A _____ standard describes the requirements for obtaining a domain name for use by external parties?

Answers

Answer 1

A DNS control standard describes the requirements for obtaining a domain name for use by external parties.

What is a domain name?

A domain name is a name that is easy and easy to remember. The name is used for online websites for companies or vlogs that contain an IP address on the internet. It is like the street address.

The DNS control system is a system that is used by every domain name user. It controls how visitors would see the website and how they will receive emails.

Thus, the standard requirement for obtaining a domain name is the DNS control standard.

To learn more about the domain name, refer to the below link:

https://brainly.com/question/3044569

#SPJ1


Related Questions

Your dashboard shows total cars sold by city. how will the data be impacted if you set a condition filter for sum of cars sold greater than 100?

Answers

The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.

What is filter pf pages or picture?

Image or page filtering is known to be the act of altering or changing the form of an image and also reducing a page to the items that one wants.

Note that in filtering, it tends to bring about those areas that one has interest in and as such, in the case above, The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.

Learn more about filter from

https://brainly.com/question/3198358

#SPJ1

Question 5 of 10
What happens when you create a variable in a video game program?
OA. You hold a spot in the computer's memory for a piece of data that
it will need later.
OB. You save a copy to your computer that you will be able to return to
later.
OC. You change the parameters of the program so the game will look
different.
OD. You create a new event that will run as soon as the game's
program starts.
SUBMIT

Answers

Answer:A

Explanation:just got it right

When you create a variable in a video game program you may hold a spot in the computer's memory for a piece of data that it will need later. Thus, the correct option for this question is A.

What is meant by variable in programs?

In programming, a variable is a value that can be modified or altered with respect to the conditions or the nature and type of information that have to be passed onto the program.

According to the context of this question, a variable has multiple functions in the sequence of programming. These variables are utilized in order to store information that has to be referenced and manipulated within a computer program. Another function of variable is that they also provide a way of labeling the components of programming.

Therefore, you may hold a spot in the computer's memory for a piece of data that it will need later is the action of a variable that you create in a video game program. Thus, the correct option for this question is A.

To learn more about Variable in programming, refer to the link:

https://brainly.com/question/9238988

#SPJ2

When a database stores view data, it uses a _____ that depends on data in a corresponding _____.

Answers

When a database stores view data, it uses a materialized view that depends on data in a corresponding view table. The correct option is 4.

What is a database?

A database is a collection of data in an organized and easy way. They store electronic data and manipulate it. An example is an online telephone directory that saves people's contact, name, and addresses.

The materialized view is an organized view of data in the system, and the view table is the table where all the data can be viewed.

Thus, the correct option is 4. Materialized view, view table.

To learn more about the database, refer to the below link:

https://brainly.com/question/25198459

#SPJ1

The question is incomplete. Your most probably complete question is given below:

1. base table, view table

2. materialized view, base table

3. view table, materialized view

4. materialized view, view table

The presence of a lock icon next to an item on the lenovo support site denotes a restricted document or utility. What information on lenovo support is considered restricted?

Answers

The information on Lenovo support which are considered restricted include the following:

BIOS toolsConfidential tips.Known issues for Contact Centers.

What is a computer?

A computer can be defined as an electronic device that is designed and developed by a tech company such as Lenovo, to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouse

What is a classified source material?

A classified source material can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.

In this context, we can infer and logically deduce that the information on Lenovo support which are considered restricted include the following:

BIOS toolsConfidential tips.Known issues for Contact Centers.

Read more on classified source material here: https://brainly.com/question/15346759

#SPJ1

A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a single target.

Answers

Answer:

ddos

Explanation:

DDOS (Distributed Denial Of Service) is more effective becaause it utilizes many computer systems for the attack, mostly botnets.

Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her _____ memory.

Answers

Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic  memory.

What is memory?


This is the term that is used to refer to the human ability to store the things that they hear and the things that they see to mind. It is the ability that people have to recollect things that they have seen happen.

The echoic memory is the term that is used to refer to the short term memory that has the ability to store the things that a person would hear. This type of memory may only last for a short while.

Hence we can say that Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic  memory.

Read more on echoic  memory here: https://brainly.com/question/10196869

#SPJ1

The ____ is usually on the right side of the taskbar and displays open services.

Answers

The system tray is usually on the right side of the taskbar and displays open services.

What is the system tray known for now?

The official name for that which is found in the bottom of the screen is known to be called a “taskbar”.

Note that the taskbar is said to be made up of a number of elements, such as the “Start Button”, and others.

The system tray (or known to be "systray") is said to be an aspect of the taskbars in the Microsoft Windows operating system (OS) user interface that helps one to have a kind of easy access icons to the most commonly used apps.

Therefore, The system tray is usually on the right side of the taskbar and displays open services.

Learn more about system tray from

https://brainly.com/question/17667656

#SPJ1

Write a program that takes a string as an input. If the string entered is equal to
“Chicken”, print “This is equal” to the screen. If the string entered is not equal to
“Chicken”, print “This is not equal” to the screen.

Answers

The program could be written using a python script.

Python script on string operation

The program takes a string as an input. First, declare a variable for the input:

var = str()

#The above code will ask for a string to be inputted

Next would be to condition the script in a particular direction using the 'if' statement. That is, a Boolean function.

if var ==('chicken'):

#The above code will compare the inputted string to the word 'chicken'.

  print("This is equal")

#The screen will display 'This is equal' if the inputted stringis the same as 'chicken'.

else:

  print("This is not equal")

#The screen will display "This is not equal" if the inputted string is not the same as 'chicken'.

In summary, the code goes thus:

var = str()

if var ==('chicken'):

   print("This is equal")

else:

   print("This is not equal")

More on python scripts can be found here: https://brainly.com/question/14378173

#SPJ1

what might be the greatest risk to any computer installation?
a. fire b.sabotage c. fraud d.theft​

Answers

Answer: a. Fire

Explanation:

The greatest threat to any computer installation would most likely be a fire. Setting up/installing your computer can be a complicated process where fires can be started if you have power running when it shouldn't.

Sabotage might be the greatest risk to any computer installation. The correct option is B.

Thus, Intentional harm or disruption of computer systems, networks, or data by people with malicious purpose is referred to as sabotage.

It may involve intentional alteration of data to harm or disrupt, the introduction of viruses or malware, unlawful access to private information, or hacking.

Sabotage poses a substantial risk to computer installations and the businesses that depend on them because it can result in lengthy downtime, the loss of crucial data, monetary losses, and weakened cybersecurity.

Thus, Sabotage might be the greatest risk to any computer installation. The correct option is B.

Learn more about Sabotage, refer to the link:

https://brainly.com/question/34707842

#SPJ7

The types of ____ systems used with personal and business computers today include smart cards.

Answers

Answer:

Storage.

Explanation:

I ran into this question before

Answer:

Storage

Explanation:

I've seen this question in a quiz before.

Brendan is examining a report using the design view. which section in the design view is going to appear only once on the first page and could contain logos and title information? page header page footer report header report footer

Answers

Answer:

report header

Explanation:

,,,,,,,,,,,

A machine where the operating system runs an application on top of an operating system is called?

Answers

A machine where the operating system runs an application on top of an operating system is called a virtual machine.

What is a virtual machine?

A Virtual Machine (VM) is known to be a kind of a tool that is known to often help one to be able to compute resource that make use of software to run programs and carry out apps.

An operating system (OS) is said to be the program that, is known to be one that is being first loaded into the computer as a result of a boot program, and it is one that handles all of the other application programs inside any computer.

Hence, A machine where the operating system runs an application on top of an operating system is called a virtual machine.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ1

Tcp is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. computer 1 sends a syn packet to computer 2. which packet does computer 2 send back?

Answers

TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK

What is SYN and ACK?

Client requests connection is one that is often done by sending SYN kind of (synchronize) message to the server.

Note that the Server is one that acknowledges by transmitting SYN-ACK (synchronize-acknowledge) message back to its client.

Hence, the  Client often responds using an ACK ( which is an acknowledge) message, and the connection is  said to be set up or established.

Hence, TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK

Learn more about TCP  from

https://brainly.com/question/27742993

#SPJ1

The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.

Answers

Answer:

Information processing model

Hope it helps!

Cidr simplifies how routers and other network devices need to think about the parts of an ip address, but it also allows for more arbitrary network sizes. what does cidr stand for?

Answers

CIDR stands for Classless Inter-Domain Routing.

What is CIDR?

CIDR is an acronym for Classless Inter-Domain Routing, and it is considered a method for allocating IP addresses and for routing.

It was in 1993 that CIDR was introduced by the Internet Engineering Task Force, and since then this method has been used to replace the previous architecture that addressed networks.

Its main function was to slow down the growth of the tables that contained the routings of the routers in the network. In this way, it was possible to help slow down how quickly IPv4 addresses were reaching.

See more about computing at: brainly.com/question/13805692

#SPJ1

________ focus on managing documents, communicating, and scheduling. group of answer choices transaction processing systems knowledge work systems executive support systems office automation systems.

Answers

Office automation systems focus on managing documents, communicating, and scheduling. The correct option is D.

What is an Office automation system?

An office automation system is a tool from which data can be transferred from one system to another system without using manpower, or without human interventions. Examples are slack, Zoom video calls, Microsoft video calls, etc.

They are used to analyze, collect, and share data. They manage tasks easily, they also manage business process management software.

Thus, the correct option is D. office automation systems.

To learn more about the Office automation system, refer to the below link:

https://brainly.com/question/15131330

#SPJ1

What line of code assigns a char variable outputgames with the value hte gamespointer points to?

Answers

The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:

outputGames = *gamesPointer:

What is a line of a code?

The instructions a programmer is known to often writes when making  a program is known to be the code line.

Note that the Lines of code are seen as the "source code" of any kind of a program, and one line is one that can be used to make or generate a single machine instruction or a lot of it based on the programming language.

Hence,  A line of code in assembly language is seen to be turned into a single machine instruction.

Therefore, The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:

outputGames = *gamesPointer:

Learn more about codes  line of code from

https://brainly.com/question/25875879

#SPJ1

What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment

Answers

The major difference between on-premises identity services and those used in a cloud-hosted environment is to deliver account and/or identity management.

What are cloud services?

In computers, a cloud service can be defined as a type of help in which the company may deliver a service on the internet such as, data storage.

Important companies that provide cloud services over the Internet  (e.g., Amazon Web Services) may handle essential information such as account and/or identity management.

In conclusion, the major difference between on-premises identity services and those used in a cloud-hosted environment is that cloud services can deliver account and/or identity management.

Learn more about cloud computing services here:

https://brainly.com/question/19057393

#SPJ1

The most common format used for data modeling is: A. logic modeling. B. process modeling. C. entity-relationship diagramming. D. a flowchart. E. state-transition diagramming.

Answers

The most common format used for data modeling is  C. entity-relationship diagramming.

What is Data modeling ?

Data modeling in software engineering  can be regarded as the  process involving the  creation of  a data model  that is been used in processing  information system by applying certain formal techniques.

It should be noted that there are different types of modelling but The most common format used for data modeling is  C. entity-relationship diagramming.

Learn more about Data modeling on:

https://brainly.com/question/27250492

#SPJ1

The coalesce function provides one way to substitute constant values for _________________ values.

Answers

The coalesce function provides one way to substitute constant values for null values.

What is a coalesce function?

Is a function that returns the first non-NULL value from a series of expressions. The expressions are evaluated in the order in which they are specified, and the result of the function is the first value that is not null. The result of the COALESCE function returns NULL only if all the arguments are null.

Data type determination of the resulting expression is different. ISNULL uses the data type of the first parameter, COALESCE follows the CASE expression rules and returns the data type of value with the highest precedence.

See more about coalesce function at brainly.com/question/14970953

#SPJ1

Which type of supplier is hired to provide products or services directly to a lead firm?
a) tier-1.
b) tier-2.
c) subcontractors.
d) networks.

Answers

Option 1. The tier one supplier is the one that is hired to provide products or services directly to a lead firm.

Who is a supplier?

This is the term that is used to refer to the producers that have to make the goods and the services available before they send it to the retailers who then make it available for the people that are going to consume the product that is in question.

The tier one supplier can be referred to as those supplies that one would have to have a direct business dealing with to contracted firms and other production partners that help in the distribution of products.

Hence we can say that the  tier one supplier is the one that is hired to provide products or services directly to a lead firm.

Read more on supplier here: https://brainly.com/question/26500183

#SPJ1

Write a raptor program that will display the count from 100 to 0 in decrements of 5.

Answers

A raptor program that will display the count from 100 to 0 in decrements of 5 is shown below.

What is a raptor program?

This refers to a programming environment that works on a flowchart basis to help the user to present their algorithms in a visual manner.

Using a raptor program, you can display a count from 100 to 0 in decrements of 5 as shown:


#include <iostream>

#include <string>

using namespace std;

int main()

{

int count;

Count =100;

while (Count<=0)

{

cout << Count << endl;

Count =Count-5;

}

return 0;

}

The result would be a list showing numbers that go from 100 to 0 in decrements of 5.

Find out more on raptor programs at https://brainly.com/question/15082977

#SPJ1

Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.

Answers

MMS, or Multimedia Messaging Service, as opposed to SMS.

If a client performs a stabilization workout on Monday, a power workout on Wednesday, and an SAQ sports workout on Saturday, what kind of periodization is being used for their mesocycle

Answers

When a client performs a stabilization workout on Monday, The kind of periodization that is being used for their mesocycle is Undulating periodization.

What is undulating periodization?

Undulating periodization is known to be a kind of training that entails a lot of volume and intensity that often go up and down, and it is one that is often done weekly or daily, in course of the training period.

Note that a Weekly undulating periodization (WUP) alters the volume and intensity from  week to week and this is also seen as a program that has a dynamic scheme that gives room for weekly and daily fluctuations.

Hence, When a client performs a stabilization workout on Monday, The kind of periodization that is being used for their mesocycle is Undulating periodization.

Learn more about periodization from

https://brainly.com/question/714921

#SPJ1

The total possible load a stream can transport is its______, whereas a stream's ability to move particles of specific size is its _______.

Answers

The total possible load a stream can transport is its Capacity, whereas a stream's ability to move particles of specific size is its competence .

What is a stream's bed load?

The bed load is known to be an aspect or a part of a stream's load that is known to be a lot larger in nature and it is to be carried in suspension.

Note that Capacity is said to be directly associated to a stream's discharge. and that of Deposition. But if  it slows down, the stream/river is one that will not be able to carry large particles anymore, so they lower to the ground.

Hence, based on the above, The total possible load a stream can transport is its Capacity, whereas a stream's ability to move particles of specific size is its competence .

Learn more about competence from

https://brainly.com/question/26437783

#SPJ1

list the different services provided by computer network​

Answers

Answer:

access to the World Wide Web, digital video, digital audio, shared use of application and storage servers

Which join is made with the following query?
select * from demo1, demo2

A: Explicit inner join
B: Implicit inner join
C: Outer join
D: Cross join

Answers

The cross join is the type of join that is used to create the query.

What is a join statement?

This is the term that is used in database programming in order to refer to the select statement that helps in the combination of the records that are contained in two different tables.

The condition that this is used to make happen is what is called the Join statement. There are different types of this type of condition. They are:

A: Explicit inner join

B: Implicit inner join

C: Outer join

D: Cross join

Read more on database here:  https://brainly.com/question/518894

#SPJ1

What are the different types of topology?​ in details

Answers

Answer:

NETWORK TOPOLOGY .

This tefers to how nodes are connected to the network.

Types of topology.

Physical topology.Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

Bus topologyTree topologyHybrid topologyStar topologyRing topology.

Hope it helps you,any question so far...comment !!!

[tex]\huge\mathcal{♨ANSWER♥}[/tex]

Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology.

They are,

Bus topologyRing topologyStar topologyMesh topologyTree topology

♻Bus topology

Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

♻Ring topology

Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.

♻Star topology

Star topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star topology is one of the most common computer network topologies.

♻Mesh topology

A mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

♻Tree topology

A tree topology is a special type of structure where many connected elements are arranged like the branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate network, or the information in a database.

...hope this helps...

_♡_mashi_♡_

Why is the middle portion of 3des a decryption rather than an encryption?

Answers

Answer:

There is no cryptographic significance to the use of decryption for the second stage. Its only advantage is that it allows users of 3DES to decrypt data encrypted by users of the older single DES by repeating the key.

A process called _____ examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.

Answers

A process called traffic analysis examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.

What is traffic analysis and why is it vital?

Network traffic analysis (NTA) is known to be a kind of a way or a method that is often used in the monitoring network availability and it is also seen as an activity that one is engaged in so as  to know or see anomalies, such as security and operational issues.

Note that the Common use are in regards to cases such as in the Collecting of what we call the real-time and historical record of the things that are happening on your network, and also in the Detecting malware such as ransomware issues or works..

Hence, A process called traffic analysis examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.

Learn more about traffic analysis from

https://brainly.com/question/27227256

#SPJ1

Other Questions
Read the following speech excerpt and then select the correct answer to the question below: President George W. Bushs speech to the troops on the USS Abraham Lincoln Some of you will see new family members for the first time 150 babies were born while their fathers were on the Lincoln.Which answer best describes Bushs point of view as presented in this excerpt? The long deployment has been very difficult on those who serve their country. It is surprising that so many people coincidentally had children. The number of births raises questions about the validity of the information. It is promising for the future of the military that so many babies have been born. Which of the following best describes the interaction between water molecules?Group of answer choicesA. Hydrogen BondingB. London Dispersion ForcesC. Dipole-Dipole ForcesD. Van der Waals Forces Sketch a graph of the following rational function: h(x)= x-1/ x-2x-x+2 The length of a rectangular poster is 5 more inches than half its width. The area of the poster is 12 square inches. Solve for the dimensions (length and width) of the poster. Given u = 3i 8j and v = 4i + 8j, what is u v? 73 8 76 56 what do chemical and physical change have in common? 24. 00 ml of a 0. 25 m naoh solution is titrated with 0. 10m hcl. What is the ph of the solution after 24. 00 ml of the hcl has been added?. what is the nature of ions formed by different atoms. A new product costs $.84 each to manufacture and $.52 each to market. if 50,000 will be sold, what must the price of each product be to provide a profit of 15 percent of the price? True or false? You have created a great new smartphone app while working for apple. apple can sell this app to a third party. When fluids are pulled into capillaries, what type of receptor will detect the resulting pressure? Part a a calorimeter consists of an aluminum cup inside of an insulated container. The cup is weighed on a top-loading balance and is found to have a mass of 31. 91 g. A reaction is conducted in the calorimeter, raising the temperature from 21. 2 c to 26. 1 c what is the change in heat q for the aluminum cup in units of j? aluminum has a specific heat of 0. 903 j 1 ? 1 write your answer to the correct number of significant figures. You wouldn't want to do cpr on someone who is just sedated. once you carefully assess unresponsiveness, you need help! what should you do in each of these situations? Racism and sexism are both types of ______. a. jealousies b. prejudices c. conflicts d. arguments please select the best answer from the choices provided a b c d What type of security control does not require the insertion of the keycard into the reader but relies on the placement of the card within the lock's range to be recognized? A metallic taste in the mouth, epigastric distress, and possible nausea and vomiting are ingestion symptoms for which chemical agent? The rist research and rosenthal-jacobson experiment studied teacher expectations as it relates to students success in the classroom and are examples of which major sociological theory? Which type of satisfaction describes whether an employee is satisfied with aspects such as pay, benifits, and job tasks? 1. the reason tetrodotoxin causes death so quickly is directly related to __________________________ The indian economist amartya sen and colleagues advocated for development policies to focus around:______.