1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
10

What specific record type is found in every zone and contains information that identifies the server primarily responsible for t

he zone as well as some operational properties for the zone?
Computers and Technology
1 answer:
ValentinkaMS [17]3 years ago
4 0

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

You might be interested in
Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal informati
11111nata11111 [884]

Answer:

A. Personal information manager.

B. Web-based.

C. Project management.

D. Proprietary.

E. Open source.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into the following categories;

A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.

B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.

C. Project management: software used to track tasks and coordinate resources.

D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.

6 0
3 years ago
Differentiate Between register and Memory location (
trasher [3.6K]

Answer:

Register-it contains all the instructions that are present in the processor.

Memory location- it is the particular memory address where the data is stored.

Explanation: Difference between register and memory location are as follows :-

  • Register are the found in the CPU internal storage and memory location is present on the RAM.
  • Registers are faster in movement as compared to the memory location.
  • Register has the capacity of holding of less data as compared to the memory location which can store data in large amount .

7 0
3 years ago
Given the function definition below, what is the effect of thecall:
Romashka-Z-Leto [24]

Answer:

Hi!

The correct answer is E.

Explanation:

void change(int ar[], int low, inthigh)  {  

 int temp;

 if(low< high)  {  <em>// here ask if the positions low and high of the array are the same.</em>

  temp= ar[low];  <em>// first, saves the element on ar[low] in temp.</em>

  ar[low]= ar[high];  <em>// second, the element on ar[high] in ar[low]. First switch.</em>

  ar[high]= temp;  <em>// third, saves the element on temp in ar[high]. Complete switch.</em>

  change(ar,low + 1, high - 1);  <em>// Recursive call, adding one position to low, and subtracting one position to high. </em><em>Important: </em><em>When low and high have the same value, the recursive call will finish.</em>

}

}

Result: Switch the lower half of elements in the array with the upper half.

8 0
3 years ago
Read 2 more answers
An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device br
telo118 [61]

Answer:

3. WiFi Protected Access 2

Explanation:

Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.

Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.

Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2

6 0
3 years ago
Which tool allows multiple users to dynamically update a document at the same time? Question 3 options: Google Docs OneDrive Exc
GenaCL600 [577]

Answer:

Excel

Explanation:

7 0
3 years ago
Other questions:
  • Match the job skills with the correct job role.
    12·1 answer
  • What error, if any, is in the following code?
    11·1 answer
  • What makes smartphones so fragile?
    7·1 answer
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • Which sentence is an example of an I-statement?
    6·1 answer
  • Does white space have visual weight? Yes or No
    7·2 answers
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • Name:
    11·1 answer
  • Multiple choice:
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!