1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
10

What specific record type is found in every zone and contains information that identifies the server primarily responsible for t

he zone as well as some operational properties for the zone?
Computers and Technology
1 answer:
ValentinkaMS [17]3 years ago
4 0

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

You might be interested in
In designing input by clinicians for an EHR system, which of the following would be effective for a clinician when the data are
svetoff [14.1K]

Answer:

Speech recognition

Explanation:

Speech recognition would be effective for a clinician when data entry is fairly repetitive and the vocabulary used is fairly limited and over time it as become a replacement for other forms of dictation.

3 0
4 years ago
a ____ is a feature that finds a list potential design problems associated with your document brainly.com
andrezito [222]
1. eliminating some diseases
2. improving certain species (like growing bigger apples)

8 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
In comparing a multi-boot environment and an environment using a type II hypervisor which offers the best performance? Which wou
ElenaW [278]

Answer / Explanation

To answer this question, let us first understand what a multi boot environment is and what an environment using a hypervisor is:

Multiple-booting can be defined or simply refers to the process of installing different multiple operating system on a single computer and also to be able to determine which of the operating systems boot per time.

While:

Hypervisor or a type 2 hypervisor can be described as a form of virtual machine in form of a software that is installed on in an existing operating system of a computer. One of the main benefit of an hypervisor is it enables easy navigation of guest on your computer without actually navigating into your original or primary operating system plus it aid in fast system recovery.

If we now refer back to the question asked in respect to which i would offer as the most convenience, i would prefer the type 2 hypervisor as convenient because i am able to run an operating system inside another operating system so navigating between two operating system would be very easy as compared to the Multi-booting where i have to always shut down an operating system to navigate between the operating system because i can only use one operating system per time.

4 0
3 years ago
HELP PLLISSSSSSSSSS!!!!!!!!!! its unit test will mark as brainliest
astraxan [27]

Answer:

1. file

2. true:false

3. prioitized

4. drafts

Explanation:

8 0
3 years ago
Other questions:
  • the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​
    10·1 answer
  • 1. An Excel file is called a workbook?<br> A) True<br> B) False
    6·2 answers
  • In modern computer memory, each location is normally composed of one byte.
    7·1 answer
  • A snail goes up A feet during the day and falls B feet at night. How long does it take him to go up H feet? Given three integer
    8·1 answer
  • Explain how inflation flattens the universe
    6·2 answers
  • When excel imports an access table, the data is placed in a worksheet _____?
    7·1 answer
  • Explain the basic method for implementing paging.
    13·1 answer
  • Which are advantages of using a server operating system?
    12·1 answer
  • Which icons allows you to add a style to a chart
    13·1 answer
  • HURRY please!!!!
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!