1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
13

A network technician sets up an internal dns server for his local network. When he types in a url which is checked first

Computers and Technology
1 answer:
VLD [36.1K]3 years ago
8 0

Answer:

The first thing that the browser checks is the cache for the DNS record to find the corresponding IP address.

Explanation:

After the technician sets up the internal DNS server for his local network, the first thing that is checked when he types a website into the url of a browser is the cache to look for corresponding IP addresses.

DNS which means Domain Name System is a database that maintains the website name (URL) and the IP address that it is linked to. There is a unique IP address for every URL (universal resource locator).

Internal DNS servers store names and IP addresses for internal or private servers

You might be interested in
Frequently used commands can be placed in or on the _____ in the top left corner of the window.
podryga [215]

Answer:

b. Quick Access Toolbar                                        

Explanation:

  • Quick Access Toolbar is a customizable toolbar that is displayed in Microsoft Excel, Microsoft Word, and other Office products.
  • It appears in the top left corner of the window by default.  
  • QAT provides with quick access to frequently used features e.g. the Save, Undo, Redo features.
  • When you click on the drop down menu of QAT, it allows you to customize QAT. This enables you to add and remove the commands that are displayed in the toolbar. These are default commands however, it allows you to add your own commands. You can add commands to the QAT that you frequently use. You can import or export these modifications.
  • For example Excel Quick Access Toolbar contains only 3 buttons by default Save, Undo and Redo.

7 0
3 years ago
In one sentence, how would you sum up the internet?
Slav-nsk [51]

Answer:

an informational system

Explanation:

6 0
3 years ago
Read 2 more answers
Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known
Evgen [1.6K]
No it is not broadcast on stations overseas but on overseas military base stations it can sometimes be found.
6 0
3 years ago
You have just completed the second version of your new messaging app and you are feeling good about its stability, feature set,
elixir [45]

Answer:

A. Ask for help from a co-worker. Maybe someone else can solve the algorithm problem.

Explanation:

You should talk to your coworkers. Many of them are experienced, and may have faced similar problems previously and knew how to solve. You trying alone will likely lead you nowhere, since a week is enough time to know if you can solve the problem by yourself. Taking at break in such an important task of the project will just delay everything.

The correct answer is:

A. Ask for help from a co-worker. Maybe someone else can solve the algorithm problem.

8 0
3 years ago
What tools can you use to delete active directory users?
8090 [49]
Hi,

Every operating system haves its own terminal.
If you are on a Windows computer open command prompt as administrator and you can delete user directory by typing.

"net user <username> /delete"

This will delete the user from the computer including his/her data.

Hopefully this will help.
r3t40
5 0
3 years ago
Other questions:
  • "what should you do if the system continually reboots and you can't read the error message produced on a blue screen
    11·2 answers
  • How to jail break iphone 7 with <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="7617023602">[email&#160
    11·2 answers
  • Consider a channel that can lose packets but has a maximum delay that is known. Modify Protocol rdt2.1 to include sender timeout
    11·1 answer
  • For Excel:
    5·1 answer
  • Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have suffic
    8·1 answer
  • "background" software that helps the computer manage its own internal resources is called ________.
    5·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
  • 1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee
    5·1 answer
  • Write pseudo code that performs the following: Ask a user to enter a number. If the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!