1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
4 years ago
5

While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using

Computers and Technology
2 answers:
serious [3.7K]4 years ago
4 0
Hostname is assigned to a device that would be connected to the computer network and thus would help in identifying the form of electronic communication. While in an interactive nslookup session, one would use the DMNNAMSVR keyword to change the DNS server one is using.
Deffense [45]4 years ago
4 0

Answer

While in an interactive nslookup session, one would use the <u>DMNNAMSVR </u>keyword to change the DNS server one is using.


<u>Explanation:</u>

we assign a Hostname  to a device tand after assigning hostname we  connects that device to the computer network and in this way it helps in establishing the form of electronic communication.


You might be interested in
your manager has asked you to implement a network infrastructure that will accommodate failed connections. which of the followin
Softa [21]

The <u>Mesh</u> network topologies provides redundancy for a failed link.

What are network topologies?

A communication network's topology refers to <u>how its components are organized.</u> Command and control radio networks, industrial fieldbuses, and computer networks are just a <u>few examples of the several types of telecommunication </u><u>networks </u><u>that can be defined or described using </u><u>network topology</u><u>.</u>

There are eight fundamental topologies that can be identified by studying network topology: <u>point-to-point, bus, star, ring or circular, mesh, tree, hybrid, or daisy chain.</u>

Examples of physical network topologies include star, mesh, tree, ring, point-to-point, circular, hybrid, and bus topologies. <u>Each of these </u><u>networks </u><u>consists of a unique arrangement of nodes and links.</u>

To learn more about network topologies, use the link given
brainly.com/question/13818848
#SPJ4

4 0
1 year ago
Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that
Leokris [45]

Answer:

separation of duties, accountability, people

Explanation:

Three of the most important jobs of security management are to ensure separation of duties are organized according to sensitivity, ensure that roles maintain accountability, and to manage people because that is the enemy of security.

4 0
3 years ago
// This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
Vikki [24]

Answer:

C++ code is given below

Explanation:

#include<iostream>

#include <cstring>

using namespace std;

int housekeeping(string EOFNAME);

int mainLoop(string name,string EOFNAME);

int finish();

void main()

{

  string name;

  string EOFNAME = "ZZZZ";

  cout << "enter the name" << endl;

  cin >> name;

  if (name != EOFNAME)

  {

      housekeeping(EOFNAME);

  }

  if (name != EOFNAME)

  {

      mainLoop(name , EOFNAME);

  }

  if (name != EOFNAME)

  {

      finish();

  }

  system("pause");

}

int housekeeping(string EOFNAME)

{  

  cout << "enter first name " << EOFNAME << " to quit " << endl;

  return 0;

}

int mainLoop(string name, string EOFNAME)

{  

  int hours;

  int rate,gross;

  int DEDUCTION = 45;

  int net;

  cout << "enter hours worked for " << name << endl;

  cin >> hours;

  cout << "enter hourly rate for " << name << endl;

  cin >> rate;

  gross = hours*rate;

  net = gross - DEDUCTION;

  if (net > 0)

  {

      cout << "net pay for " << name << " is " << net << endl;

  }

  else

  {

      cout << "dedections not covered.net is 0.";

  }

  cout << "enter next name or " << EOFNAME << " to quit" << endl;

  cin >> name;

  return 0;

}

int finish()

{

  cout << "end of job"<<endl;

  return 0;

}

3 0
4 years ago
Microsoft words spell checker
Virty [35]
To check spelling<span> in a </span>Word<span> document, open up the document, head to the “Review” tab, then click on “</span>Spelling<span> & Grammar” (part of the “Proofing” group of tools). 

</span>
4 0
3 years ago
Ursa Major Solar wants to automatically notify a manager about any cases awaiting a response from an agent for more than 2 hours
weqwewe [10]

The feature that the administrator has to use to fulfill this requirement is a  Case Escalation Rule.

The answer to this question is option A.

<h3>What is a case escalation rule?</h3>

This is what is used to reroute a case. It has the ability of passing notifications to a user after a given length of time has gone by.

With this rule the person would be able to make the choice is the case is to be escalated or if it should be passed to a different user.

Read more on the Case Escalation Rule here:

brainly.com/question/14161284?referrer=searchResults

An escalation rule automatically reroutes a case and can notify a user if the case remains open after a certain period of time has passed. With an escalation rule, you can: Choose to escalate a case to a queue or to another user.

3 0
2 years ago
Other questions:
  • You have implemented nap with dhcp enforcement, so you need to ensure you have an updated anti-virus software package, an update
    7·1 answer
  • Need help with this C++ question
    5·1 answer
  • By which method is heat transferred through a metal <br> spoon?
    9·2 answers
  • _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a
    12·1 answer
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • Which of the following is something you need to keep an eye out for
    7·2 answers
  • System inputs and outputs are produced at the end of the: A. systems analysis phase of the SDLC. B. systems planning and selecti
    12·1 answer
  • think about any special skills or passions you have and describe a way you might apply them to earn money.
    7·1 answer
  • A user brings a technician a mobile device that has no sound. What should a technician check for first?
    5·1 answer
  • Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs wi
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!