1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
9

A _______ record is responsible for resolving an ip to a domain name.

Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
3 0
A DNS record <span>is responsible for resolving an IP to a domain name.
</span>The term DNS record denotes a database record, stored on DNS servers used to map a URL to an IP address. 
 The process is the following: the URL is entered and searched in the browser, that URL is forwarded to the DNS servers and then directed to the specific Web server<span>.</span>
You might be interested in
Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
Anika [276]

Full question:

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque 2 elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answer and Explanation:

If you instantiate a capacity of 10 for the queue, you have the queue a capacity of not more than 10 values.

To enqueue means to add an element to the array(if it's not full, n<10)

To dequeue means to delete an element from the array or queue(if n! =0)

From the question, for example:

We create a queue of capacity 10:

Queue q(10);

We add elements/enqueue 5 elements to the queue :

q.queueEnqueue(10);

q.queueEnqueue(5);

q.queueEnqueue(8);

q.queueEnqueue(9);

q.queueEnqueue(2);

If we print this out:

q. queueDisplay()

We would get:

10, 5, 8, 9, 2

We remove elements/dequeue 2 elements from the queue :

q. queuedequeue();

q. queuedequeue();

We print it out:

q. queueDisplay()

8 ,9, 2

We observe that deletion/dequeue starts from the front/first index.

We are left with indices 2, 3, 4 or 2 to 4

Note: the above methods/ functions and objects used are merely for example purposes. The queue uses a floating front design approach.

7 0
3 years ago
What does the following code print? time_of_day = ["morning", "afternoon", "evening"] for word in time_of_day: print "Good " + w
jek_recluse [69]

Answer:

syntaxerror

Explanation:

the print is missing a parenthesis - it will give the error:

SyntaxError: Missing parentheses in call to 'print'.

if you did put parenthesis it would say

Good morning

Good afternoon

Good evening

8 0
2 years ago
as a pc technician, you are on the road most of the day and use a laptop. when you get back to your office at the end of the day
natali 33 [55]

Port replicator is the type of device should you choose to provide all the functionality above.

<h3>What does a port replicator do?</h3>
  • A tool used to connect a laptop's accessories rapidly. Permanent connections are made to the port replicator, which is connected to the laptop via the USB port, by the keyboard, mouse, network, monitor, printer, and port.
  • A docking station's functionality may be partially or entirely provided by a port replicator, and the words are interchangeable.
  • However, a port replicator often offers a universal solution for all laptops through USB, in contrast to a docking station that connects to the computer using a proprietary connector. check out docking station.
  • A port replicator is an add-on for a notebook computer that enables many devices, such a printer, big screen, and keyboard, to be attached at once.

Learn more about A port replicator refer :

brainly.com/question/14312220

#SPJ4

4 0
1 year ago
Which of these technologies has been most used by terrorist organizations?
Paha777 [63]

Answer:

Phishing and Social Media

Explanation:

A quick web search can give you this information. Terrorist organizations have used social media to socially engineer innocent people into joining their organizations and more. Phishing is also an attack that's used to obtain critical information such as hashes or plaintext credentials to get into people's accounts. This is a tactic that's also been used by terrorist organizations in the past.

5 0
2 years ago
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
Other questions:
  • How people have contributed to the advancement of science
    7·1 answer
  • A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as oth
    15·2 answers
  • Name the months that have 30 days​
    6·2 answers
  • The memory unit of a computer has 2M Words of 32 bits (or 4 bytes) each. The computer has an instruction format with 4 fields: a
    14·1 answer
  • The number of pixels displayed on the screen is known as ________.
    13·1 answer
  • For each part create a vector n in which the first element is 1, the increment is 1 and the last term is 5, 50, or 5,000. Then u
    13·1 answer
  • What is computer. Write full form of mips​
    15·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • 100 points for this and brainlyist lol
    11·1 answer
  • When locating and correcting accessibility issues for a document, you would click what first?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!