1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
8

DNS forwarding can be set up so that if the DNS server that receives the forwarded request cannot resolve the name, then the ser

ver that originally forwarded the request attempts to resolve it, which is called ____.
Computers and Technology
1 answer:
hoa [83]3 years ago
8 0

Answer:

Nonexclusive forwarding

Explanation:

In Nonexclusive forwarding, DNS forwarding is setup so that if the DNS server receiving the forwarded request cannot resolve the name, then the server that originally forwarded the request makes an attempt to resolves it. If that fails, the server sends a request to its designated forwarder.

You might be interested in
After earning a learner’s license, what test must be successfully passed to earn an operator’s license?
Phantasy [73]
After earning a learner's license, the next test that must be successfully passed to earn an operator license is Class E License Test. 

Hope this helped!
3 0
3 years ago
Read 2 more answers
Helpppppppppppppp me pl;s
Natasha_Volkova [10]

Answer:

Option C or 3

Explanation:

solar panels can only produce energy when the sun is shining because all of the energy it produces is stored in a battery which then you use during the dark hours of the day. You also need to maintain the cleanliness of the panels because if they get dusty they will not produce as much energy.

8 0
3 years ago
Longitud de un circulo​
const2013 [10]

Answer:

circunferencia (o perímetro de una circunferencia) L es igual a dos veces el radio (r) por π, o lo que es lo mismo, el diámetro (D) de la circunferencia porπ. ... El concepto “longitud de una circunferencia” es igual al del “perímetro del círculo” y miden lo mismo.

5 0
3 years ago
A _____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent
LUCKY_DIMON [66]
I think its a virus or a trojan horse
8 0
3 years ago
Complex scientific research is usually done using?
garik1379 [7]

Complex scientific research is usually done using A Mainframe Computer.

<h3>What is a Mainframes computer?</h3>

Mainframes are a type of computer that generally are comprehended for their large size, amount of storage, processing power and high level of reliability. They are primarily used by large organizations for mission-critical applications requiring high volumes of data processing. In general, there are a few characteristics of mainframes that are common among all mainframe vendors:

Nearly all mainframes have the ability to run (or host) multiple operating systems. Mainframes can add or hot swap system capacity without disruption. Mainframes are designed to handle very high volume input and output (I/O) and emphasize throughput computing. A single mainframe can replace dozens or even hundreds of smaller servers.

Thus, Mainframe Computer is the answer.

To learn more about   Mainframe Computer click here:

brainly.com/question/14480599

#SPJ1

4 0
2 years ago
Other questions:
  • How does the team know what to work upon during the iteration
    6·1 answer
  • Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
    13·1 answer
  • All digital images are made up from varying rectangles of color, called _____________.
    6·2 answers
  • Why is it important to develop a research plan?
    5·1 answer
  • (3.01 MC)
    11·1 answer
  • Suppose a variable is passed By Value to a parameter of a Sub procedure, and the parameter has its value changed inside the Sub
    13·1 answer
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • The following are a set of named spreadsheets with the indicated column headings. Use these spreadsheets to answer exercises 1.3
    7·1 answer
  • On the Next Generation firewall, what type of security profile detects infected files being transferred with the application?
    15·1 answer
  • What is Fill handle?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!