1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
2 years ago
5

An authoritative Domain Name System (DNS) server for a zone creates a Resource Records Set (RRSet) signed with a zone signing ke

y. What is the result of this action
Computers and Technology
1 answer:
Elena L [17]2 years ago
5 0

There are different types of systems. The result of the action above is DNS Security Extensions.

<h3>What is the reason for DNSSEC?</h3>

DNS Security Extensions is known to empower the authentication in DNS through the use of digital signatures that is as a result of public key cryptography.

Through the use of DNSSEC , it is not DNS queries and responses that are said to be cryptographically signed, but instead it is the DNS data  that is signed by the person who has  the data.

learn more about DNS Security Extensions from

brainly.com/question/1139046

You might be interested in
A group of students want to create an educational online game for computer laboratory in their school which type of network will
Natali [406]

Answer:

A.LAN

Explanation:

LAN (Local area Network) is a type of data communication network which covers a small geographical area such as a school compound. This network can accommodate variety of electronic devices including computers, laptops, file servers, printers and modems. In this example, a room can be identified for the project to consist of more than 20 computers sharing a file server and a single hard drive.

Best wishes!

6 0
3 years ago
What will be the result of running the code below?
Cloud [144]

Answer:

The program will output "There are X hours in each week." (X being the amount of hours)

Explanation:

Depending on what you put in for the last variable, only the number of hours would change. The program multiplies the values together, and then outputs that value with the string shown.

4 0
4 years ago
FOR ALL PLATO USERS:
aleksley [76]

You have to ask you teacher to show you which ones you got wrong and the answers to them.

6 0
4 years ago
Read 2 more answers
Which sentence best describes the executive branches of state
melamori03 [73]

Answer:

B... I think...

Explanation:

The executive branch of every state is headed by an elected Governor. Most states have a plural executive, in which several key members of the executive branch are directly elected by the people and serve alongside the governor.

8 0
3 years ago
TP is commonly used to __________ and __________ files to a server.
Goshia [24]

Answer:

upload; download

Explanation:

This question is not complete: is not TP

Is FTP is an Internet protocol commonly used to upload and download files to a server, For example:

There are image banks where you can sell or share files like videos, music, and photographs, in this kind of website, you can transfer files for FTP, in FTP we must type a user name and password to send the files.

8 0
3 years ago
Other questions:
  • Why do bullies and criminals often say things online they otherwise wouldn’t say
    9·2 answers
  • COMPUTER ORGANIZATION &amp; ARCHITECTURE I<br>please help need the correct answers to all
    6·1 answer
  • one data is in memory the computer interpets and executeinstructions to process the data into informationA. TrueB. False
    8·1 answer
  • The UNIX system does not attempt to avoid cycles. Instead, it restricts access to the linking capability of the system. Normal u
    11·1 answer
  • What type of device is the keyboard?<br><br> Output<br> Input<br> Monitoring<br> Software
    7·2 answers
  • An operating environment for a computer is ____, free of potential contaminants, and with the temperature and humidity range spe
    9·1 answer
  • Write a for loop that prints the values 1 2 4 8 16 32 64 by increasing the value of a counting variable by a factor of two in ea
    15·1 answer
  • PLSSS HELPP IM DESPERATE!!!
    11·1 answer
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!