1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
8

You have two DCs, each with three Active Directory-integrated zones. You're getting inconsistent DNS lookup results and suspect

a problem with Active Directory replication. What tool can you use to investigate the problem?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
8 0

Since their or two domain controller and where their or three active directory is associates.

  • As first check the tcpip ranges to be checked if both falls on same tcpip address. Better to change the one from tcpip address.
  • Second is host and subdomain has to checked and reconfigure if necessary.
  • Computer name and connected their group to be checked.
  • With NSLOOKUP command from disk operation system come check ping tracking reply is positive or negative.

When we query for DNS, end user need to see the positive reply from list of servers. Possible for scanning the IPV6 address across the domains and find as positive or negative response. End user has to decide the primary and secondary domain controller’s

Normally secondary domain controller’s as to be configured as standard alone. On success on deciding primary and secondary domain controller’s automate the process from primary to secondary by configuration with ns records. Possible for domain partition also.

You might be interested in
Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.1
erica [24]

Answer:

The answer is "1918".

Explanation:

The RFC stands for "remote function call", it is also known as an abbreviated form. It is an application, that responses in a technical online design Task Force, it is also known as a document, which was prepared for review by shareholders to collects some information.  

The RFC reverses is also known as an idea, that uses IP version 4 to reverse the IP address, this process is done by TCP/IP protocol, which is defined under RFC 1918.  

4 0
3 years ago
Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.
dlinn [17]

Answer:

i think digital signals

Explanation:

A digital signal is a signal that is being used to represent data as a sequence of discrete values; at any given time it can only take on one of a finite number of values.[1][2][3] This contrasts with an analog signal, which represents continuous values; at any given time it represents a real number within a continuous range of values.

6 0
3 years ago
Read 2 more answers
Just a quick question, how do you set something == to char and int in an if statement (java)
Troyanec [42]

This is the requested code in java.

public class <em>CharTest</em> {

   public static String checkCharacter(String text, int index) {

       if (0 <= index && index <= text.length()) {

           char ch = text.charAt(index);

           if (Character.isLetter(ch)) {

               return ch + " is a letter";

           } else if (Character.isDigit(ch)) {

               return ch + " is a digit";

           } else if (Character.isWhitespace(ch)) {

               return ch + " is a whitespace character";

           } else {

               return ch + " is an unknown type of character";

           }

       } else {

           return "index " + index.toString() + " is out of range";

       } // <em>end if</em>

   } // <em>end function checkChar()</em>

   public static void <em>main</em>(String[] args) {

       // <em>Test the three samples from the specification.</em>

       System.out.println(<em>checkCharacter</em>("happy birthday", 2));

       System.out.println(<em>checkCharacter</em>("happy birthday", 5));

       System.out.println(<em>checkCharacter</em>("happy birthday 2 you", 15));

   } // <em>end function main()</em>

} // <em>end class CharTest</em>

The function <em>checkcharacter</em>(text, index) returns a string value describing the kind of character found at the position in text specified by index; whether it was a letter, digit, whitespace, or an unknown kind of character.

How it does that is to make use of respective functions defined within the Character class in java. That is

  • isLetter(char) returns a bool specifying if the char parameter is a letter.
  • isDigit(char) returns a bool specifying if the char parameter is a digit.
  • isWhitespace(char) returns a bool specifying if the char parameter is a whitespace character.

It calls these functions in an if statement. These else part of the if statement is then executed if the character is neither a <em>letter</em>, <em>digit</em>, or <em>whitespace</em>.

Finally, the function main() calls <em>checkCharacter</em>() three times to test the function and return the results to the console.

Another example of a java program on characters is found in the link below

brainly.com/question/15061607

3 0
3 years ago
In the mouse properties window you can
Nikitich [7]
When u are in the mouse properties window you can change the speed in which your pointer moves, change the speed of your double click on the mouse, change the look of the pointer make the pointer automatically move to default button in a dialog box have the pointer hide while you are typing. and change the number of lines that the scroll wheel will move when using it. there's actually a lot of optoons available in the mouse properties window. HOPE I WAS HELPFULL
4 0
3 years ago
Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
Igoryamba

Answer:

Risk assessment, Input validation and Output validation.

Explanation:

Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.

There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.

Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.

3 0
3 years ago
Other questions:
  • A(n) _____ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or indivi
    15·1 answer
  • Which loan type requires you to make loan payments while you’re attending school?
    10·1 answer
  • What are words with the root gest?
    15·1 answer
  • The transitions between slides in a presentation are one type of powerpoint ____.
    6·1 answer
  • Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices
    11·1 answer
  • How much time per day does the average U.S. youth spend watching television, playing video games, or using a computer?
    8·1 answer
  • You're setting up some VMs to test an application you're considering making available to employees of the small company you work
    11·1 answer
  • Design a function that checks if a keyword exists in a given keyword tree and returns true if so and returns false otherwise. Af
    13·2 answers
  • Xbox one is not turning on and power brick is orange why is that?​
    6·1 answer
  • What is an operating system that controls some aspects of the computer?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!