1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
11

The dns clients that make requests to the dns server are known as ____________.

Computers and Technology
2 answers:
Sedaia [141]3 years ago
7 0

Answer:

2017

Explanation:

beks73 [17]3 years ago
6 0
<span>The dns clients that make requests to the dns server are known as : </span>Recursive queries

-Hope this helps.
You might be interested in
Combining two or more cells to make one is called​
Nonamiya [84]

Answer:Combining two or more cells into one cell uses a Word feature called: Merge Cells.

Explanation:

7 0
3 years ago
Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclus
monitta

Answer:

public static void randomize(RegularPolygon r){

   int side = (int)((20-10) * Math.random()) + 10;

   int length = (int)((12-5)  * Math.random()) + 5;

   // assuming the regularpolygon class has setSide and setLength methods.

   r.set.Side(side);

   r.setLength(length);

}

Explanation:

The randomize method is used to access and change the state of the RegularPolygon class attributes sides and length. The method accepts the class as an argument and assigns a random number of sides and length to the polygon object.

8 0
2 years ago
Which of the following options would you use when saving a document with a new filename? *
Paha777 [63]
Save As, or Save A Copy.
3 0
3 years ago
Read 2 more answers
Which two components are configured via software in order for a PC to participate in a network environment
dalvyx [7]

Answer:

IP address and subnet mask.

Explanation:

The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;

I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.

II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.

6 0
2 years ago
an engineer is writing a web application that requires some user input. the engineer has put a submit button on their page and n
Setler [38]

In order to make the program recognize the clicking of a button, the engineer should add an event listener to the JavaScript code.

An event is considered to be a vital part of JavaScript because a web page responds according to the event that occurred. Some events are generated by APIs and some are user-generated events. For example, clicking or moving the mouse button and pressing a key on the keyboard are user generated events.

In order to handle the user-generated events in JavaScript,  an event listener is used. An event listener is a function or procedure in a JavaScript program that waits for an event to occur; such as pressing a key on the keyboard or clicking the button. Therefore based on the scenario given in the question statement, the engineer should use an event listener to his JavaScript code so that the code can recognize the click of the button.

You can learnmore about event at

brainly.com/question/20169706

#SPJ4

7 0
9 months ago
Other questions:
  • Despite its vivid design, the website for Lolly's Bookstore did not seem to attract customers who lingered. In fact, most websit
    13·1 answer
  • The difference between a want and a need is a want is not necessary for survival. Things necessary for survival are known as ___
    6·1 answer
  • Which term describes the situation wherein a jury fails to reach a unanimous verdict? A occurs when a jury cannot reach a unanim
    14·1 answer
  • Conversion of a continuous stream of sound into a series of ones and zeroes that can be interpreted by computers results in
    12·1 answer
  • The loss of privacy data has implications:
    5·1 answer
  • An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase
    11·1 answer
  • Write code that uses the input string stream inSS to read input data from string userInput, and updates variables userMonth, use
    8·1 answer
  • Describe how both IPv4 and IPv6 access and utilize TCP as an upper-layer transfer protocol.
    6·1 answer
  • You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open
    5·1 answer
  • Acciones de un lápiz
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!