1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
4 years ago
15

• what command-line utility can you use to assign the correct dns server ip address

Computers and Technology
1 answer:
Lilit [14]4 years ago
5 0
On A Windows machine, you can use the netsh command.
<span>netsh interface ip set dns name="Local Area Connection" static 208.67.222.222

All the steps below means you have access to the router via Telnet or physical access  and it already has a valid configuration (except the DNS)
On a Cisco Router is:
</span><span>Step 1:  <span>enable 
</span></span><span>Step 2: <span>configure <span>terminal 
</span></span></span><span>Step 3: <span>Do one of the following: <span><span>ip domain name name
                                                       </span><span><span>ip domain list </span><span>name
</span></span></span></span></span><span>Step 4 : Device(config)# ip name-server 172.16.1.111 172.16.1.2</span>
You might be interested in
"Explain the functionality of the different layers found in the network protocol stack of an operating system such as Linux"
arsen [322]

Answer:

There are 7 layers in linux.

Explanation:

As networking is difficult and complex.

Imagine if every application had to know how to communicate on every step that would be more than just complex. So, rather than reinvent something which will help it to communicate let’s just make something that will automatically controls the communication and for that protocols came in to live.

As for the linux operating system, it is not exceptional from other operating systems.

There are 7 layers on network protocol stack use to communicate with other network protocol stack.

1. Application layer

2. System call interface

3. Protocol agnostic interface

4. Network protocol

5. Device agnostic interface

6. Device drivers

7. Physical hardware

All the layers vary in their functionality.

One more important thing to remember is that the network protocol stack layers is not one way its 2 way communication. First, when a client request to a network and second, when the request is full filled.

The top most layer is a part of user space, the next five layers comes in the kernel space and the final layer is the physical layer.

<u>Application layer: </u>

When a client or user request to  a network the request initially comes to this layer.

On this layer we use tcp/ip protocol.

<u>System call interface(SCI): </u>

When application layer make a call to the kernel this layer handles that call. And take the request to the next layer.

<u>Protocol agnostic interface: </u>

This layer has two functions “talking” or “listening”. There is a thing called sockets which perform these functions and each socket has an id which is used specifically for an application.

<u>Network protocol: </u>

This layer is used for how the data is sent or received.

<u>Device agnostic interface: </u>

It is used to connect data from/to kernel user space and the network device drivers which allows the data to prepare itself for transmission over the medium from the network device.

<u>Physical hardware : </u>

This layer is responsible for the data packets transmission and received from the network medium being used whether cable or wireless.

5 0
4 years ago
Explain the basic operations of a computer system​
Leona [35]

Answer:

Basically computer does 5 basic operations that are input, output, process,storing and controlling. Input is basically taking data from the user, processing is transferring that data into useful information, then that information needs to be stored and controlled and finally output is give to user.

5 0
3 years ago
Read 2 more answers
Given numrows and numcols, print a list of all seats in a theater. rows are numbered, columns lettered, as in 1a or 3e. print a
trapecia [35]

/* package whatever; // don't place package name! */

import java.util.*;

import java.lang.*;

import java.io.*;

class NestedLoops {

public static void main (String [] args) {

int numRows = 4;

int numCols = 5;

int i,j;

char ch = 'A';

// Note: You'll need to declare more variables

/* Your solution goes here */

for ( i = 0; i < numRows; i++) { // Outer loop runs for numRows times

for ( j = 0; j < numCols; j++) { // Inner loop runs for numCols times

System.out.print(i+1);

System.out.print((char)(ch+j));

System.out.print(" ");

}

}

System.out.println("");

return;

}

}

8 0
4 years ago
Working ____ means that you are viewing previously loaded or saved webpages in the browser, but you are not connected to the int
uysha [10]
Working offline is the answer
8 0
4 years ago
Write a program that calculates the amount of money in a savings account that earns a guaranteed yearly interest rate. The progr
White raven [17]

Solution :

# Reading principle amount from user

$\text{accountPresentValue}$ = eval($\text{inpu}t("$Enter principle amount: "))

# Reading time duration in number of year from user

years = eval(input("Enter time duration in number of year: "))

# Reading interest rate from user

annualInterestRate = eval(input("Interest rate: "))

# calculating futureValue using user input data

futureValue = accountPresentValue * (1 + annualInterestRate / 100) ** years

# printing calculated futureValue to console

print("Final balance =",futureValue)

7 0
3 years ago
Other questions:
  • What is a drawback to being in Slide Show mode? a- Being able to review each slide in order
    8·2 answers
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • What does subscribing to a website’s RSS feed provide to a subscriber?
    10·1 answer
  • Unlike artistic drawings, which communicate self-expression and
    15·1 answer
  • Using a "word" of 5 bits, list all of the possible signed binary numbers and their decimal equivalents that are represent able i
    12·1 answer
  • You work for a company that builds custom PCs for select clients. You are training a new employee to evaluate and select appropr
    13·1 answer
  • Which of the following contributes to your active digital footprint
    12·2 answers
  • What keyword must be used on any method (function) on your class that is called from your main() method?
    15·1 answer
  • Write a function:
    13·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!