1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
2 years ago
5

What are the two different types of dns requests?

Computers and Technology
2 answers:
Fantom [35]2 years ago
6 0

The two major types of DNS request are as follows;

  • Recursive Query
  • Iterative Query

<h3>What is a domain name system?</h3>

Domain name system is abbreviated as DNS.

A Domain Name System (DNS) converts domain names into IP addresses, which allow browsers to get to websites and other internet resources.

Basically,  DNS is a directory of names that match with numbers.

Computer uses IP addresses to communicate, therefore, the DNS convert domain names to IP address for communication.  

The two major types of DNS request are as follows;

  • Recursive Query - Query that demands a resolution
  • Iterative Query - Query that does not demand a resolution.

learn more on DNS here: brainly.com/question/14397200

#SPJ11

worty [1.4K]2 years ago
5 0

Answer:

  1. Recursive Query - When a DNS Client submits a Query to a DNS Server for name resolution. The response to the DNS Query might be either an answer to the query or an error message. In Recursive Query, if the DNS Server does not have the reply to offer an exact response to the DNS Client, the DNS Server may query other DNS Servers on behalf of the DNS Client.
  2. Iterative Query - When a DNS Client requests name resolution from the DNS server, the DNS Server returns the best reply it has. If the DNS Server does not recognize the response to the Client's DNS Query, the answer might also be a referral to another lower level DNS Server. This lower level DNS Server is designated by the higher level DNS Server as the Authoritative DNS Server for the DNS namespace with which the DNS Query is associated. Once the DNS Client receives the referral from the higher level DNS server, it may send a DNS query to the lower level DNS server that received the recommendation.

You might be interested in
Leah and Santana have been requested to print a daily report of scheduled activities. Their supervisor needs to know if each par
Katyanochek1 [597]

Answer:

Boolean

Explanation:

Boolean is one of the primitive data types that will only hold either true or false value. This data type is commonly used in a variable that will track a status with only two possible outcomes.

For example, the<em> ParticipantPD</em> field is to track the payment status (paid or unpaid) of a participant. So, declare the<em> ParticipantPD</em> field as boolean data type will meet its purpose.

               boolean ParticipantPD = true;

               or

               boolean ParticipantPD = false;

8 0
3 years ago
What is the first thing you should do when you discover a computer is infected with malware? The second thing?
Goshia [24]

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

3 0
3 years ago
. Explain how semaphores are handled in embedded systems design
Readme [11.4K]

Answer:

 Semaphores carries the signal between the task and interrupts that does not carry any type of additional data in the embedded system. A semaphore is used as synchronization object and helps in maintain the value between zero and the specific higher value.  

It basically reduced the value each time and complete the semaphore object in the embedded system. Binary semaphores is the main type of semaphore that invoke activation of the task.

 

5 0
3 years ago
Disney's finding nemo is an example of a series of computer-generated images played in rapid succession. this medium is called _
Lana71 [14]

This medium is called Animation. Animation is a medium where images are handled to appear as moving pictures. In traditional animation, images are drawn or painted by hand on transparent celluloid sheet, so as to be photographed and exhibited on film. Today most animations are made with computer-generated imagery (CGI).

4 0
3 years ago
After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to
patriot [66]

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
5 0
3 years ago
Other questions:
  • What's a qat on a computer
    12·2 answers
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    11·1 answer
  • Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
    14·1 answer
  • Access Office Equipment has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of
    15·1 answer
  • JavaBeans are?A special Java classfileServletsAppletsA Special form of JSPNone of Given
    8·1 answer
  • Which part of project management involves determining the required materials?
    14·2 answers
  • Convert each of the following base 10 &amp; base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
    8·1 answer
  • Use the ________ property in the html link tag to to associate a web page with a style sheet for printing.
    5·1 answer
  • Which storage is faster than secondary storage​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!