1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
7

A dns query failure is referred to a higher level domain name server under what condition

Computers and Technology
2 answers:
yanalaym [24]3 years ago
6 0

A DNS query (also known as a DNS request) is a demand for information sent from a user's  computer (DNS client) to a DNS server. In most cases a DNS request is sent, to ask for the IP  address associated with a domain name. An attempt to reach a domain is actually a DNS client  querying the DNS servers to get the IP address, related to that domain.

Further Explanation:

The server at www.bleepingcomputer.com can't be found, because the DNS lookup  failed. DNS is the network service that translates a website's name to its Internet address. This  error is most often caused by having no connection to the Internet or a mis-configured network  Condition of DNS query failure is referred to a higher level Domain Name  Server  The condition is when a flag is raised and it doesn't have enough information to allow  the request. Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the  local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is  local, it may or may not have the enough information to allow the address to be resolved. If the recursion  flag is set, the local DNS will continue to query higher level DNS until it is able to resolve the address.in  short “The condition is when a flag is raised and it doesn't have enough information to allow  the request”.

Learn more:

  • What type of dns record is used to delegate a dns zone?

        brainly.com/question/6583162

Keywords: DNS, query, domain, server, IP adress, flags

zalisa [80]3 years ago
5 0
Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is local, it may or may not have the enough information to allow the address to be resolved. If the recursion flag is set, the local <span>DNS will continue to query higher level DNSs until it is able to resolve the address.  In short, t</span>he condition is when a flag is raised and it doesn’t have enough <span>information to allow the request.</span>
You might be interested in
Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
Korolek [52]

Answer:

The last option i.e "A class is an instance of its object" is the correct answer of this question.

Explanation:

A class is a collection of variable and method . The class is the blueprint of the object that means class is physical space entity and object is a runtime space entity.It is the the reusability feature of the programming component.

Following are the  syntax to declare any class.

                     Class classname

<u>For Example</u>: class test1

With the help of class we can achieve the inheritance, encapsulation and abstraction etc.

All the other options except the last one are correct option. Because option(1), option(2) and option(3) follow the property of class and object .  that's why last option is False.

4 0
3 years ago
Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
serious [3.7K]

Answer:

A. Network security allows organizations to continue to function.

C. Network security keeps intruders out of the network.

D. Network security prevents personal information from getting into the wrong hands.

Explanation:

Network security is a very important concept in networking. Mitigating cyber attacks like key logging, malicious software attacks, reconnaissance attacks, DOS attacks etc, have saved so many companies from bankruptcy and death.

Security in networks helps to prevent attackers from obtaining user personal information like Bank detail, health history etc.

5 0
3 years ago
1. Separate valid and invalid variables:
DedPeter [7]

Firstly we explain the variable and the declaration rule for the variable and further separating the valid and invalid variables.

  • Whenever a user is given a question, variables are data values that can vary. for example  age, CSL, etc.
  • It may alter and during the execution of the program.
  • It's a storage space for memories.
  • It has a name that corresponds to the location.
  • Data is stored in the memory location.

The rule for variable declaration:

  • The names of your variables should be based on the phrases used in the subject area, and they should reflect the variable's function.
  • By removing spaces between the words, you can make variable names. Each word in the name should be capitalized, including prepositions and pronouns that are one letter long.
  • An underscore should never be used to start a variable name.
  • Single-character variable names should be avoided. For loop counters, only short variable names are permitted.
  • After the state that equals the "true" value, name variables that describe binary states ("true" or "false").

The valid variable is:

CSL, Age,CLS,SEE,Stop5for,Give, $shopping, and United.

The invalid variable is:

Mark-sheet, Tel $, Simple Interest, and 545Newton.

Learn more:

brainly.com/question/2684763

5 0
3 years ago
Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
Stels [109]

Answer:

yes

Explanation:

yall share the same thing

5 0
2 years ago
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
Other questions:
  • Do Y’all know how to view your answers to others people questions on your profile? Please answer fast
    14·1 answer
  • A technician wants to create a new partition on a new additional hard drive. what tool should be used?
    15·1 answer
  • This library function returns a random floating point number within a specified range of values. The function returns a random f
    12·1 answer
  • ______ is using material created by others without obtaining permission from the original authors.
    10·2 answers
  • When specifying keywords to conduct an internet search, which of the following parts of speech will be the most useful??
    6·1 answer
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • If you could represent yourself with one object from your home what would it be ?
    9·2 answers
  • Create an application named SalesTransactionDemo that declares several SalesTransaction objects and displays their values and th
    12·1 answer
  • Convertbinary(111100)to decimal​​​​
    13·2 answers
  • C
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!