1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
11

If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.

Computers and Technology
1 answer:
abruzzese [7]3 years ago
6 0

Answer:

Answered below

Explanation:

The DNS server is said to be a caching-only DNS server.

A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.

Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.

The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.

You might be interested in
Countries need to engage in trade of natural resources because of distribution in the earth. For instance, countries such as Sau
maks197457 [2]
Water is a scarcity in this area
4 0
3 years ago
When two or more people come together to communicate, each person brings their own ___________________.
dimulka [17.4K]

When two people come together,  each with a clear definition of their  identities, the potential can be astounding.  A successful communication is composed of two  individuals - each with a clearly defined sense  of her or his own identity.  

6 0
3 years ago
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
3 years ago
What purpose would tracking changes be most useful for?
olya-2409 [2.1K]
So, you can be able to make a prediction and understand the cycle.
6 0
4 years ago
Prove the following assertion: For every game tree, the utility obtained by MAX using minimax decisions against a suboptimal MIN
TiliK225 [7]

Answer:

From the given diagram, consider a MIN node whose children are terminal nodes, if MIN plays  

suboptimal. MIN will never be lower than the utility obtained playing against an optimal MIN  

MIN will always select a move having minimax utility greater than or equal to the move that is  

predicted by the minimax that is the MIN-played optimal value.  

Then the MIN node's value is increased to MAX. This is done by induction.  

One can do better than the minimax strategy, if the suboptimal play is predicted by MIN.

If MIN always falls for certain for certain kind of trap and losses, then setting up a trap guarantees a win.

Explanation:

See attached picture also.

5 0
3 years ago
Other questions:
  • Ann wants to download Adobe Acrobat software from the Internet. Prior to downloading, a standardized online contract appears on
    7·1 answer
  • How do u change the level of education on Brainly. cuz i just finished elementry
    9·2 answers
  • One type of technology that can verify a person's identity is _____.
    6·2 answers
  • Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above,
    5·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • 1) In your own words, explain what a browser is. 2) Why is it important to keep your browser up to date?
    12·1 answer
  • Counter-controlled repetition is also known as:
    8·1 answer
  • Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
    11·1 answer
  • What would a digitizing application create?
    13·2 answers
  • Write a qbasic program to design any simple software with output ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!