1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
4 years ago
7

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritat

ive servers for public access.A. TrueB. False
Computers and Technology
1 answer:
kompoz [17]4 years ago
5 0

Answer:

True

Explanation:

You might be interested in
What is the last step in planning your budget
jenyasd209 [6]
Review and Revisions
8 0
3 years ago
While working on a presentation, Jack lost all the data because he switched off his computer unknowingly. On which of these comp
Lelechka [254]

Random Access memory(RAM) stores data temporary until the computer is switched off

3 0
3 years ago
Read 2 more answers
Please anwer it ..........<br>if you know
NeTakaya

Answer:

a) Email

b) VolP

b) OzoBot

Explanation:

<h3>#hope</h3>
7 0
3 years ago
Read 2 more answers
Which of the following is most often true?
Ksenya-84 [330]

Answer:

a) The IOS is stored in flash and copied into RAM at startup.

Explanation:

Well,  in most router architectures, the IOS is copied into and run from RAM. This is because of the flash allows the IOS to be upgraded in any moment or allows it  to stores multiple IOS files.

Keep in mind that if the flash memory is empty, the router will try to use a TFTP server to load an IOS image from the network and for the last resort if the TFTP server is unavailable, the router will load the limited version Cisco IOS software image stored in ROM.

5 0
3 years ago
Write a report on how you would analyze your organization and how you would select an appropriate security policy framework. Sea
olga nikolaevna [1]

Answer and Explanation:

We analyzed the security act in the organization by the following reason.

  • Protection of data  
  • Privacy of data  
  • Prevent the data loss in the network
  • Network security protection

Formation security platforms seem to be a set of structured policies, protocols and instructions aimed at directing a company or some other entity that uses them to secure their equipment, programs, content, data, server, computer systems, clients and customers through possible safety violations by using the company's facilities or services.

5 0
3 years ago
Other questions:
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    11·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • 1)What is Big Data?
    14·1 answer
  • How to use function in python
    15·1 answer
  • Difference between the four generations of computers in a tabular form​
    8·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • 7 TH GRADE QUESTION...PLS HELP
    12·2 answers
  • Please help me with this!
    15·1 answer
  • You are designing software for elderly people. Which two features can you
    6·1 answer
  • A classic game, Wario Land, has an invincible main character who reacts to the environment in order to solve puzzles. So, for ex
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!