1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
9

How does the DNS solve the problem of translating domain names like example.com into IP addresses?

Computers and Technology
1 answer:
TEA [102]3 years ago
6 0

Answer:

DNS translates domain names and hostnames into IP addresses through a basic lookup function.  When a user requests a domain name (as in the case of a browser lookup) the computer queries the local DNS server to find the matching IP address.  If the local DNS server does not contain the information in it's local database, it contacts the next higher DNS system or the root domain DNS servers (i.e. microsoft.com - if the local system does not know it, it will query the well-known DNS server for the .com domain - which will know where to get the information).  

DNS helps the users by not requiring them to remember the IP address of every system them want to connect with.  microsoft.com is much easier to remember than 40.82.167.220.  

DNS also helps the internet scale through the use of load balancing.  Multiple systems can comprise a single web site with the web pages stored on many different machines with multiple IP addresses.  When a user requests the microsoft.com website IP, they are given the primary IP of the load balancer sitting in front of the multiple computers.  The load balancer will then distribute the traffic to any of the systems that are hosting the web page that are not busy.  To the end user it look like they are connecting to a single machine - when in fact they are connecting to one of potentially hundreds of web servers with the same content.  As traffic grows on the internet more servers are necessary to handle the additional traffic.  DNS helps ensure the end user will connect to the proper web server regardless of the number of web server copies spun up in response to the additional traffic.  This allows the capacity to scale as necessary without interruption to the web site.  

Explanation:

You might be interested in
Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a
PilotLPTM [1.2K]

Answer:

Here is the JAVA program that produces Caeser cipher o given message string:

import java.util.Scanner;  //to accept input from user

public class Main {  

   public static void main(String args[]) {  //start of main function

       Scanner input = new Scanner(System.in);  //creates object of Scanner

       System.out.println("Enter the message : ");  //prompts user to enter a plaintext (message)

       String message = input.nextLine();  //reads the input message

       System.out.println("Enter the amount by which by which to rotate each letter : ");  //prompts user to enter value of shift to rotate each character according to shift

       int rotate = input.nextInt();  // reads the amount to rotate from user

       String encoded_m = "";  // to store the cipher text

       char letter;  // to store the character

       for(int i=0; i < message.length();i++)  {  // iterates through the message string until the length of the message string is reached

           letter = message.charAt(i);  // method charAt() returns the character at index i in a message and stores it to letter variable

           if(letter >= 'a' && letter <= 'z')  {  //if letter is between small a and z

            letter = (char) (letter + rotate);  //shift/rotate the letter

            if(letter > 'z') {  //if letter is greater than lower case z

               letter = (char) (letter+'a'-'z'-1); }  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //compute the cipher text by adding the letter to the the encoded message

           else if(letter >= 'A' && letter <= 'Z') {  //if letter is between capital A and Z

            letter = (char) (letter + rotate);  //shift letter

            if(letter > 'Z') {  //if letter is greater than upper case Z

                letter = (char) (letter+'A'-'Z'-1);}  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //computes encoded message

           else {  

         encoded_m = encoded_m + letter;  } }  //computes encoded message

System.out.println("Encoded message : " + encoded_m.toUpperCase());  }} //displays the cipher text (encoded message) in upper case letters

Explanation:

The program prompts the user to enter a message. This is a plaintext. Next the program prompts the user to enter an amount by which to rotate each letter. This is basically the value of shift. Next the program has a for loop that iterates through each character of the message string. At each iteration it uses charAt() which returns the character of message string at i-th index. This character is checked by if condition which checks if the character/letter is an upper or lowercase letter. Next the statement letter = (char) (letter + rotate);   is used to shift the letter up to the value of rotate and store it in letter variable. This letter is then added to the variable encoded_m. At each iteration the same procedure is repeated. After the loop breaks, the statement     System.out.println("Encoded message : " + encoded_m.toUpperCase()); displays the entire cipher text stored in encoded_m in uppercase letters on the output screen.

The logic of the program is explained here with an example in the attached document.

8 0
4 years ago
Which is true for a hosted blog software
professor190 [17]
Since you have not provided the choices wherein I will have to choose from to arrive at an answer, I will just explain to you the concept revolving around a hosted blog software. Hosted blog software are basically installed by the owner of the web server in which among its famous platforms is the Blogger.
7 0
3 years ago
Read 2 more answers
When was the first analog device, the phonautograph, launched?
Nataly_w [17]

Answer:

1860

Explanation:

4 0
2 years ago
Only Lysita knows the password for the question......
emmasim [6.3K]
The correct answer is 1234.

7 0
4 years ago
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
Temka [501]

Answer:

The answer is (B) Maximum password age.

Explanation:

To prevent several changing of passwords by a user in a day, the maximum times a password can be rest within a day is normally set by  the system administrator.

The setting ensures the password is returned to the current settings of the password on the system for the user and prevents unnecessary changing of passwords in a day by user.

6 0
4 years ago
Read 2 more answers
Other questions:
  • Who is president is US
    5·1 answer
  • Emotional intelligence is a new term to describe personal traits ?
    12·1 answer
  • Why do some people think the global<br> economy is good for the United States?
    10·1 answer
  • The continue statement _________.
    11·1 answer
  • Discuss the difference between a broad internet search and a narrow internet search?
    12·2 answers
  • Anybody know this question??
    8·1 answer
  • It is possible to change the shape of a text box.
    10·1 answer
  • State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translat
    14·1 answer
  • Direction: using the data at the left, answer the questions that follows.​
    11·1 answer
  • the current food label has been in place for 20 years. the fda has proposed changes to this label for a variety of reasons, such
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!