1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
7

Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system

Computers and Technology
1 answer:
Amiraneli [1.4K]3 years ago
4 0

Answer:

b. E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.

Explanation:

It is important to ensure that Domain Name Servers have been secured before implementing an e-mail system because E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.

In other word, this helps the DNS MX determines the mail server accountable for receiving email messages on behalf of a domain name.

You might be interested in
What does the clone tile command do?
Angelina_Jolie [31]
It allows you to create tiled copies of an object while tweaking the variables
5 0
3 years ago
Read 2 more answers
Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
Tanzania [10]

#include<stdio.h>

#include<stdlib.h>

int comment1(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\n')

       {

           return count;

       }

       count++;

   }

   return count;

}

int comment2(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='*')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               return count;

           }

           count++;

       }

       count++;

   }

   return 0;

}

int main()

{

   printf("Enter the file name:");

   char s[1000],ch,ch1;

   scanf("%s",s);

   FILE*fp;

   fp = fopen(s,"r");

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\"')

       {

           while(fscanf(fp,"%c",&ch)!=EOF)

           {

               if(ch=='\"')

               {

                   break;

               }

               if(ch=='\\')

               {

                   fscanf(fp,"%c",&ch);

               }

           }

       }

       else if(ch=='/')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               count += comment1(fp);

           }

           else if(ch=='*')

           {

               count += comment2(fp);

           }

       }

   }

   printf("%d\n",count);

   return 0;    

}

3 0
3 years ago
Read 2 more answers
When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
zavuch27 [327]

Answer:

The answer is "Option d"

Explanation:

The scanner method is the full token of the process, that finds and returns. It is token, which is followed by both the inputs meeting and the guideline template. This method can block, even though the former instance of hasNext() is true while waiting for input, and wrong choices can be described as follows:

  • In option a, It is incorrect because the character at the beginning can't be considered.
  • In option b, It is wrong because the characters are known as the word in which blank space not a part of the word.
  • In option c, It is wrong because in this input before the call is not the method.
3 0
3 years ago
A student sits down at a computer and presses the power button. the computer does not turn on. what is a logical explanation as
ASHA 777 [7]
Since the computer is not working, it is best for the student to test methods that will ensure that there may be complications as to why it is not turning on and why it still off. The most basic step in determining the reason is whether the computer's plug is plugged in the outlet and the student should ensure whether it is plug or unplug.
4 0
3 years ago
What are the answers for edhesive quiz 2? I can’t add more than 1 photo...
KatRina [158]

Answer:

i have no idea srry

Explanation:

hi

7 0
3 years ago
Other questions:
  • The function below takes a single parameter number_list which is a list that can contain integers and floats. Complete the funct
    9·1 answer
  • What type of rain happens when cold air meets warm air
    14·1 answer
  • Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________
    13·1 answer
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • Which of these sedimentary rocks is made of the largest particles?
    10·1 answer
  • Given a one dimensional array arr, what is the correct way ofgetting the number of elements in arr
    15·1 answer
  • Encapsulation is a form of information hiding and an important characteristic of object-oriented programming. When a programmer
    6·1 answer
  • Explain the tearms alink and vlink​
    8·1 answer
  • Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:
    14·1 answer
  • Which of the following is an example of an output device on a smartphone?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!