1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
11

Why does dns use udp instead of tcp? if a dns packet is lost, there is no automatic recovery. what are the consequences?

Computers and Technology
1 answer:
inysia [295]3 years ago
6 0
<span>If a DNS packet using UDP is lost this problem must be handled at the application layer. If an answer is not received after some period of time the specific application may choose to resend the DNS query. I can go much more into detail but this should answer your question. If you need more detail just ask.</span>
You might be interested in
Which of the following is NOT an example of a font style?
erastovalidia [21]
C. Underline because it is not a kind of font. it is an effect.
3 0
3 years ago
Write the function header (the first line of the function definition) to define a function named DisplayStats that accepts a str
Degger [83]

Answer:

void DisplayStats(string fName, int num1, double examScore);

Explanation:

Using C++ programming language.

Function headers (signatures) are allowed to be placed on top just before the main method in C++ indicating that the function's definition will be provided down below the main method, thereby allowing you to call the function within the main function.

The requirements of the the question are met. The function signature above indicates that it is void (wont return any value), The name is DisplayStats, and the parameter list are separated by single spaces as required with the correct data types.

4 0
3 years ago
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
What are two ways the broad-match modifier makes Jamie's work easier? (Choose two.)
Mariana [72]

Answer:

1) She doesn’t have to think of all the related saucepan keywords

2) She can easily select the colour she wants to focus on.

Explanation:

Broad match modifiers ensure  ads will only show for searches that include the words you’ve marked with a plus sign, such as +blue +suede +shoes. Broad match modifiers can help your keywords reach a greater clickthrough rate (CTR) with a more targeted customer audience, which in turn can help your site get more paying customers or other conversions

4 0
4 years ago
Annie needs to provide a form field that will allow users to select from a predefined list of options but without the ability to
makvit [3.9K]

Answer:

drop-down list

Explanation:

understand the definition of each of the options, and you will easily work out the answer.

See this page for differences between drop-down list and combo box: https://docs.microsoft.com/en-us/windows/win32/uxguide/ctrl-drop

Of the 4 answers, only drop-down list doesn't allow user to add own option

5 0
4 years ago
Other questions:
  • . What is a "secondary dimension" in Google Analytics?
    9·1 answer
  • You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as
    5·1 answer
  • Why would a designer choose to use an isometric sketch rather than a perspective sketch to share their idea with a design team m
    14·1 answer
  • A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
    6·1 answer
  • The most important protocol at the internet layer is ____.
    13·1 answer
  • Write a file path for a document file that is saved on the F drive then a folder called homework, then a folder called math. The
    12·1 answer
  • The writers that most likely influenced our Founding Fathers were _____. Select all that apply. Swift and Bacon Marlowe and Kant
    14·2 answers
  • Example of negative body language include all but
    8·1 answer
  • What is the biggest problem with technology today?
    10·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!