1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
3 years ago
11

Can you determine if an external web site was likely accessed from a computer in you department a couple of seconds ago?

Computers and Technology
1 answer:
fredd [130]3 years ago
3 0

Answer:

Yes, it can be determined if an an external web site was likely accessed from a computer in the same department a couple of seconds ago.

Explanation:

Yes. “Dig” can be used to search that website in the local DNS server. A practical example would be to insert “dig google.com” and that will give us the result of the query time for searching and finding google.com. Supposing google.com was accessed a few seconds ago, then an entry for google.com is cached in the local DNS cache and the search or query time is 0 msec. If not the query time will be large.

You might be interested in
This motherboard already has 1GB of RAM installed in the DIMM1 slot. The customerwould like to upgrade to 4GB total memory, use
Luden [163]

Answer:

The two phases to the context of this discussion are listed follows.

Explanation:

  • <u>Solution 1</u>: Delete 1 GB of current RAM as well as install another DIMM0 Chan A slot through one 2 GB of double-channel RAM. (thinkable unless the 2 GB RAM is provided by the motherboard in what seems like a DIMM0 Chan A slot)  
  • <u>Solution 2</u>: whether there's an unused or blank slot, perhaps one 1 GB dual-channel Ram could be mounted in some other slot at around the same speed or frequency.  

It's quite safer to mount memory with appropriate frequencies across both situations.

6 0
3 years ago
What are the characteristics of the Global Address List? Check all that apply.
nignag [31]

Answer:

It is the very last statement (bottom). Also copied to the the client

Explanation:

3 0
3 years ago
Ask one of your parent, grandparent or elder relatives about the popular song during their time they consider their favorite. As
inysia [295]

Answer:

Babooshka by Kate bush

Explanation:

My dad likes this song because it has a very nice beat

I find this sond interesting because the vocals and pitch end up sounding different than you would expect them to be. Also the range of the singer (Kate bush) is amazing

4 0
3 years ago
Use the __________ property to configure bold text using css
tatuchka [14]
Use the 'font-weight' property.

To put it in perspective, 'font-weight: 400' is the same boldness as normal text, whereas 'font-weight' 700 is the same boldness as a regular bold font.
5 0
4 years ago
How to set up a simple peer-to-peer network using a star topology?
kkurt [141]

Answer:

The description including its scenario is listed throughout the explanation section below.

Explanation:

Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.

Throughout this configuration or setup:

  • Each common network setups network unit, such as a firewall, switch, as well as computer.
  • The main network computer serves as either a server as well as the peripheral system serves as just a client.
7 0
3 years ago
Other questions:
  • Choose the answer that best explains why Morse's invention of the telegraph changed media forever.
    11·2 answers
  • How can ASCII be used to represent characters in a computer system?
    15·1 answer
  • Rather than manually setting a print area each time you want to print a range, you can ____ the range.
    13·1 answer
  • 3. A hyperlink is important because it allows you to ___________. (1 point) click on the link to go directly to a website insert
    9·1 answer
  • PHP is based on C rather than ______.
    5·1 answer
  • Differences between barcode reader and character recognition devices​
    9·2 answers
  • Create a program that receives the age of a user and determine whether he/she can vote or not. Assume the voting age to be 20. C
    14·1 answer
  • The rate of flow is called
    11·1 answer
  • Which of the following are characteristics of centralized version control systems? Select 3 options.
    9·1 answer
  • Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!