If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.

Answers

Answer 1

Answer:

Answered below

Explanation:

The DNS server is said to be a caching-only DNS server.

A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.

Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.

The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.


Related Questions

Does the cloud solution offer equal or greater data security capabilities than those pro-vided by your organization’s data center?

Answers

Answer:I think greater. Answer my question that I posted plz

Explanation:

A user in an apartment building on a wireless network is no longer able to print to the network printer. The user has been able to print to the printer in the past and nothing on the network has changed. A technician notices that the user has a different IP address scheme than what was originally setup and is able to browse the Internet using that IP address scheme. What should he do?

Answers

Answer:

The technician should either provide a route from the user's IP scheme to the printer or change the user's IP scheme to be within the same scheme as the printer.

Explanation:

The most likely reason the user is unable to print to the printer is that the user's computer cannot path the current address to the address of the printer.  Without the printer being on the same subnet as the user's computer, the computer has no way of being able to tell where the printer is.

The two solutions to this are to either add a route to the user's computer explicitly telling the user's computer where to trace to find the printer or to change the user's computer to match the IP scheme of the printer.

Cheers.

Show using a cross-product construction that the class of regular languages is closed under set difference. You do not need an inductive proof, but you should convincingly explain why your construction works.

Answers

Answer:

The class definition for Javascript:

var Class = {

      arguments of the class object are initialized here;

}

This class definition for Python:

class "class_name"( object ):

      def __init__(self, arguments are passed are and initialized after the closing parenthesis)

Explanation:

Object-oriented programming languages are vital tools in creating data structures that are meant to be changeable, unindexed but directly accessible knowing the key value, and has unique membership.

This clearly is an adoption of the set data structure rule in creating a data structure blueprint that can be instantiated anytime in the code.

Strong emotions can interfere with your ability to
A. make wise decisions.
B. think and reason.
C. judge risks.
D. all of the above

Answers

All of the above

All emotions cloud judgement, but anger is the worst

Hope this helps ♥︎

Strong emotions can interfere with your ability to make wise decisions, think and reason, and judge risk. The correct option is (D).

Strong emotions can indeed interfere with a person's ability to make wise decisions, think clearly and reason logically, and accurately judge risks.

Emotions have the potential to cloud judgment, bias perception, and impede rational thinking, which can impact decision-making processes.

Therefore, Strong emotions can interfere with your ability to make wise decisions, think and reason, and judge risk. The correct option is (D).

To know more about the emotions:

https://brainly.com/question/14587591

#SPJ4

You suspect that a hacker has compromised a computer using one of its open ports. Which command would allow you to view the open ports on the computer

Answers

Answer:

[tex]netstat[/tex]

Explanation:

The netstat command displays network connections for TCP and can help to view the open ports on the computer.

Hope this helped!

is there similarities between plagiarism and software piracy? explain.​

Answers

PlagiarismPlagiarism means using someone else's ideas or words without crediting source.PiracyPiracy is unauthorized use, reproduction, or sharing of copyrighted material.

How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records, but not allow her to delete the records

Answers

i don’t think that’s possible. giving control to edit records also means giving control to delete them. maybe discuss before hand to build trust and understanding or duplicate the records in case she does delete them

The first electric, general-purpose computer, ENIAC, was programmed by calculating algorithms on paper entering code directly into the computer flipping switches by hand using MS-DOS as the operating system

Answers

Complete Question:

The first electric, general-purpose computer, ENIAC, was programmed by?

Group of answer choices.

A. Calculating algorithms on paper.

B. Entering code directly into the computer.

C. Flipping switches by hand.

D. Using MS-DOS as the operating system.

Answer:

C. Flipping switches by hand.

Explanation:

The first electric, general-purpose computer, ENIAC, was programmed by flipping switches by hand.

ENIAC is an acronym for Electronic Numerical Integrator and Computer, it was developed in 1945 by John Mauchly and J. Presber Eckert. ENIAC was used for solving numerical problems or calculation-related tasks by the process of reprogramming.

In order to give the ENIAC a series of machine instructions to follow in the execution of a task, the programmers had to undergo the cumbersome procedure of connecting, removing, reconnecting cables and flipping switches by hand because data couldn't be stored in memory.

Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a library system which is an interactive system providing access to a large document database and which allows the automated ordering and electronic delivery of documents to local and remote end-users. Some requirements for this system are: Req. 1 The user interface shall be html. Users shall access the system via standard web browsers such as Netscape and Internet Explorer. Req. 2 The system shall primarily an end-user system. Users shall use the system within the constraints of the permissions assigned by the administrator to identify, locate, order and receive documents. Req. 3 Users shall communicate with the system mainly via the html interface. Req. 4 User shall provide input to the system via the html interface. Req. 5 The system shall give output to the user via the html interface, email and print. The print output shall mainly be documents.

Answers

Answer:

Redundancy

Req. 1 and Req. 3 are seemed to say the same thing. We need to remove the first sentence in Req. 1

Conflict and understandability

Req. 1 states that access is through web browser while Req. 4 states that access is via html. We have to re-write the Req. 3 to make it clear that users do not actually have to write directly html to communicate with the system.

Completeness

Req. 5 states that print out will “mainly” be documents. What else might be printed? What other inputs will be produced?

Either remove mainly or clarify other print out.

What version of html or web browser is assumed in Req. 1 and Req. 3?

Explanation:

Write a pseudocode For loop that displays all the numbers from 0 to 5, one at a time. We have the following pseudocode so far. Declare Integer number Write this statement Display number End For Type the exact text for the line of pseudocode that should replace Write this statement shown above.

Answers

Answer:

The statement is:

For number = 0 to 5

Explanation:

Given

The incomplete pseudocode

Required

The loop statement to complete the pseudocode

To loop from 0 to 5, we make use of:

For number = 0 to 5

Where:

number is the integer variable declared on line 1

So, the complete pseudocode is:

Declare Integer number

For number = 0 to 5

Display number

End For

What is also known as computer Network?

Answers

The best-known computer network is the Internet. Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, phones,servers as well as networking hardware.

A good machine should have the mechanical advantage of......?​

Answers

Answer:

The ideal mechanical advantage (IMA) of an inclined plane is the length of the incline divided by the vertical rise, the so-called run-to-rise ratio. The mechanical advantage increases as the slope of the incline decreases, but then the load will have to be moved a greater distance.

Explanation:

Write the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can cover 350.0 square feet. So gallons =the square feet divided by 350.0. If the input is 250.0, the output should be: 0.714285714286

Answers

Answer:

Here is the Python and C++ program.

Python program:

gallons_paint=0.0  #declare and initialize gallons_paint  

wall_area = float(input())  #prompts user to enter wall area

gallons_paint = wall_area / 350  #formula to compute gallons of paint needed to cover the given square feet of walls

print(gallons_paint) #display the result

C++ program:

#include <iostream> //to use input output functions

using namespace std; //to identify objects like cin cout

int main(){ //start of main() function body

   float wall_area,gallons_paint=0; //declare variables

   cin>>wall_area; //reads input wall area from user

   gallons_paint=wall_area/350; //formula to compute gallons of paint needed to cover the given square feet of walls

   cout<<gallons_paint;} //print the result

Explanation:

The program prompts the user to enter the area of wall and stores the input value in wall_area

Suppose the user enters 250 as wall area

The the formula gallons_paint=wall_area/350; works as follows:

gallons_paint = wall_area/350;

                         = 250/350

                         = 0.71428

gallons_paint  = 0.71428

So the output is:

0.71428

The screenshot of the program along with its output is attached.

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: Question 6 options: A) botnet B) adware. C) a backdoor. D) spyware.

Answers

Answer:

The correct answer is D) Spyware.

Explanation:

Also known as a Malicious Software (or Malware for short), a Spyware is designed to gain unsolicited entrance into ones computer and when executed, performs the function of illegally stealing one's private information and sending them to the hacker or originator of the software.

The following have been identified as spyware threats:

Transponder (vx2) Hot as HellBlazeFindInternet Optimizer

Cheers!

Write down the complete AJAX code to avoid page caching.

Answers

Answer:

AZAX is key sentence for without reloading page.

Explanation:

AJAX is also known as XHR. If some one wants to send the file without reloading then look ahead at the search function and prompt the users by auto saving the documents. This request is sent to the server. The server return the data to your network. Whenever you have seen the file form, some action on the page. You will see some request from AJAX server request on your functional area. AJAX is called a reloading file without page. AZAX is stands for Asynchronous java scripts And XML. AJAX is used to send an email. AZAX is not used in front end, it is used from back end process.

Objects for AJAXJava ScriptWord Press Action.ProtectionError handling process

How does the teacher know you have completed your assignment in Google Classroom?

Answers

Answer:

When students have completed the assignment, they simply click the Mark As Done button to let the teacher know they have finished.

Explanation: Note: The teacher does NOT receive an alert or email notification when work has been turned in, or marked as done.

Which recovery method helps users boot into an environment to get them back into the system so they can begin the troubleshooting process

Answers

Answer:

sfadasda

Explanation:

dsadasdadas

Consider a world named ‘Square World’. In this world a person can move only up,
down, left, right squares and only one square at a time. The squares are numbered. In
square number 3, there is our hero Yellow. His dream girl Pinky is in square number
16. There are bombs in the red squares and if someone goes there, he/she will be
busted! Yellow wants to see Pinky as quickly as possible and starts his journey from
square 3. Help him to find the shortest route. Which search technique will you use to
help Yellow? Demonstrate your idea by showing your simulation step by steps.

Answers

Answer:

Explanation:

It is hard , please any one help me.

Solve this question

Determine the median paycheck from the following set:

{$100, $250, $300, $400, $600, $650}

$300

$350

$450

$600

Answers

Answer:

My answer to the question is $350.

The middle numbers are $300&$400.

300+400=700/2=350.

Answer:

$350

Explanation:

Write a recursive function sumSquares(num) that given an integer num, returns the sum of squares of numbers from 1 to num. For example: sumSquares(3) should return 1^2 2^2 3^2

Answers

Answer:

Here is the recursive function sumSquares(num) that takes an integer num as parameter and returns the sum of squares of numbers from 1 to num.

def sumSquares(num):

   if(num >= 0):  # checks if the value of num is less than or equal to 0

       if (num==0):  #if value of num is 0

           return 0  #returns 0 if value of num is 0

       else:  #if value of num is greater than 0

           return sumSquares(num - 1)+ num * num  #recursively calls the sumSquares method to return the sum of squares of numbers from 1 to num

   else:  # if a user enters a negative num

       (print("The number if not positive"))  #prints this message

       exit()  # exits after displaying that number if not positive message

#below print statement is used in order to check the working of the function        

print(sumSquares(3)) #calls function and passes value 3 for num

Explanation:

The program works as follows:

The function sumSquares(num) that takes an integer num as parameter and returns the sum of squares of numbers from 1 to num

The first if condition checks if value of num is positive. If this condition evaluates to true then the another if statement inside this if statement is executed which checks if the value of num is 0. If this condition evaluates to true then the program returns 0. However if this condition evaluates to false then the else part executes which has the following statement:

return sumSquares(num - 1) + num * num

For example num = 3

so the above recursive statement works as follows:

sumSquares(3-1) + 3 * 3

sumSquares(2) + 9

Note that the sumSquares() method is called again and the value 2 is passed as num. As 2 is greater than 0. So again the recursive statement executes:

sumSquares(2 - 1) + 2 * 2 + 9

sumSquares(1) + 4 + 9

sumSquares(1) + 13

sumSquare() method is called again and the value 1 is passed as num. As 1 is greater than 0. So again the recursive statement executes:

sumSquares(1 - 1) + 1 * 1 + 13

sumSquares(0) + 1 + 13

sumSquares(0) + 14

sumSquare() method is called again and the value 0 is passed as num

As the value of num=0 So the if (num == 0):  condition evaluates to true and the statement returns 0 executes which returns 0:

sumSquares(0) + 14

0 + 14

Hence the output is:

14

The screenshot of the program along with its output is attached.

While interoperability and unrestricted connectivity is an important trend in networking, the reality is that many diverse systems with different hardware and software exist. Programming that serves to "glue together" or mediate between two separate and usually already existing programs is known as:

Answers

Answer:

Middleware

Explanation:

In today's technology like networking, software development, web development, etc, there is a need for connectivity. The problem at hand is the variation of the tech brands which results in the difference in operating systems, applications, and connectivity protocols. This problem is solved with the introduction of Middleware.

Middleware is the solution to conflicting software applications, interconnectivity between various tech platforms. It promotes cross-platform interactions.

This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsException. Note that the last valid index is the size of the list; this would mean adding to the back of the list. Call any existing methods of LinkedList and LLNode as needed.

Answers

Answer:

i dont know

Explanation:

1.the following code example would print the data type of x, what data type would that be?
x=5
print (type(x))

2.The following code example would print the data type of x, what data type would that be?
x="Hello World"
print(type(x))

3. The following code example would print the data type x, what data type would that be?
x=20.5
print (type(x))

Answers

Answer:

x = 5, the data type is integer( integer data type is for whole numbers)

2. The data type is string

3. The data type is float (float data type is for decimals)

Explanation:

Jeni is using the Label Wizard to solve a problem. What problem was she most likely experiencing?

O The images were not attaching to the labels.
O The spell check feature was not working within the label boundaries. O The text was getting cut off when the labels printed.
O The print preview function was showing only one label at a time.​

Answers

The last one is the right answer

The POR is a systematic method of documentation that includes a database, problem list, initiitial plan and progress notes.
A. True
B. False

Answers

Explanation:

The POR is a systematic method of documentation that includes a database, problem list, initiitial plan and progress notes is true

Why operating system is pivotal in teaching and learning

Answers

Answer:

Without it information flow is impossible

Explanation:

The word 'pivotal' also means crucial or vital, and so we need to consider what an operating system actually does.

Remember, merely having all the hardware of a computer would not allow you to run (install and use) programs. It is by means of an operating system that teaching programs can be installed, and it is also by means of an operating system learning can take place.

For example, a student can decode (learn) instructions/lessons from his teacher via a software program; and the software program needs an operating system to open (run) the program.

GIVING BRANLIEST IFFF CORRECT James uses a database to track his school football team. Which feature in a database allows James to list only the players that didn't play in the last game? Title Filter Search Sort

Answers

Answer:

filter

Explanation:

the filter feature allows him to fetch data that only meets a certain criteria(those who didn't play in the last game)

The FILTER feature in a database allows James to list on the players that did not play in the game.

What is the filter feature in EXCEL?

The FILTER feature in Excel is used to clear out a number of statistics primarily based totally on the standards which you specify. The feature belongs to the class of Dynamic Arrays functions.

The end result is an array of values that mechanically spills into a number cells, beginning from the Cells wherein you input a formula.

Thus, The FILTER feature in a database allows James to list on the players that did not play in the game.

Learn more about FILTER feature here:

https://brainly.com/question/11866402

#SPJ2

What are the constraints for designing small and large files and how these are resolved in different file system

Answers

Answer:

space management and buffering speed.

Explanation:

There are different types of file management systems in a computer system, examples of which are NTFS, FAT, WAFL, etc, and are governed by protocols like NFS, TFTP, FTP, etc.

These file systems are used in storages like the hard disk drive, CD and DVD, solid-state drive, etc, to organize or manage the files from boot setup, device drivers to permission-seasoned user files.

Files in storage range from small to large files, for which the schema of the file system must adjust to manage and allocate free space to other files in the future. The file system is also able to index the location of a file for retrieval to a cache memory, making buffering faster.

d. Application software are developed by software companies ​

Answers

Answer:

May this help you l think

Explanation:

There are several different types. They can be grouped into four basic categories:

Application development that provides functionality for users to perform tasks. Examples include office productivity suites, media players, social media tools, and booking systems. Applications can run on the user’s own personal computing equipment or on servers hosted in the cloud or by an internal IT department. Media streaming development is one example of application development for the cloud.

2.System software development to provide the core functions such as operating systems, storage systems, databases, networks, and hardware management.

the base on which the number n=(34)? is written if it has a value of n= (22)10​

Answers

If I'm understanding the question correctly, you are looking for an integer b (b ≠ 0, b ≠ 1) such that

[tex]34_b = 22_{10}[/tex]

In other words, you're solving for b such that

b ¹ + 4×b ⁰ = 22

or

3b + 4 = 22

Solving this is trivial:

3b + 4 = 22

3b = 18

b = 6

So we have

34₆ = 22₁₀

Other Questions
If 1 mol of a pure triglyceride is hydrolyzed to give 2 mol of RCOOH, 1 mol of R'COOH, and 1 mol of glycerol, which of the following compounds might be the triglyceride? CHOC(O)R A. CHOC(O)R CHOC(O)R CH,OC(O)R B. CHOC(O)R CH2OC(O)R CHOC(O)R C. CHOC(O)R CHOC(O)R CHOC(O)R D. CHOC(O)R CHOC(O)R In Act 1, scene 5 from Shakespeares Twelfth Night, Feste says to Olivia, "I wear not motley in my brain." What does he mean? joe went to to the store and spent a total of $37 .84. if paid with a $50 then how much change did he get back? NEED ANSWER FAST....FIRST ANSWER WILL BE BRAINLIST!!!!For which data set would the mean absolute deviation be a good indicator of variation of the data? Find the graph of the inequality y Which of the following is an example of the geosphere interacting with the atmosphere?Streams become muddy due to erosion. Volcanic eruptions release gases into the air. Rocks crack open when water in the cracks freeze. Plants absorb carbon dioxide and produce oxygen. D(x2 + y2 + 2020)dxdy D: x2 +y2 +2ax 0 (a > 0) GUYS PLEASE HELP WILL MARK BRAINLIEST A plastic rod that has been charged to 15 nC touches a metal sphere. Afterward, the rod's charge is 5.0 nC.1) What kind of charged particle was transferred between the rod and the sphere, and in which direction? A) electrons transferred from rod to sphere. B) electrons transferred from sphere to rod. C) protons transferred from rod to sphere. D) protons transferred from sphere to rod.2) How many charged particles were transferred? SHOW ADEQUATE WORKINGS IN THIS SECTION12. Wale and Lekan of 55kg and 60kg respectively ran a race of 200m. i. Calculate their work done in KJii. If wale finished the race in 25secs while Lekan finished in 30secs, calculate their power and who is more powerful out of these two. ( g = 10m/secs)13. A machine has a velocity ratio of 5 and is 800/0 efficient. If the machine is carrying a load of 200kg, what will be effort applied?Please help me answer anyone that you understand Can someone help i need this done by today Using Article 26 from the Universal Declaration of Human Rights, summarize then analyze the article in light of what you know of the education in other countries that do not uphold this right. Include the different sections and discuss the effects on a country if every country involved implemented this right.NEED ASAP!! Article 26 below (1) Everyone has the right to education. Education shall be free, at least in the elementary and fundamental stages. Elementary education shall be compulsory. Technical and professional education shall be made generally available and higher education shall be equally accessible to all on the basis of merit.(2) Education shall be directed to the full development of the human personality and to the strengthening of respect for human rights and fundamental freedoms. It shall promote understanding, tolerance and friendship among all nations, racial or religious groups, and shall further the activities of the United Nations for the maintenance of peace. (3) Parents have a prior right to choose the kind of education that shall be given to their children. What is the slope and the y-intercept of the line on the graph below? On a coordinate plane, a line goes through points (0, 1) and (4, 0). Simplify: [tex] \sqrt[4]{6 ^{4} } [/tex] Practice Exercise 3.1 Fill in the blanks: (i) The factors of 12 are (ii) The least non-zero multiples of any number is (iii) ......... is a factor of every number. ing with Numbers Digby's balance sheet has $99,131,000 in equity. Further, the company is expecting net income of 3,000,000 next year, and also expecting to issue $4,000,000 in new stock. If there are no dividends paid what will beDigby's book value What is necessary for a ball to be in translational equilibrium? help on the circled problems, will mark brainliest :D The original name for Asian Homo erectus was Group of answer choices Homo rudolfensis. Australopithecus. Paranthropus. Pithecanthropus. During summer vacation, Wesley read, on average, 20 pages per night. Now that he has returned to school, he is averaging 65% fewer. How many pages per night is Wesley averaging now?