1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
9

What transport layer protocol does DNS normally use?

Computers and Technology
1 answer:
saveliy_v [14]3 years ago
3 0

Explanation:

DNS uses the User Datagram Protocol (UDP) on port 53 to serve DNS queries. UDP is preferred because it is fast and has low overhead. A DNS query is a single UDP request from the DNS client followed by a single UDP reply from the server.

You might be interested in
Can someone help me on how to start this essay?
mezya [45]

Answer:

Start off with an interesting introduction (add questions) make it interesting.

6 0
3 years ago
Read 2 more answers
Look at the following Python code:
aliya0001 [1]

Ump will be assigned to word2

word1[0:3] gets all of the letters from index 0 to index 3 exclusive (that means index 3 is not included)

4 0
3 years ago
All web page urls begin with the letters ____.
Degger [83]
The answer will be HTTP.
6 0
4 years ago
Which command on the home ribbon do you use to replace information in a selected cell with new information or new formatting?
Lelu [443]
Cut and paste - you use to replace information in a selected cell with new information or new formatting
3 0
3 years ago
What happens if a computer has a virus that cant be deleted?
sveta [45]
Then the computer is broken. But what you can do is wipe everything on it and that kills the virus. If it's a blue screen of death then you need a computer genius to type some code and delete the blue screen of death. However if it is a Trojan virus there is no way of get tut rid of it
7 0
3 years ago
Read 2 more answers
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • A(n ____________ is considered a named collection of bytes having persistent or lasting storage.
    10·1 answer
  • Why process scheduling is needed in a uni-processor system?
    12·1 answer
  • In social networking websites such as twitter, people leave narrow minded and subjective remarks and upload unacceptable videos.
    9·1 answer
  • Split a string by string.
    6·1 answer
  • How long does it take to send a 3 MiB file from Host A to Host B over a circuit-switched network, assuming:
    13·1 answer
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • Which is a color group in color theory?
    7·1 answer
  • *When a computer programmer is finished writing or developing a program, what has to happen first before the computer can unders
    8·1 answer
  • Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!