller.

The e-commerce platform provides the online marketplace and the electronic payment medium for customers of an e-store to easily acquire the products and services they need.

eBay is an example of an e-commerce website that provides individuals with the medium to sell and buy what they need.

8 0
3 years ago
Which process of the enterprise platform interacts with vendors and manages the entire supply chain for a retail client?
Alik [6]

The options are;

A) Data

B) Front Office

C) Core Processing

D) Experience

Answer:

D) Experience

Explanation:

Under enterprise resource planning platform, experience is the process whereby vendors interact and also manage the entire supply chain link on behalf of a retail client.

Thus, option D is the correct answer

4 0
2 years ago
Write an if statement that assigns 10,000 to the variable bonus if the value of the variable goodsSold is greater than 500,000.
aev [14]

Answer:

if(goodsSold>500000){

bonus = 10000;

}

Explanation:

A complete Java program that prompts user to enter value for goodsSold is given below:

<em>import java.util.Scanner;</em>

<em>public class num14 {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner in = new Scanner(System.in);</em>

<em>        System.out.println("Enter goods Sold: ");</em>

<em>        int goodsSold = in.nextInt();</em>

<em>        int bonus =0;</em>

<em>        if(goodsSold>500000){</em>

<em>            bonus=10000;</em>

<em>        }</em>

<em>        System.out.println("You bonus for "+goodsSold+" is "+bonus);</em>

<em>    }</em>

<em>}</em>

3 0
2 years ago
Other questions:
  • Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance che
    9·2 answers
  • Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
    12·1 answer
  • Leena needs to manually update the TOC and would prefer not to change the styles in the document.
    9·2 answers
  • The OSI security architecture provides a systematic framework for defining security attacks, mechanisms, and services. True or F
    12·1 answer
  • When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if
    7·1 answer
  • Remember that it is desirable for good block ciphers that a change in one input bit affects many output bits, a property that is
    9·1 answer
  • A company has offices in Honolulu, Seattle, Ogden, and Dublin, Ireland. There are transmission links between Honolulu and Seattl
    10·1 answer
  • 1. The precious metals needed to make computer chips, graphic cards, and transistors are found in only a small population of cou
    8·1 answer
  • ) A byte is used to represent a single character in the computer ______<br> true or false?
    14·2 answers
  • Explain why E-mail A is inappropriate for the workplace and revise it to be appropriate.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!