1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
8

The default setting for a secondary zone's refresh interval is how many minutes

Computers and Technology
1 answer:
Vinil7 [7]3 years ago
4 0
The default value at which a refresh interval (an interval a sec. server check for zone updates) is 15 minutes.
If this value is increased, the network traffic is reduced. In the eventuality that the refresh interval expires, the secondary zone will contact the primary zone and request it to initiate the zone transfer.
You might be interested in
Rebecca has finished with the research and outline portion of her slide presentation now the next logical step is to begin worki
e-lub [12.9K]

Answer:

The answer is creating and layout and template style

Explanation:

APEX VERIFIED just did it

4 0
3 years ago
Read 2 more answers
What is the purpose of the 300 Log?
egoroff_w [7]

Answer:

The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.

Explanation: brainliest plzzzz!

4 0
3 years ago
Which of the following describes an iteration in a computer program?
MakcuM [25]

Answer:

a set of instructions that can be run multiple times throughout a program

Explanation:

7 0
3 years ago
What should you consider when developing your website content?​
Law Incorporation [45]

Answer:

what your customers are looking for.

your latest promotions and discounts.

your brand values.

whether the content will go viral or not

3 0
3 years ago
Read 2 more answers
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Other questions:
  • What are the two elements of creating a flyer
    12·2 answers
  • A misfire code is a type _______ diagnostic trouble code (DTC).
    5·1 answer
  • What process improves the life of a computer
    11·1 answer
  • What are the modes of operation of WLANs?
    5·1 answer
  • 4. The Internet may best be compared to a/an A. series of colored lights. B. loud truck motor. C. enormous skyscraper. D. large
    6·1 answer
  • If we collect data on the number of wins each team in the NFL had during the 2011-12 season, we have _____________ data.
    10·1 answer
  • During project management, who executes tasks and produces the deliverables as stated in the project plan and as directed by the
    9·1 answer
  • Have fire have ....<br><br>babi​ from babi098
    7·1 answer
  • When you tried to login to server your trail may faild this failure event is recorded in<br>​
    15·1 answer
  • The address for the website you want to visit is called the browser internet URL World Wide Web
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!