1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
10

How does the dns solve the problem of translating domain names like example.com into ip addresses?

Computers and Technology
1 answer:
Arte-miy333 [17]3 years ago
4 0

Answer:

Explanation:

DNS translates domain names and hostnames into IP addresses through a basic lookup function.  When a user requests a domain name (as in the case of a browser lookup) the computer queries the local DNS server to find the matching IP address.  If the local DNS server does not contain the information in it's local database, it contacts the next higher DNS system or the root domain DNS servers (i.e. microsoft.com - if the local system does not know it, it will query the well-known DNS server for the .com domain - which will know where to get the information).  

DNS helps the users by not requiring them to remember the IP address of every system them want to connect with.  microsoft.com is much easier to remember than 40.82.167.220.  

DNS also helps the internet scale through the use of load balancing.  Multiple systems can comprise a single web site with the web pages stored on many different machines with multiple IP addresses.  When a user requests the microsoft.com website IP, they are given the primary IP of the load balancer sitting in front of the multiple computers.  The load balancer will then distribute the traffic to any of the systems that are hosting the web page that are not busy.  To the end user it look like they are connecting to a single machine - when in fact they are connecting to one of potentially hundreds of web servers with the same content.  As traffic grows on the internet more servers are necessary to handle the additional traffic.  DNS helps ensure the end user will connect to the proper web server regardless of the number of web server copies spun up in response to the additional traffic.  This allows the capacity to scale as necessary without interruption to the web site.  

You might be interested in
an attack has changed the value of a variable used when copying files from one cloud server to a local drive. what is the most l
BaLLatris [955]

Based in the provided information, The attacker utilized integer overflow attack which could bring alteration to the state of the local drive's memory.

<h3>What is an attack in computer terms?</h3>

An attack can be regarded as violation of one's data or information on the computer system.

Since, the attacker, changed the value of a variable used when copying files from one cloud server to a local drive, his motive was alteration to the state of the local drive's memory.

Learn more about attack on drive at;

brainly.com/question/11352260

5 0
3 years ago
Hello there!I have a Macbook Air and by accident I had put my finger on the screen and made a small white dot.
Mnenie [13.5K]
Dont worry happens to my sisters laptop once. You just have to wait it out.
It wont damage your computer. It means that your laptop is also sensetive so dont touch the screen with too much force.
Hope I helped you!
7 0
4 years ago
Read 2 more answers
Does excel have more than 400 functions
castortr0y [4]
Yes excel has more than 400 functions
7 0
3 years ago
Which functions can you use to find the square root of a number, and to find the current date, respectively?
JulsSmile [24]

1. A. the SQRT is the squareroot. 2. may be C. Today but I've never heard of a function that returns the date!

8 0
3 years ago
Read 2 more answers
How to download gta5 ​
Kazeer [188]
Buy the game and hit download
8 0
3 years ago
Read 2 more answers
Other questions:
  • How does soil lose its value? A.When the top soil is stripped by wind or water B.When the bedrock is damaged by animals C.When w
    15·1 answer
  • Which of these scenarios depicts unethical workplace practice by an employee?
    7·2 answers
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • Where can you go in QuickBooks Online to import a list of products and services? Select the Quick Create icon and under the Tool
    12·1 answer
  • Who are the best candidates for members of SkillsUSA? Check all that apply. Adolph wants to be an Elementary School Teacher. Rub
    5·2 answers
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • Create a java program using the following instructions:GymsRUs has a need to provide fitness/health information to their clients
    13·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • H. What is recycle bin?<br>-&gt;​
    10·1 answer
  • You are going to visit a national park, and have never been there before. You are using a map to try and make the distance trave
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!