1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
2 years ago
8

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve

r has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?a. NET
b. PING
c. NSLOOKUP
d. IPCONFIG
Computers and Technology
1 answer:
sattari [20]2 years ago
3 0

Answer:

IPCONFIG Pls mark brainliest

Explanation:

You might be interested in
Assume there is an interactive math tutor. Many students take the math lessons online. At the end of each lesson, students have
Rus_ich [418]
Oh gosh oh I don’t wowiww
6 0
2 years ago
Which of the following activities can cause data to be damaged or lost?
jekas [21]
Illegal access to a system
3 0
3 years ago
Indicate if the following statements are True or False. Statement Circle one Internet Service Providers (ISPs) are proprietary n
Artyom0805 [142]

Answer:

False

Explanation:

Proprietary networks are those that are privately and exclusively managed, controlled and even owned by some organizations.

Internet Service Providers (ISPs) are companies that provide internet access services to companies and consumer products. They allow devices to connect to the internet. They offer much more than just internet access. They also offer related services such as email access, web development and virtual hosting.

ISPs can be open source or proprietary. They could be owned by a community, a firm and even non-profit organizations.

5 0
2 years ago
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
Nataly_w [17]

Answer:

This question was initially incomplete. Here is the full question:

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

a) The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.

b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

c) A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.

d) A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

The correct answer is b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

Explanation:

For e-commerce sites, shopping cart information are stored as cookies on the visitor's computer such that when the website visitor leaves the website and comes back a few days later, their shopping preferences are remembered.

If the website visitor uses an anonymous window, the cookies created during the browsing session will be deleted when the anonymous website is exited and so, items placed in the shopping cart for future purchase will not be saved.

3 0
2 years ago
Instant messaging is commonly referred to as
melomori [17]
Chat, IM, in real-time
7 0
3 years ago
Other questions:
  • Define the following term: - hue
    11·2 answers
  • Jill needs to create a chart for technology club that shows what percentage of total students in the school play video games. Wh
    11·2 answers
  • Where would the information needed to start a computer be stored
    10·1 answer
  • What is Mainframe computer​
    15·1 answer
  • A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
    15·1 answer
  • The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per
    7·2 answers
  • Pls help I will give points
    7·1 answer
  • What is E-Commerce? Answer The Following. Pls Help Me​
    5·1 answer
  • China's cultural diversity, China is composed of 56 ethnic groups.
    5·1 answer
  • Hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!