1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
15

An IT systems engineer creates a new Domain Name System (DNS) zone that contains pointer (PTR) resource records. Which zone type

has been created?
Computers and Technology
1 answer:
faust18 [17]3 years ago
4 0

Answer:

SOA

Explanation:

Statement of Authority, or you could also say that the zone that has been created is a reverse lookup

You might be interested in
All websites with medical information should be considered credible.
larisa [96]
No, this is not true. WebMD is a great example asking you of simple symptoms that you may be facing and your results could present an apparent fatal disease. This constantly scares the population of netizens whenever they would want a quick diagnosis online through these medical information sites. The best solution to your symptoms is to visit your family doctor or a licensed physician who will give you proper diagnosis checking your vital signs and other related information. Do not always trust the internet and the information it gives you as a user you must take the information with discretion before reacting inappropriately. 
3 0
3 years ago
Read 2 more answers
How come the scroll bar on the PA emojis only appears sometimes? how do I make it appear?
astraxan [27]
Answer it your own self everybody can't always give u the answers
5 0
3 years ago
My internet works but my router won't let any devices connect to it unless you use a cat. 5 cable :\
katovenus [111]
You would need to get a CAT5 cable, these usually dont cost much, as the manufacturing of these cables is cheaper and more common.

If you mean wireless connectivity, this could be due to your router not supporting wireless, meaning you would have to get a Wireless Access Point
5 0
3 years ago
Difference between private and confidential data?​
nasty-shy [4]

Answer:Private means: Belonging to, or for the use of, a particular person or group of people.

Confidential means: Intended to be kept secret. So, a private conversation would only be confidential if what is discussed is intended to be kept secret (from others).

8 0
3 years ago
Write a method named quarterstodollars. the method should accept an int argument that is a number of quarters, and return the eq
enyata [817]
 public static void quarterstodollars(String[] args) {    Scanner input = new Scanner(System.in);    System.out.println("Enter number of Quarters:");
    System.out.print("Quarters:");    int Q1 = input.nextInt();
DecimalFormat fmt = new DecimalFormat("$#,###.##");    System.out.println("Total:"+fmt.format(calctotal(Q1)));}public static double calctotal(int Q1) {    double total;    total=(0.25 * Q1);    return (total);}

Hope this helps!
7 0
4 years ago
Read 2 more answers
Other questions:
  • In Microsoft Excel graphs are referred to as ______?
    14·2 answers
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • What can help prevent issues related to downloading content from the internet
    11·2 answers
  • The ________ is the heart of the operating system and controls its most critical processes.
    9·1 answer
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
    13·1 answer
  • Write a function to prompt the user to enter the information for one movie (title, release date, mpaa rating and number of stars
    8·1 answer
  • N
    10·1 answer
  • Which statement is true with respect to Java?
    12·1 answer
  • . In the ____, you justify acquiring newer and better resources to investigate computer forensics cases.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!