1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
13

What two names are used to describe the configuration in which internal and ​external dns queries are handled by different dns s

ervers or by a single dns server that is specially configured to keep internal and external dns zones separate? this is a multiple-select question. be sure to check all answers that are correct?
Computers and Technology
1 answer:
olchik [2.2K]3 years ago
8 0
The two names are : split DNS & DMZ DNS.  They are <span>used to describe the configuration in which internal and ​external dns queries are handled by different dns servers or by a single dns server that is specially configured to keep internal and external dns zones separate.</span>
You might be interested in
What is the difference between a Network Diagram and a Wiring Semantic?
stiks02 [169]

Answer:

Network diagram is the type of graphical networking chart that is basically used in the various type of computer telecommunication. The network diagram is useful for the networking designer and also for the network engineer for compiling the network documentation in detail.

Wiring semantic is the type of open source prototype platform which basically composed of the programming language and the IDE ( Integrated development environment). The wiring semantic consumer can affect the triggering the new data or information from the existing concepts.

7 0
3 years ago
Can we declare top level classes as private or protected?
uysha [10]

Answer and Explanation:

top level class can not be declare as private or protected. It is always public. If we declare a top level class as private then the compiler always complain that the  private is not allowed  and if we declare top level class as protected then compiler complain that modifier protection is not allowed here. so we can not declare top level class as private or protected

5 0
3 years ago
Mix ‘em Let s1 and s2 be 2 c-strings of the same length. Write a function char* mixem(char*s1, char* s2) which returns a c-strin
Shkiper50 [21]

Answer:

See Explaination

Explanation:

#include <iostream>

#include <string.h>

using namespace std;

char *mixem(char *s1, char *s2);

int main() {

cout << mixem("abc", "123") << endl;

cout << mixem("def", "456") << endl;

return 0;

}

char *mixem(char *s1, char *s2) {

char *result = new char[1 + strlen(s1) + strlen(s2)];

char *p1 = s1;

char *p2 = s2;

char *p = result;

while (*p1 || *p2) {

if (*p1) {

*p = *p1;

p1++;

p++;

}

if (*p2) {

*p = *p2;

p2++;

p++;

}

}

*p = '\0';

return result;

}

5 0
3 years ago
Which of the following are screen objects used to maintain, view, and print data from a database
amid [387]

Answer:

The correct answer to the following question will be "A spreadsheet".

Explanation:

  • A spreadsheet is a software device used to access and stores data from such a database. The interaction between separate entities (in separate tables) is controlled by their specific columns.
  • It's a programming program for arranging, evaluating and storing data in tabular format.
  • The spreadsheets have been developed as computer-controlled analogs to paper reporting worksheets. The system runs on data decided to enter in table cells.

Therefore, a Spreadsheet is the right answer.

8 0
3 years ago
A) How can jitter be reduced on a user’s PC if there is jitter in incoming packets?
ELEN [110]

Answer:

a.) Incoming packets can be placed in the buffer and played back without the jitter.

b.) Buffering would increase the latency because there would be a delay in time when the packets enter the buffer and the time is released.

Explanation:

Jitter is referred technically as a packet delay variations.

It is variation in the periodicity of periodic events or a signal from target or the true frequency.

6 0
3 years ago
Other questions:
  • A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat
    14·1 answer
  • Judy forgot where she saved a certain file on her computer. Therefor, she searches for all files with a jpg file extension. Whic
    11·2 answers
  • The more resources you have to choose from during an open book test, the better you will do on the test because more
    13·1 answer
  • The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
    14·2 answers
  • Create your own Python code examples that demonstrate each of the following. Do not copy examples from the book or any other sou
    11·1 answer
  • CHALLENGE ACTIVITY 3.7.2: Type casting: Reading and adding values.
    10·1 answer
  • While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
    5·1 answer
  • CAN SOMEONE PLEASE DO THESE FOR ME I WILL GIVE BRAINLIESR AND 20 POINTS PLEASE ITS ONLY 5 QUESTIONS PLEASEEEE
    12·1 answer
  • Choose the term that matches each description.
    15·1 answer
  • RAM IS often referred
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!