1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
15

A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested

domain name lookups. What utility on the command line would you suggest your colleague use next?
Computers and Technology
1 answer:
Darya [45]3 years ago
7 0

Answer:

nslookup is the correct answer to the following question.

Explanation:

The following answer is correct because It is the tool or the utility of the command line by which an administrator to query a DNS(Domain Name System) for finding the domain name or the Internet Protocol address or many other records.

<u>Steps to use nslookup:</u>

  • Firstly, you have to press the window key + R to open run.
  • Then, you have to type cmd in it and press enter.
  • Then, cmd will appear after that, you have to type the command 'nslookup' and then press enter.
  • Then, it shows the default server name and ip address after that, you have to type an ip address of DNS server.
  • Then, you have to type 'set' then type q=M X and then press enter
  • Then, you have to type the name of your domain then, press enter key.

You might be interested in
This career applies mathematical and theoretical knowledge in order to compare and produce computational solutions.
ipn [44]

Answer:

Why does love.com redirect to Verizon.

Explanation:

4 0
3 years ago
Read 2 more answers
in the client server model, what is the primary protocol used for communication between a browser and Web server
worty [1.4K]
Assuming the client is using a web browser, your answer would most likely be the Hyper-Text Transfer Protocol (HTTP).

HTTP is a very, very common way of transfering insensitive data from client to server. HTTPS is more secure, adding a secure socket layer to protect communications from being intercepted.

--

As an alternative answer, the FTP (File Transfer Protocol) may be an acceptable answer, but this is usually not the primary method of communication for clients, as it is mainly used to access and modify files on the server, requiring a username-password combo to do so (usually).


7 0
3 years ago
When using correct ergonomic technique be sure to _____.
adell [148]
It is A my boy ✊✊✊✊✋✋☝
6 0
3 years ago
Read 2 more answers
What is the difference between basic auth and oauth.
ratelena [41]

Answer:

Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).

OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.

4 0
2 years ago
In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill ma
mafiozo [28]

Answer: Provided in the explanation section

Explanation:

C++ Code

#include<iostream>

#include<fstream>

#include<string>

using namespace std;

// read plain text from file

void readPlaneText(char *file,char *txt,int &size){

  ifstream inp;

 

  inp.open(file);

 

  // index initialize to 0 for first character

 

  int index=0;

  char ch;

 

  if(!inp.fail()){

      // read each character from file  

      while(!inp.eof()){

          inp.get(ch);

          txt[index++]=ch;

      }

  }

 

  // size of message

  size=index-1;

}

// read key

int **readKey(char *file,int **key,int &size){

  ifstream ink;

 

  //

  ink.open(file);

      if(!ink.fail()){

         

          // read first line as size

      ink>>size;

     

      // create 2 d arry

      key=new int*[size];

     

      for(int i=0;i<size;i++){

          key[i]=new int[size];

      }

     

      // read data in 2d matrix

      for(int i=0;i<size;i++){

          for(int j=0;j<size;j++){

              ink>>key[i][j];

          }  

      }

  }

  return key;

}

// print message

void printText(string txt,char *msg,int size){

  cout<<txt<<":\n\n";

 

  for(int i=0;i<size;i++){

      cout<<msg[i];

  }

}

// print key

void printKey(int **key,int size){

  cout<<"\n\nKey matrix:\n\n";

  for(int i=0;i<size;i++){

      for(int j=0;j<size;j++){

          cout<<key[i][j]<<" ";

      }  

      cout<<endl;

  }

}

void encrypt(char *txt,int size,int **key,int kSize,char *ctxt){

  int *data=new int[kSize];

 

  for(int i=0;i<size;i=i+kSize){  

 

  // read key size concecutive data

      for(int a=0;a<kSize;a++){

          data[a]=txt[i+a]-'a';

      }

     

      // cipher operation

      for(int a=0;a<kSize;a++){

          int total=0;

          for(int b=0;b<kSize;b++){

              total+=key[a][b]*data[b];

          }  

          total=total%26;

          ctxt[i+a]=(char)('a'+total);

      }      

  }

}

int main(int argc,char **argv){

  char text[10000];

  char ctext[10000];

  int **key;

  int keySize;

  int size;

  // input

  key=readKey(argv[1],key,keySize);

  readPlaneText(argv[2],text,size);

  encrypt(text,size,key,keySize,ctext);

 

  // output

  printKey(key,keySize);

  cout<<endl<<endl;

  printText("Plaintext",text,size);

  cout<<endl<<endl;

  printText("Ciphertext",ctext,size);

 

  return 0;

}

cheers i hope this helped !!!

4 0
3 years ago
Other questions:
  • 6. Write a program that can multiply an n x m matrix and m x n matrix together: The input specifications are these: Read n and m
    11·1 answer
  • QUESTION 1
    7·1 answer
  • Which leader of the Jamestown colony am I?
    15·2 answers
  • Are scripted languages easier or more difficult to port than programming languages? Why?
    6·1 answer
  • In Broadbent's filter model of attention, the stages of information processing occur in which order?
    9·1 answer
  • What is information associated with a document to help describe that document called?
    14·1 answer
  • In this section, you will use a stack to implement a program that checks if a string is balanced. Use the skeleton code provided
    5·1 answer
  • The ____ option must be used when running a program in order to see the results of assert statements.
    7·1 answer
  • How do u answer questions on brainly if ur on the app and on a phone. For me there is no answer button :(
    8·1 answer
  • CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!