1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
12

Which of the selections below represents a recursive query?

Computers and Technology
1 answer:
ElenaW [278]3 years ago
5 0

Answer:

D. A DNS server asks another DNS server to resolve a domain name

Explanation:

DNS (Domain name system) queries are essentially of two types;

i. recursive address resolution

ii. iterative or non-recursive address resolution

=> In the <em>recursive address resolution</em>, which represents a recursive query, when a DNS server A, receives a request from a client and does not know how to resolve such request, the DNS server sends the query to another DNS server B on behalf of this client. DNS server B can either reply to the query with the actual answer or an error message. If it's an actual answer, it returns to the client. Otherwise, it queries another DNS server, say C.

=> In the <em>iterative address resolution</em>, once the DNS server A receives a request from the client, it tries to reply the client with the best answer it can give. If the DNS server A does not have an answer, it refers the client to another DNS server say B. In this case, the server A does not directly query the server B. Instead, it refers the client to the server B.

You might be interested in
The ABC Manufacturing company has a completely automated application system. The system, however, resides on index files and doe
Leni [432]

Answer:

Please see the attached file for complete Answer.

Explanation:

Download pdf
6 0
3 years ago
Read 2 more answers
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with e
andrey2020 [161]

Answer:

This question has two parts, first part is about programming about a Player class and second for reading string from user and decide how many time duck string entered by user and terminate if user press goose string.

The explanation of both program (executable code) is given below in explanation section.

Explanation:

//Program 1

#include <iostream>

using namespace std;

int main()

{

 bool isPremiumCustomer;

 int nbooksPurchased;

 int totalBookPurchasedWithOffer;

// bool cutomerType;

 int freeBooks;

 cout<<"Press 1 for Premium Customer and 0 for regular Customer";

 cin>>isPremiumCustomer;

 cout<<"How many books you purchased ";

 cin>>nbooksPurchased;

 

 

switch(isPremiumCustomer)// what type of customer is  

{

case 1://if customer is premium

 if (nbooksPurchased >= 5&&nbooksPurchased<8)// purchase book greater between 5 and 8

  {

   freeBooks=1;//offer free book

   totalBookPurchasedWithOffer=nbooksPurchased+freeBooks;//total number of book including free book

   

   cout<<"You purchased total book with offer ";//show total books

   cout<<totalBookPurchasedWithOffer;

  }

   

  else if (nbooksPurchased >= 8)//if premium customer purchase more than 8 book

    {

    freeBooks=2;//offer two free book

    totalBookPurchasedWithOffer=nbooksPurchased+freeBooks;//total number of book including free book

    cout<<"You purchased total book with offer ";

    cout<<totalBookPurchasedWithOffer;//show total books

    }

  else{

   cout<<"You purchased total book with no offer ";

    cout<<nbooksPurchased;

   }

  break;

case 0:// if customer is regular customer

 if (nbooksPurchased >= 7&&nbooksPurchased<12)//and purchase book between 7 and 12

  {

   freeBooks=1;// offer 1 free book

   totalBookPurchasedWithOffer=nbooksPurchased+freeBooks;

   cout<<"You purchased total book with offer ";

   cout<<totalBookPurchasedWithOffer;

  }

   

  else if (nbooksPurchased >= 12)//if purchase 12 or more than 12 book

    {

    freeBooks=2;//offer two free book

    totalBookPurchasedWithOffer=nbooksPurchased+freeBooks;

    cout<<"You purchased total book with offer ";

    cout<<totalBookPurchasedWithOffer;

    }

 else{

  cout<<"You purchased total book with no offer ";

  cout<<nbooksPurchased;

  }

  break;

 

}

 

 

 

return 0;// terminate the program

 

}

/* program 1 has ended

and program 2 is started from here

#######################################################

*/

#include <iostream>

using namespace std;

int main()

{

string readstring;// take input string from user to enter either "goose" or "duck"

int count=0;//count the number of "duck"

while(readstring!="goose")//run loop, until user do not enter string  

{

 cout<<"Enter the string either goose or duck ";// prompt user to enter the string

 cin>> readstring;// read string from user

 if (readstring=="duck")//if string equal to "duck"

 {

  count=count+1;//count number of duck string enter by user

   

 }

}//exit/terminate the loop, if user enter the goose string

cout<< " Number of duck that were read " ;// show how many duck string entered by user

cout<<count;

return 0;// terminate the program

 

}

6 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
What would happen if the coils in a generator stopped spinning?
just olya [345]
The generator will start to slow down and heat up.. because sooner or later the energy that is supposed to be going to the coils spinning then it all goes to heat.. The generator will either catch on fire or stop working completely. 
8 0
4 years ago
Read 2 more answers
Other questions:
  • Write a function so that the main() code below can be replaced by the simpler code that calls function MphAndMinutesToMiles(). O
    5·1 answer
  • Which form of Internet communication would a consumer seek out if they wanted to get personal perspectives into a company and it
    15·1 answer
  • The merge process involves which two types of files?
    9·2 answers
  • Plzzzzzzz help good answers only and best answer gets brainly
    5·1 answer
  • As the European powers grew more industrialized, their colonies became very important as sources of A)slave labor. B)raw materia
    12·2 answers
  • Applications require you to provide the following basic elements: availability, social security number, and education.
    14·1 answer
  • Usually it is a rectangular box placeed or underneath your desk​
    15·1 answer
  • SOMEONE HELP 60 POINTS!!!!! When creating business publications, these two factors must be determined before planning the layout
    8·2 answers
  • What are the similarities and differences in Yahoo International<br> Versions?
    11·1 answer
  • use c , c, java or python (any one) programming language for the following programming exercises. do not call built-in library f
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!