1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
7

You type a web address in your web browser. order the steps, which describe the internet name resolution process for the web add

ress.

Computers and Technology
1 answer:
padilas [110]3 years ago
6 0
First of all let's make it clearer, what is meant by "domain name resolution"?
"Domain name resolution" is the process of translating your web address into its corresponding IP address. e.g. translating (www.brainly.com to 104.16.32.180)
Computers cannot understand the human language they only can understand numbers that's why we need this process.

So, the process (in a very simple way) is divided into four steps:
1) Lookup "root nameservers"
2) Lookup "Top Level Domain TDL nameservers"
3) Lookup "domain nameservers"
4) Lookup "subdomain nameservers" [if exist]

If you still confused please check out this video https://www.youtube.com/watch?v=BCjUbpIzRs8&index=10&list=PL4bq-KmCeyBmMvBB3-RT6ikdp8ljV9GeT

You might be interested in
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the spe
kirza4 [7]

Answer:

The fifth-generation wireless broadband technology based on the 802.11ac standard is called the

5G.

Explanation:

The 5G is the newest baby in town in the area of wireless broadband technology.  The technology is based on the IEEE 802.11ac standard. 5G operates with a 5Ghz signal and is set to offer out-of-this-world speeds of up to 1 Gb/s.  This implies massive connectivity for everyone and everything.  However, its trial has been fraught with many challenges.  Questions have been raised, especially relating to some health concerns about the technology.  However, many advantages have been ascribed to this wireless technology.  They include more reliability, massive network capacity, increased availability, more uniform user experience, higher performance. and improved efficiency.

4 0
3 years ago
Which year was the Apple 2 released? <br>A) 1979 <br>B). 1973 <br>C). 1980 <br>D). 1977​
sesenic [268]

Answer:

1977

Explanation:

Apple 2 was released in April 19th 1977

6 0
3 years ago
Read 2 more answers
What is boolean rules​
masha68 [24]

Answer:

Boolean Algebra uses a set of Laws and Rules to define the operation of a digital logic circuit. As well as the logic symbols “0” and “1” being used to represent a digital input or output, we can also use them as constants for a permanently “Open” or “Closed” circuit or contact respectively.

6 0
3 years ago
Jacek has just started a new job as a sales clerk, and his first task is to create a new sales invoice. Which Microsoft software
g100num [7]

Answer:

Microsoft Excel

Explanation:

Microsoft Excel is a Microsoft application package. It is a spreadsheet application used to analyse and manipulate data. It has columns which are referred to fields and rows also known as records.There are various features in excel that used to create statistical and graphical esctasies and data presentations.

It can be used to create template for CVs/resumes, Bank draft, receipts and invoice etc.

5 0
3 years ago
Other questions:
  • You can choose which rules you want excel to use by enabling and disabling them in the ____ area in the excel options dialog box
    11·1 answer
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
    8·1 answer
  • Which of the following sets of data would be represented best in a histogram
    10·1 answer
  • Gabriel needs to create a formula that does not change when it is copied to cell b2. which formula should he create?
    14·1 answer
  • ETC = 220,000 PV = 25,000 AC = 40,000. What is EAC? What does this calculation tell you?
    5·1 answer
  • Write a code that calculates the Greatest Common Divisor (GCD) of two positive integers (user-defined inputs). Include an except
    10·1 answer
  • What is a spark line? how is a different a chart​
    14·1 answer
  • I’ll give brainliest if answers are correct
    11·1 answer
  • Rr lyrae stars pulsate, but with shorter periods and lower luminosities than cepheids. true false
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!