1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksandrR [38]
3 years ago
13

The Accounting department is testing a new payroll system server. To facilitate their tests, they would like to add the server t

o DNS to support name resolution. You would like to create a new zone to support their request, and to accelerate lookups, you would like to place a copy of this zone on the DNS server in Building B.
Complete the following tasks:

On CorpDC, create a Primary forward lookup zone called acct.CorpNet.
Do not store the zone in Active Directory.
Use the default name for the zone file.
Do not allow dynamic updates.
Configure the zone to allow zone transfers to any server.
On CorpDC3, create a Secondary forward lookup zone called acct.CorpNet.
Specify CorpDC (192.168.0.11) as the master DNS server for the zone.
For your convenience, all DNS servers have been added to the DNS Manager console on CorpDC. You can also use Change Location to access each server and its console directly.
Computers and Technology
1 answer:
natka813 [3]3 years ago
4 0

i am still 13  

udduudncd nd ndcdnnbdmbfvmd

You might be interested in
Exercise : Randomizer In this exercise, we are going to create a static class Randomizer that will allow users to get random int
Nutka1998 [239]

Answer:

Here the code is by using java.

Explanation:

//Randomizer.java

public class Randomizer {

public static int nextInt() {

//get random number from 1-10

int randInteger = (int) (Math.random() * (11) + 1);

//if number is greater than 10 or less than 1

while (randInteger > 10 || randInteger < 1) {

randInteger = (int) (Math.random() * (11) + 1);

}

return randInteger;

}

public static int nextInt(int min, int max) {

//formula to get random number from min-max

int randInteger = (int) (Math.random() * (max + 1) + min);

while (randInteger > max || randInteger < min) {

randInteger = (int) (Math.random() * (max + 1) + min);

}

return randInteger;

}

}

//RandomizerTester.java

public class RandomizerTester {

public static void main(String[] args) {

System.out.println("Results of Randommizer.nextInt()");

for (int i = 0; i < 10; i++) {

System.out.println(Randomizer.nextInt());

}

int min = 5;

int max = 10;

System.out.println("\n Results of Randomizer.nextInt(5,10)");

for (int i = 0; i < 10; i++) {

System.out.println(Randomizer.nextInt(min, max));

}

}

}

OUTPUT:

Results of Randommizer.nextInt()

9

2

3

8

5

9

4

1

9

2

Results of Randomizer.nextInt(5,10)

9

8

9

7

5

10

5

10

7

7

4 0
3 years ago
Which of the following sets of acronyms is concerned with encoding data for secure transmission?
guapka [62]

I'm pretty sure your answer is VPN. Hope this helps!

7 0
3 years ago
Assessment timer and count Assessment items Item 6 How many different keys can be used in a single sort? 1 2 3 4
Alik [6]

Answer:

Its C 3. hope this helps

Explanation:

6 0
3 years ago
​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
VashaNatasha [74]
Malware
-------------------
6 0
3 years ago
Discuss the main characteristics of the database approach and how it differs from traditional file systems.
Firdavs [7]

The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.

The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.

6 0
3 years ago
Other questions:
  • An undesirable jagged appearance is referred to as
    7·2 answers
  • Which of the following are valid values for a boolean value in programming? (Select all that apply)
    8·1 answer
  • Naruto Uzumaki who likes naruto ??? who waches it??
    14·2 answers
  • You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the
    7·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • Compare entertainment applications to social media applications.
    5·2 answers
  • Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
    13·1 answer
  • What type of error results from an error in the formatting of the program code?
    13·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    7·2 answers
  • In Super Mario Bros., you become Mario and your friend is Mario’s younger brother Luigi. Your job is to race through Mushroom Ki
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!