In a/an ………… of DNS resolver, the
queried name server can return the best
answer it currently has back to the DNS
resolver.
a. Recursive queries
b. Iterative queries
c. Reverse queries
d. Inverse queries

1 Answer

Answer :

b. Iterative queries

Related questions

Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? a. Resolver b. Mapper c. Primary Server d. Secondary Server

Last Answer : a. Resolver

Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? A. Resolver B. Mapper C. Primary Server D. Secondary Server

Last Answer : A. Resolver

Description : The DNS server that received the initial ……... query checks it’s ………… is called…………... A. Recursive, zones B. simple, zones C. simple, class D. Recursive, class

Last Answer : A. Recursive, zones

Description : The ______ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers. A. transporter B. distributers C. Resolvers D. both a and b

Last Answer : C. Resolvers

Description : Which databases is queried by Whois? a. ICANN b. ARIN c. APNIC d. DNS

Last Answer : a. ICANN

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : Which of the following tool is used for Windows for network queries from DNS lookups to trace routes? A. Sam Spade B. SuperScan C. NetScan D. Netcat

Last Answer : A. Sam Spade

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : Project risk factor is considered in ? Spiral Model Waterfall Model Prototyping Model Iterative enhancement Model

Last Answer : Spiral Model

Description : __________ do not take their decisions on measurements or estimates of the current traffic and topology. a. Static algorithms b. Adaptive algorithms c. Non - adaptive algorithms d. Recursive algorithms

Last Answer : c. Non - adaptive algorithms

Description : Suppose ORACLE relation R(A, B) currently has tuples {(1, 2), (1, 3), (3, 4)} and relation S(B, C) currently has {(2, 5), (4, 6), (7, 8)}. Consider the following two SQL queries SQ1 and SQ2 ... (A) 2 and 6 respectively (B) 6 and 2 respectively (C) 2 and 4 respectively (D) 4 and 2 respectively

Last Answer : (D) 4 and 2 respectively

Description : In networks thatdo not support physical multicastaddressing, multicastingcan be accomplished through _______. A) mapping B) queries C) tunneling D) noneof the above

Last Answer : tunneling

Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above

Last Answer : can use aggregatefunctions like SUM and COUNT

Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following is/are the Database server functions? i) Data management ii) Transaction management iii) Compile queries iv) Query optimization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv

Last Answer : A) i, ii, and iv only

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP

Last Answer : c. DNS

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : The address resolution protocol (ARP) is used for a. Finding the IP address from the DNS b. Finding the IP address of the default gateway c. Finding the IP address that corresponds to a MAC address d. Finding the MAC address that corresponds to an IP address

Last Answer : Finding the MAC address that corresponds to an IP address

Description : …………………………………. converts a physical network address into an IP address. A. ARP B. RARP C. DNS D. DHCP

Last Answer : B. RARP

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : A zone is a contiguous portion of a ………….. of the DNS namespace whose database records exist and are managed in a……….. DNS database file. A. domain, particular B. Class, particular C. tree, local D. Domain, every

Last Answer : A. domain, particular

Description : The ____ namespace is based on a hierarchical and logical tree structure A. DNS B. Address C. table D. both a and b

Last Answer : A. DNS

Description : Explain about DNS

Last Answer : - Name server - Name resolution

Description : Like semantic networks, frames can be queried using spreading activation. a) True b) False

Last Answer : a) True

Description : Consider the following three SQL queries (Assume the data in the people table) : (a) Select Name from people where Age>21; (b) Select Name from people where Height>180; (c) Select Name from people where (Age>21) or (Height ... number of rows returned by the SQL query (c) ? (A) 3 (B) 7 (C) 10 (D) 21

Last Answer : (C) 10

Description : A browser uses the DNS system to convert a domain name into an ip address. But once it has the the ip address how does it know where the server is located and reach the server to download the site?

Last Answer : The point of an ip address is that each one is unique. It’s not unlike an address on an envelope. How does the mail know where to go? There is only one possibility.

Description : What is a function of a DNS server?

Last Answer : DNS server's main function is to associate the domain name with the appropriate IP address. DNS servers convert domain names into IP addresses, which a computer understands, thereby taking control of which server a user can access via a specific domain.

Description : When a client computer sends a request to a Domain Name System (DNS) server, what type of packet is sent?

Last Answer : DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests. DNS queries consist of a single UDP request from the client followed by a single UDP reply from the server. ... the answer exceeds 512 bytes and both client and server support EDNS, larger UDP packets are used.

Description : DNS stands for: a) Domain Network Service b) Domain Necessarily Server c) Domain Name System d) None of These

Last Answer : c) Domain Name System

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : The term DNS stands for (A) Domain Name System (B) Defense Nuclear System (C) Downloadable New Software (D) Dependent Name Server

Last Answer : (A) Domain Name System

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : Frequency and period are ______. A) inverse ofeach other B) proportional to each other C) the same D) none of the above

Last Answer : inverse ofeach othe

Description : The _______ domains define registered hosts according to their general behavior. A. generic B. country C. inverse D. none of the above

Last Answer : A. generic

Description : A signal derived from a controlled function and returned to the initiating point is called a/an ____________. A. monitoring signal B. inverse signal C. reverse signal D. feedback signal

Last Answer : Answer: D

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : Which of the following practices are not suggested for producing relevant content? a. For creating notable content recurrently, create hero "content for tent-pole events". b. For creating ... specifics. d. For creating relevant content consistently, create help" content to answer queries."

Last Answer : c. For creating more content than your competitors, create lots of articles that are short, unsubstantial, or otherwise lacking in helpful specifics.

Description : Which of the following is NOT a best practice for producing content? A. To produce remarkable content frequently, create hero "content for tent-pole events." B. To produce valuable content ... helpful specifics. D. To produce relevant content consistently, create help" content to answer queries."

Last Answer : C. To produce more content that your competitors, create lots of articles that are short, unsubstantial, or otherwise lacking in helpful specifics

Description : What are the iterative methods mainly used for solution of load flow study.

Last Answer : The Guass sedal method and Newton Raphson method are the two iterative methods.

Description :  According to PMBOK, project management process groups are iterative, which  was originally defined by Walter Shewhart and later modified by Edward Deming.  Generally, one outcome from a previous process can serve ... -Do-Check-Act cycle c. Project phases d. PM processes e. HR process cycle

Last Answer : b. Plan-Do-Check-Act cycle

Description : Unlike traditional Work Breakdown Structures (WBS), evolutionary WBSs are  a. organized in a standard manner across all projects  b. created in an iterative and incremental manner  c. designed so one can compare the current project to past projects  d. all of the above  e. none of the above

Last Answer : d. all of the above

Description : Which search algorithm imposes a fixed depth limit on nodes? a) Depth-limited search b) Depth-first search c) Iterative deepening search d) Bidirectional search

Last Answer : a) Depth-limited search

Description : A process that is repeated, evaluated, and refined is called __________ a) diagnostic b) descriptive c) interpretive d) iterative

Last Answer : d) iterative

Description : 66. Which method is an iterative procedure for solving LPP in a finite number of steps? a. Simplex algorithm b. Slack variable c. Big M method d. Simplex method

Last Answer : d. Simplex method

Description : The model in which the requirements are implemented by category is (A) Evolutionary Development Model (B) Waterfall Model (C) Prototyping (D) Iterative Enhancement Model

Last Answer : (A) Evolutionary Development Model

Description : Define iterative deepening search.

Last Answer : Iterative deepening is a strategy that sidesteps the issue of choosing the best depth limit by trying all possible depth limits: first depth 0, then depth 1,then depth 2& so on.