The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process?

A) The client sends a request to the DNS server.
B) The DNS server the IP adress back to the URL.
C) The process starts over back at the beginning.
D) The web server sends information back to the web broswer.

Answers

Answer 1

The final step in the DNS process is The web server sends information back to the web broswer.

What occurs when you enter a URL in one's browser?

Note that if you enter a URL into a web browser. The browser is said to search for the IP address for the domain name through the use of DNS.

Furthermore, The browser then sends a HTTP request to the server and the server is known to also sends back a HTTP response back.

Learn more about web browser from

https://brainly.com/question/18455725


Related Questions

(minimum 4 sentences) What is cyber security and why is it important

Answers

Answer:

A cyber security that is used for people being rude and disrespectful online.A cyber security is also used so that none of your personal information gets out.It is important to have  cyber security because it keeps all your personal data safe.Cyber security is good to have if you have a job that has information about other people saved.

Explanation:

In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
100,000
1 billion
1 million
1000

Answers

Answer:

The correct answer is D) 1 Million

Explanation:

It has been predicted that in about five years the Information Technology sector in the United States will have about 1 million unfilled roles in computer science.

Cheers!

What is the purpose of the Chart feature in Word?
O A chart can be used to draw and format a Word table.
O A chart can be used to paste information from a graph.
O Information can be typed into a chart to create a graph.
O Information can be typed into a chart to insert a Word table.

Answers

Answer:

Its the third option.

Explanation:

Answer: its c Information can be typed into a chart to create a graph

Explanation:

Name two ways creating and managing a schedule in a spreadsheet help you reach your goals?

Answers

By keeping track of your work
Keeping you calm and not overwhelming you with unknown work

Creating and managing a schedule, one can:

It will help you to know the numbers of days you need to schedule for.Help you to Assign employees or people to their shifts.

How does spreadsheet  management help you achieve your goals?

The at of managing your spreadsheet  wisely is one that entails having a good and careful planning of everything you want to do.

Note that by creating and managing a schedule in a spreadsheet, it can help you reach your goals as It will help you to know the numbers of days you need to schedule for.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ2

Which is most likely to cause confusion, hinder thinking, and prevent quick access to resources in a study
environment?
O phones
O clutter
O noise
O laptops

Answers

Answer:

B. Clutter

Explanation:

I just looked it up on quizlet and quizlet is always right. Helps me on test and everything. But it distracts you unlike phone and laptop because you can not ignore clutter like you can with other things, because clutter makes you confused and wonder what is going on.

A _____ describes two or more computers connected to each other.

computer network

client

server

switch

Answers

Answer:

C

Explanation:

computer network

how many 16ths are in 3/8 of an inch

Answers

Answer:

0.375

Explanation: i think

What does "Forward" in emails do?​

Answers

Basically just want to make your your email is easy

Computers can give you a false sense of security. O True False​

Answers

Answer:

True in my opinion is this for a test?

Explanation:

html use for web page deaign true or false​

Answers

PLEASE GIVE BRAINLIST

False

HOPE THIS HELPED

Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about the use of cyberterrorists?

Answers

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being completely executed? 3 0 1 None of these values will produce a mathematical error

Answers

Answer:

The answer is the last choice that is "None of these values will produce a mathematical error".

Explanation:

In this question, the above given choice correct because neither of the flowchart procedures could trigger a mathematical error. This error could not be induced by multiplication, addition and subtraction, and the only division by 15. It is the only divide by 0, that's why the above flowchart will produce a mathematical error.

Josh wants to convey his best wishes to johnathin for a meeting schedualed later diring the day. Which business documented would be most approperiate in his senario

Answers

Answer:

C.  email

Explanation:

The Email should be termed as electronic mail which is to be used to convey a message in an instant seconds

It is to be expressed in a formal way of communicating any message, notice, The important thing, etc

It is a quick, easy to use and most convenient way to send a message

Here in the given situation, since John wants to convey the best wishes for a meeting that scheduled later so here the email is the best and appropriate way to communicated as it is business documented also

what are super computers? what is their application in real life situation​

Answers

Answer:

A supercomputer is a computer with a high level of performance as compared to a general-purpose computer. Common applications for supercomputers include testing mathematical models for complex physical phenomena or designs, such as climate and weather, evolution of the cosmos, nuclear weapons and reactors, new chemical compounds (especially for pharmaceutical purposes), and cryptology.

What were precomputed tables and why were they necessary?​

Answers

Yesterday’s comment is a good idea to have you on in your life if I can find a good job in the world of the control you can get in your life if you’re a real life or you can get your own job

Precomputation in algorithms refers to the act of running an initial computation ahead of run time to create a lookup table that may be used by an algorithm to avoid running the same computation repeatedly each time it is executed.

What is algorithm?

An algorithm is a process used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

Algorithms are procedures for resolving issues or carrying out tasks. Algorithms include math equations and recipes.

Algorithms are used in programming. All online searching is done using algorithms, which power the internet.

The term "precomputation" in the context of algorithms refers to the act of performing an initial computation before the algorithm is actually used.

This creates a lookup table that the algorithm can utilise to avoid performing the same computation repeatedly each time it is used.

Thus, this way, precomputed tables are essential.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ2

Convert the following into binary system
and vice versa.
106​

Answers

It would be 1101010 in binary
It would be 1101010, I think

how do you get people to add you?

Answers

Answer:

go to their profile and click the person icon and done

Explanation:


Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols group?

Answers

Answer:"TM"

Explanation:

Answer:

TM

Explanation:

because its used to identify, trademarks and etc. mark brainliest! i also got 100 on the quiz

If you were to conduct an Internet search on vegetarian restaurants, which of the following searches would be the best
to use?
'vegetarian restaurants
"restaurants
"vegetarians"
all of these

Answers

Answer:

A.

Explanation:

just did it

you really need to ask brainly for this question? obviously its vegetarian restaurants

What is the greatest common
factor of the following three
numbers?
12, 18, 32​

Answers

Answer: 2

Explanation:

PLZZ HELP!! ITS FOR A TEST!! Third generation computers were set apart because of this invention. A) microprocessors B) transistors C) integrated circuits D) vacuum tubes

Answers

Answer:

A. Invention of microprocessor

Explanation:

The third generation of computer itself was based on the technology of integrated circuits (shorten as IC).

It lasted for about 6 years and was brought to an end with the advent of the fourth generation of computers which was based on microprocessors.

Hence, option A answers the question.

Answer: I'm pretty sure the answer is C. Integrated Circuits.

Explanation: "The computers of the third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry. The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient." ( Tutorialspointwww.tutorialspoint.com)

What are some cowboy ethics??

Answers

Answer:

giv meh a min plsssss

Explanation:

Which of the following is not an operating system
A.LINUX
B.MAC OS
C.NEXUS
D.WINDOWS

Answers

Answer:

C

Explanation:

I hope this helped.

Answer:

I honestly don’t know... But I’m still gettin that credit Broski

Explanation:

New technology is driven by new discoveries in the _________ field.
Group of answer choices

finance

geology

mathematics

science

Answers

Answer:

science.......... ..

pls answer fast in five mins​

Answers

The answer is true!! I hope this helps!!

Which of these jobs would be most appropriate for someone who majors in information systems?

Answers

Answer:

An Architect, System Designers, IT business analysts etc...

Explanation:

Answer:An Architect and System Designers someone who studies complex work

Explanation:

Question 1 (1 point)
Which word means "many different kinds?"
a
b
variety
vertigo
extraordinary
с
d
vast

Answers

Answer:

Variety is many different kinds.

Variety is the answer. It means different kinds

What products can be benefited from cyber security?

Answers

Computers. It protects the system from viruses worms and spyware

it is used to replace numeric number of a website​

Answers

greatflombles or gr8flombles or go2flombles

My study background is business. I am doing a bachelor of business administration. My major course is management information of the system. But I want to do data science. I know the journey is typically hard for me. In future , it will be demandable if I do data science in master's . Have I made a good decision?

Answers

Answer:

Yes,I think your going on right path! Keep up the hard work ! You got this!

Other Questions
characteristics of religion jamestown? How was most of African History preserved? ADP is used as an energy source in organisms. True or False La suma de dos numeros es 208 y su diferencia es 122cuales son los numeros? 6. During the school fundraiser, the 4th grade raised $2,124. The 5th grade raised $396 less than 4th grade. How much money did the 4th and 5th grades raise together? Solve each system of equations using substitutionY=2x+35x-2y=-6 if 18 more than twice a number is -10,what is the number? All of the following devices tiansmit energy/information: cell phones, walkie talkies, remotecontrols, and sunlight. Which statement is true regarding these transmissions? A financial transaction that is added to a ledger balance is called a creditPlease select the best answer from the choices providedOTOF People captured in war usually became part of which social class in Sumer? upper class lower class middle class enslaved class can someone help quickly What does an arrow as an endpointimply for a function? How does iteffect your domain and range?I In which region do the Tulalip people live? Human activities can have positive and negative effects on the environment Humans can benefit natural areas by CA throwing waste products in these areas. B. removing all the vegetation from these areas. c. polluting the areas by burning fossil fuels. D. preserving the natural resources that they provide Identify and explain ONE reason for the division within the Islamic world that led to the development of Sufism. Please help fast, giving out 70 points Read the excerpt from Eighty Years and More. Which statement best describes the central idea of this excerpt? A) Stanton first fought for gender equality when she discovered that she disagreed with her father. B) Stanton destroyed her fathers law library because she did not agree with the laws. C) Stanton attempted to cut laws out of her fathers books so he was unable to enforce them. D) Stanton discovered inequality and began fighting for gender equality at a young age. Explain the difference between a middleman trade system and a group trade system. Write an equation for the cubic polynomialfunction shown.To find the equation of the function, first find theof the graph. which sphere regarding carbon would be the most immediately affected by a decrease in sunlight Whats the independent variable, dependent variable, experimental variable and constant?Scenario #1: Traci thinks that instrumental music played in the office will increase the productivityof workers at the office. She creates two groups of 50 workers each and assigns each group thesame task in this case, they are asked to staple a set of papers). Group A has instrumental musicplaying while they work. Group B does not have any music playing for them. After an hour, Tracicounts how many stacks of papers each group has made. Group A made 2,113 stacks. Group Bmade 1,587 stacks.