1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
2 years ago
5

What are the two different types of dns requests?

Computers and Technology
2 answers:
Fantom [35]2 years ago
6 0

The two major types of DNS request are as follows;

  • Recursive Query
  • Iterative Query

<h3>What is a domain name system?</h3>

Domain name system is abbreviated as DNS.

A Domain Name System (DNS) converts domain names into IP addresses, which allow browsers to get to websites and other internet resources.

Basically,  DNS is a directory of names that match with numbers.

Computer uses IP addresses to communicate, therefore, the DNS convert domain names to IP address for communication.  

The two major types of DNS request are as follows;

  • Recursive Query - Query that demands a resolution
  • Iterative Query - Query that does not demand a resolution.

learn more on DNS here: brainly.com/question/14397200

#SPJ11

worty [1.4K]2 years ago
5 0

Answer:

  1. Recursive Query - When a DNS Client submits a Query to a DNS Server for name resolution. The response to the DNS Query might be either an answer to the query or an error message. In Recursive Query, if the DNS Server does not have the reply to offer an exact response to the DNS Client, the DNS Server may query other DNS Servers on behalf of the DNS Client.
  2. Iterative Query - When a DNS Client requests name resolution from the DNS server, the DNS Server returns the best reply it has. If the DNS Server does not recognize the response to the Client's DNS Query, the answer might also be a referral to another lower level DNS Server. This lower level DNS Server is designated by the higher level DNS Server as the Authoritative DNS Server for the DNS namespace with which the DNS Query is associated. Once the DNS Client receives the referral from the higher level DNS server, it may send a DNS query to the lower level DNS server that received the recommendation.

You might be interested in
Basically, if for every row, the absolute value of the entry along the main diagonal is larger than the sum of the absolute valu
Elza [17]

Answer:

Check the explanation

Explanation:

MATLAB code:

%----------------------

function result = dominant(A)

% matrix dimensions

d = size(A);

% for loop over rows

for i = 1:d

% sum of row elements except diagonal element

sum_row =0;

% for loop over columns

for j = 1:d

% adding each elements to sum variable

sum_row = sum_row+ abs(A(i,j));

end

%subratcting diagonal element

sum_row = sum_row-abs(A(i,i));

%checking dominant condition

% failed once means matrix is not diagonal dominant

if abs(A(i,i))< sum_row

result = 'false';

return;

end

end

% dominant condition not failed

result = 'true';

end

% matrix A

A = [ 3 -2 1; 1 -3 2; 1 2 6]

% result

result = dominant(A)

% matrix A

A = [ -2 1 2; 1 3 2; 1 -2 0]

% result

result = dominant(A)

%----------------------

Kindly check the attached output image below.

3 0
3 years ago
1 Sady found seashells and
Sergio [31]

Answer:

she sells sea shells by the sea shore

Explanation:

3 0
3 years ago
What is also know as a visual aid in a presentation
harkovskaia [24]

To promote a product we need marketing. So marketing plays an important role, moreover, the demand process also is required.

<u>Explanation:</u>

Marketing for any specified product can be done by visual aid presentation. Visual Aid presentation should have a cached message to the audience and the importance of promoting’s the product and it should impact the customer to purchase products and demand for availability should increase.

Once the demand for the product increased then sales and manufacture of the product are increased. So the growth of the company is increased. So, in other words, it is called chain management  in the growth process.

6 0
3 years ago
Many websites provide open-source data about science, technology, engineering, and math. Which of these sites provide open-sourc
N76 [4]

Relational database transactions are defined by four key characteristics, commonly referred to as ACID: atomicity, consistency, isolation, and durability.

The four essential characteristics of a transaction—atomicity, consistency, isolation, and durability—are referred to by the acronym ACID in the context of transaction processing. Data updates are handled as though they were one single action. Domain integrity ensures that information is added to the table only under certain circumstances, such as the file type or range of values. Any row that has been re-linked to a different table is protected from deletion by referential integrity. When a transaction has been committed, it is guaranteed by the property of durability that it will remain in the system even in the event of subsequent failures. Durability enforces completed transactions.

Learn more about transaction here-

brainly.com/question/15122599

#SPJ4

7 0
1 year ago
The cost of sending a package by an express delivery service is $15 for the first two pounds and $5 for each pound or fraction t
Sloan [31]

Answer:

Check the explanation

Explanation:

The MATLAB program should follow the following condition:

  1. • $15.00 for first two pounds and $5.00 for each over two pounds.
  2. • If package is more than 70 pounds, extra $15.00 is added to the total cost.
  3. • The package more than 100 pounds are not accepted.

Type the following MATLAB code to calculate the cost of mailing the package with th given conditions.

<em>% input the weight of the package </em>

<em>W=input('enter the weight of the package in pounds: \n'); </em>

<em>% initialize the cost, and surcharge for excess weight </em>

<em>cost=15; </em>

<em>surcharge15; </em>

<em>% weights more than 100 pounds are not accepted if >100 </em>

<em>disp('Sorry, no package over 100 pounds is accepted.); </em>

<em>else </em>

<em>% calculate the cost for the weights up to 100 pounds </em>

<em>if W>2 </em>

<em>% cost is $5 for each extra pound </em>

<em>Cost=cost+(W-2)* 5; </em>

<em>End </em>

<em>if W>70 </em>

<em>% extra charge is considered for weights more than 70 pounds </em>

<em>cost = cost+surcharge; </em>

<em>end </em>

<em>fprintf('The total cost for sending %3.2f pounds weight is %5.2f dollars \n', W, cost) </em>

<em>end </em>

<em />

Execute the code at the MATLAB command window for different weigh of the packages

<em>Enter the weight of the package in pounds: </em>

<em>2</em>

<em>The total cost for sending 2.00 pounds weight is 15.00 dollars </em>

<em>Enter the weight of the package in pounds. </em>

<em>3.5 </em>

<em>The total cost for sending 3.50 pounds weight is 22.50 dollars </em>

<em>Enter the weight of the package in pounds: </em>

<em>72 </em>

<em>The total cost for sending 72.00 pounds weight is 380.00 dollars </em>

<em>Enter the weight of the package in pounds: </em>

<em>101 </em>

<em>Sorry, no package over 100 pounds is accepted </em>

Thus, the MATLAB code is written and executed.

8 0
3 years ago
Other questions:
  • A motor controller controls the and of the motors.
    9·1 answer
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    5·1 answer
  • Which osi layer is responsible for combining bits into bytes and bytes into frames?
    8·1 answer
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft
    10·1 answer
  • 1.    Design a circuit that when the binary input is 0, 1, 2, 3,4,5,6, and 7 the binary output is one greater than the input.  W
    13·1 answer
  • 6. What are the two keyboard keys you can press at the same time to use the Copy command? (1.0 points)
    12·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • It is advised to always have discretion with leaders. Explain in general terms what information security policies can and cannot
    12·1 answer
  • How to jailbreak ios 9.2 ? Is there anyway???!!!!
    12·1 answer
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!