1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
7

A dns query failure is referred to a higher level domain name server under what condition

Computers and Technology
2 answers:
yanalaym [24]3 years ago
6 0

A DNS query (also known as a DNS request) is a demand for information sent from a user's  computer (DNS client) to a DNS server. In most cases a DNS request is sent, to ask for the IP  address associated with a domain name. An attempt to reach a domain is actually a DNS client  querying the DNS servers to get the IP address, related to that domain.

Further Explanation:

The server at www.bleepingcomputer.com can't be found, because the DNS lookup  failed. DNS is the network service that translates a website's name to its Internet address. This  error is most often caused by having no connection to the Internet or a mis-configured network  Condition of DNS query failure is referred to a higher level Domain Name  Server  The condition is when a flag is raised and it doesn't have enough information to allow  the request. Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the  local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is  local, it may or may not have the enough information to allow the address to be resolved. If the recursion  flag is set, the local DNS will continue to query higher level DNS until it is able to resolve the address.in  short “The condition is when a flag is raised and it doesn't have enough information to allow  the request”.

Learn more:

  • What type of dns record is used to delegate a dns zone?

        brainly.com/question/6583162

Keywords: DNS, query, domain, server, IP adress, flags

zalisa [80]3 years ago
5 0
Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is local, it may or may not have the enough information to allow the address to be resolved. If the recursion flag is set, the local <span>DNS will continue to query higher level DNSs until it is able to resolve the address.  In short, t</span>he condition is when a flag is raised and it doesn’t have enough <span>information to allow the request.</span>
You might be interested in
In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
Ierofanga [76]

In very simple terms, netiquette is etiquette on the internet. It is a short form of network etiquette. It represents the importance of proper manners online. Common guidelines for good netiquette include being very courteous and avoiding instances of cyber-bullying. Although the specific protocols governing netiquette may differ depending on the forum being used, it is equally applicable to emails and surfing the internet, message boards, and chatting. In the workplace, netiquette implies that you have polite manners, and that you would want to build up relationships with people. By showing respect to your colleague through proper netiquette, it will show how productive you can be and as result, you will earn respect. Understanding netiquette in the workplace can save you from embarrassing moments. In sending job emails, for instance, always speak clearly and avoid using capitalized words, spelling errors, or slang.

8 0
4 years ago
Carlos wrote a check for $44.92 to pay his gas bill. He’ll use the check register to record his transaction. What will be his ne
Finger [1]

Answer:

-44.92

Explanation:

If he has no money hell be in the hole

8 0
3 years ago
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Tems11 [23]

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

4 0
3 years ago
Define the following <br>chatting <br>browsing <br>E-commerce​
vova2212 [387]

Answer:

- <em>chatting</em>: real-time communication via keyboard between two or more users on a local network (LAN) or over the Internet.

- <em>browsing</em>: refers to reading and scanning through data; commonly used to describe when a user reads through pages on the Internet and is also often referred to as surfing.

- <em>e-commerce</em>: commercial transactions conducted electronically on the internet.

5 0
3 years ago
Why is it so important to have a checking account?
aalyn [17]

Answer: Having a checking account sets you up for financial success. Get access to your money quicker, complete financial transactions on your phone or tablet, rest assured that your money is protected, and easily track your spending so you can make better money choices.

Explanation: Hopefully this helps you. (pls don't report if wrong)

8 0
3 years ago
Read 2 more answers
Other questions:
  • The critical path in a project network is:______ A. The Shortest path through the network. B. Longest path through the network.
    8·1 answer
  • The software program you need to have to read PDF file, such as the PDF files you download from your My Courses page, is
    9·2 answers
  • Imagine you are asked to set up a network for connecting 50 computers in an office environment. Discuss the type of network you
    13·1 answer
  • Plz answer me will mark as brainliest​
    6·1 answer
  • Differences between the first four generations of computers​
    12·1 answer
  • How does porter’s competitive forces model help companies develop competitive strategies using information systems?
    13·1 answer
  • Differentiate between a software package and integrated software and why users would choose one over the other.
    11·1 answer
  • How to install an older version of prettier on yarn
    9·1 answer
  • How to change the microsoft word pages to black background
    8·1 answer
  • A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!