1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
8

What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains

Computers and Technology
1 answer:
coldgirl [10]3 years ago
8 0

Answer:

208.91. 197.27 and  50.225.

Explanation:

In the world of computers, the term "IP" stands for Internet Protocol. The IP address or the Internet Protocol address is defined as a numerical label that is provided to every device which is connected to any computer network for communication. It works as providing the location address of the device and also identifies the network interface.

The primary IP addresses for the DNS servers that is hosted on :

-- x128bit is 208.91. 197.27

-- iskytap is  208.91. 197.27

-- cloudparadox is 50.225.

You might be interested in
7. Which innovation in video games do you think has been most significant? Include at least one way that innovation affects the
GarryVolchara [31]

Answer:

Virtual reality has been one of the most significant innovation in video games.

Explanation:

Virtual reality is a simulated experience that can be similar to or completely different from the real world. It has totally revolutionized the way we play and experience the world created inside of a game.  On a computer, virtual reality is primarily experienced through two of the five senses: sight and sound.

The whole gaming experience can elevate users confidence & sense of pride. There are VR games that will help you to get a good idea of what it feels to face a big white shark as it develops realistic scenarios. That's why virtual reality has been one of the most significant innovation in video games.

8 0
4 years ago
A file name extension provides what information about a file?
yanalaym [24]

Answer:

A file extension or file name extension is the ending of a file that helps identify the type of file in operating systems, such as Microsoft Windows. In Microsoft Windows, the file name extension is a period that is often followed by three characters but may also be one, two, or four characters long.

Explanation:

8 0
3 years ago
Mary is troubleshooting her company's LAN network. She finds out that data segments that the client is encoding are resulting in
kicyunya [14]

Answer:

Data link layer of OSI model is creating the erroneous segments

Explanation:

The Open System Interconnection (OSI) model is a conceptual framework about how communication occurs between devices over the Internet. It has seven layers, (Physical, Data, Network, Transport, Session, Presentation and Application layer). The purpose of this hierarchical layer system is to understand the structure of communication between devices and do troubleshooting easily if a fault occurs. As in this question, Marry is troubleshooting her company LAN network. She finds out that data segments that the client is encoding are resulting in errors in the encoding. Now the question arises, how she found the cause of the error. The OSI model helps her in understanding the problem.

As you know, the data link layer of the OSI model is responsible for the encoding and decoding of data segments. This layer ensures the reliability of the physical layer, and responsible to provide error-free transfer of data from one node to another on a network. It is also responsible for frame synchronization and flow control. The data link layer is divided into sub-layers:

1. Media Access Control Layer: this layer controls how a computer on the network gains access to the data and transmission permission.

2. Logical Link Control Layer: This layer controls frame synchronization, error checking and flow control.

Therefore, Marry founds data link layer of the OSI model is creating the erroneous segments in encoding.

6 0
3 years ago
You need to access the registry on your windows 10 computer how do you do this
Nikitich [7]

Press the Win and R keys together and the Run dialog box will pop up. Type regedit in the dialog box and you will then have access to the registry.

8 0
3 years ago
How to convert binary to decimal <br> Please it’s so hard and what is digital and analogue
geniusboy [140]

Answer:

How to convert binary to decimal ?

It consists of digits from 0 to 9. Binary to decimal conversion can be done in the simplest way by adding the products of each binary digit with its weight (which is of the form - binary digit × 2 raised to a power of the position of the digit) starting from the right-most digit which has a weight of 20.

what is digital and analogue?

In analog technology, a wave is recorded or used in its original form. So, for example, in an analog tape recorder, a signal is taken straight from the microphone and laid onto tape.In digital technology, the analog wave is sampled at some interval, and then turned into numbers that are stored in the digital device.

8 0
3 years ago
Other questions:
  • Which of the following functions and expressions will convert the ASCII character "Z" to its numeric equivalent ASCII code?
    7·1 answer
  • Which port can connect you to the Internet through a telephone line?
    6·1 answer
  • Certain medications can increase risk of obtaining a sunburn true or false
    12·1 answer
  • Class CTRivers describes collection of CT rivers. It has no data, and it provides the following service methods. None of the met
    13·1 answer
  • A URL suffix is called a domain name.
    11·1 answer
  • What xDSL version provides a maximum throughput of 24 Mbps downstream and 3.3 Mbps upstream?
    9·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • Is there a way to earn free robux
    7·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!