1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
8

When you make a DNS query, where does your computer first check to find an IP address to name mapping?

Computers and Technology
1 answer:
TEA [102]3 years ago
7 0

Answer:

b. Your local machine

Explanation:

Your local machine keeps a cache to minimize the DNS traffic. You can see this for yourself: Type ipconfig /displaydns to view the contents of this cache.

You might be interested in
Proxy data:
lapo4ka [179]

Answer: provide climate data representing times when instruments were not available to measure them.

Explanation:

Proxy data provides climate data representing times when instruments were not available to measure them.

6 0
4 years ago
Which of the below statements describes the purpose of HTML 5 - check as many as apply
rewona [7]

Answer: 2) To provide instruction for how the structure     should look

              4) To provide instruction for how the content should look

Explanation:

HTML 5 is a hypertext markup language revision which basically provide the structure and content to the page. It is a standard programming which basically describe the content of the web page. It reduce the overall development time and it is faster.

In the remaining option, It does not provide any meaning as we cannot add structure directly we should use the CSS styling for the particular document.

Therefore, (2) and (4) option are correct.

4 0
3 years ago
A. True
Goryan [66]
The answer is :True
6 0
4 years ago
Read 2 more answers
How many bit make a byte .​
Sauron [17]

Answer:

It is easy .8 bits.You have to note this

7 0
3 years ago
Read 2 more answers
Differentiate between computer organization and computer architecture with example
vazorg [7]
<span><span>Computer architecture was essentially a contract with software stating unambiguously what the hardware does. The architecture was essentially a set of statements of the form "If you execute <span>this </span>instruction (or get an interrupt, etc.), then that is what happens." <More sophisticated readers: I get to the term "ISA" later.>
</span><span>Computer organization, then, was a usually high-level description of the logic, memory, etc., used to implement that contract: These registers, those data paths, this connection to memory, etc.

</span></span>Computer Architecture and Computer Organization Examples

<span>Intel and AMD make X86 CPUs where X86 refers to the computer architecture used. X86 is an example on a CISC architecture (CISC stands for Complex Instruction Set Computer). CISC instructions are complex and may take multiple CPU cycles to execute. As you can see, one architecture (X86) but two different computer organizations (Intel and AMD flavors).
<span>
nVidia and Qualcomm on the other hand make GPUs (graphics processing unit as opposed to a CPU central processing unit). These GPUs are based on the ARM (Advanced RISC Machines) architecture. ARM is an example on a RISC architecture (RISC stands for Reduced Instruction Set Computer). Instructions in an ARM architecture are relatively simple and typically execute in one clock cycle. Similarly, ARM here is the computer architecture while both nVidia and Qualcomm develop their own flavor of computer organization (i.e architecture implementation)</span></span>
8 0
4 years ago
Other questions:
  • Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
    6·1 answer
  • If I want to make it look like slide number one is turning a page to slide number two, what effect needs to be applied?
    13·1 answer
  • What is UTF-8 and why was it created?
    8·1 answer
  • What will you personally do to make your peers aware of the seriousness Of teen crashes?
    9·1 answer
  • Which of the following is a Federal law that provides a definition of the term cyberterrorism and under which young people prima
    7·1 answer
  • The popularity of blogging is an example of _____. the public producing the media the public regulating the media both of the ab
    15·2 answers
  • There are n coins, each showing either heads or tails. We would like all the coins to show the same face. What is the minimum nu
    6·1 answer
  • A virtual meeting is the same thing as a/an A. online meeting. B. VoIP. C. seminar. D. convention.
    12·1 answer
  • First identify the formula to compute the sales in units at various levels of operating income using the contribution margin app
    12·1 answer
  • Guys for those who are familiar to bubble gum sim...THERE IS A HUGE EVENT AND I DONT WANT TO FAIL AN EVENT...(again) is anyone w
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!