Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries

Answers

Answer 1

Answer:

The answer is "One week".

Explanation:

Following are the number represents of the given values:  

Serial number (se)  [tex]= 200302028[/tex]

Refresh (ref) [tex]= 3600 \ second = 1 \ hour[/tex]

Updated -retry (ret)[tex]= 3600 \ second = 1 \ hour[/tex]

Expiry [tex]= 3600 \times 24 \times 7 = 604800 \ second \ = 1 \ week[/tex]

Minimum [tex]TTL = 3600 \ min = 1 \ h[/tex]


Related Questions

Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or a mobile camera? Explain your answer by providing three reasons why your choice suits your needs.

Answers

Answer:

I would purchase a high-quality digital camera

Explanation:

As a blogger, I most times take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.

The light sensitivity as seen in the ISO, the shutter speed, megapixels, and view-finder are some features I would look out for in a high-quality digital camera.

Answer: To take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.

Explanation: copied the previous answer a bit to better suit the exam requirements.

3. A year contains 365 days normally, so on
what number day does Christmas fall on?

Answers

Answer:

359 is December 25 in a 365 day year.

Explanation:

Answer:

For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.

Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False

Answers

Answer:

A. True

Explanation:

help with these 2 questions srry for the horrible pic​

Answers

Answer:

the first one is email address nd the second one is semi-blocked letters ? sorry if im wrong.

Explanation:

Answer:

I cant read

Explanation:

Write a program that takes a String containing a text using the method signature

String useProperGrammar(String text)
Your method should replace the word ‘2’ with ‘to’ and return the updated text.

For example,

useProperGrammar("can you go 2 the store?")
should return

"can you go to the store?"
This method should also print out the number of grammatical errors that were fixed.

For example, for useProperGrammar("back 2 back 2 back"), the method would also print:

Fixed 2 grammatical errors:
In the main method, ask the user to input a String, and print the results of useProperGrammar using the user input.

Answers

import java.util.*;

public class MyClass {

   public static String useProperGrammar(String message){

       String newMessage = "";

       int count = 0;

       for (int i = 0; i < message.length(); i++){

           if(message.charAt(i) == '2'){

               newMessage = newMessage + "to";

               count ++;

           

           }

           else{

               newMessage = newMessage + message.charAt(i);

           }

       

       }

       System.out.println("Fixed "+count+" grammatical error(s):");

       return newMessage;

   }

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter a string: ");

     String text = scan.nextLine();

     System.out.println(useProperGrammar(text));

   }

}

I hope this helps.

_______and ________ enables computers to communicate and it can pass information between two networks.

Answers

Answer:

Internet Protocol and Transmission Control Protocol        

Explanation:

Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other.  They are developed by Bob Kahn and Vint Cerf.

Databases and EC2 instances are most performant using block-level storage.
A. True
B. False

Answers

Answer:

A. True

Explanation:

It is TRUE that Databases and EC2 instances are most performant using block-level storage.

This is evident in the fact that Databases applications utilize block-level storage in storing files and data, and at the same time that EC2; Amàzon Elastic Compute Cloud, through Amàzon Elastic Block Store utilizes block-level storage to store data.

Hence, in this case, the correct answer is TRUE.

What is the last usable host IP address on the 192.168.32.9/30 network?

Answers

Answer:

192.168.32.10

Explanation:

HOPE THIS HELPS:)

As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors

Answers

Answer:

Printing devices

Video, Audio devices

Communication machines

Explanation:

Printing devices - Sysadmin needs this type of devices for print important data and information.

Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.

Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.

Finish the code to search for a 7 in the array.
from array import *
myArr = array('f',[3, 5, 7.3, 10])
location = myArr.
(7)

Answers

Answer:

The complete code is as follows:

from array import *

myArr = array('f',[3, 5, 7,3, 10])

location = myArr.index(7)

print(str("7")+" is at position "+str(location+1))

Explanation:

I made corrections to the third line of the code and I added a line

This line gets the index of 7 from the array myArr using the index keyword

location = myArr.index(7)

This line prints the position of the 7 in the array

print(str("7")+" is at position "+str(location+1))

A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What must occur in order for the students to perform this investigation?

Answers

Answer:

the temperature of the sample must change

Explanation:

A business owns a printer but the printer is used for cloud printing purposes. What type of resource is this?

Answers

I’m confused , what are the choices ?

Use the {blank} to view your presentation the way an audience will see it.
A. Slide Show Button
B. Play Button
C. Tools Menu
D. View Menu

Answers

I would believe it would be A. Slide Show Button

Answer:

A. Slide Show Button

Explanation:

Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the text field without clicking on it. What is correct way using?
1. .
2. .
3. .
4. Can't be done with only HTML5, need help of Javascript or something else.

Answers

Answer:

The answer is "Option 2".

Explanation:

In HTML5, text inputs use an autofocus attribute, which, when the page is loaded, uses a template to concentrate primarily on text fields. This attribute is a Boolean property that represents the HTML autofocus attribute, showing if the related <select> element will receive an output focus whenever the page loads if it is overruled by the user. An only form-associated entity can have this property specified in a text.

which data representation system is based on the digits 0-9 and is mostly easily interpreted In real wrold situations​

Answers

Answer:

Hexadecimal  data representation system is based on the digits 0-9 and is mostly easily interpreted In real word situations​ .

Explanation:

Hexadecimal manages sixteen different figures: most often the numbers 0–9 to describe values zero to nine, and (A–F) to describe values ten to fifteen. The modern hexadecimal system was first launched into the domain of computing by IBM in 1963. An older description, with 0-9 and u-z, was practiced in 1956 by the Bendix G-15 computer.

If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2

Answers

Answer:

Yes

Explanation:

Because all answers are intotal (2)

Tips for staying safe using social media. Using in your own words.

Answers

Whatever you post on social media, it's now public. Yes there are ways to make posts private and such, but glitches do happen. Not only that, but hackers may be able to turn privacy features off. Also, sometimes the social media company changes policy on some aspects, which may turn some private features into public ones. That means you should be careful not to post anything too personal and also don't post anything such as addresses, bank account numbers, passwords, etc. This is probably common sense to you, but it's a good thing to keep in mind regardless.

Also, if there are people who verbally threaten or harass you, then you should either report them or block them. Preferably both, but blocking is probably more effective. If someone friend requests you, then it's ideal to only accept their request if you know who they are. Though you can relax this if you aren't worried about who sees your profile page.

In addition, you should be careful as to what you read on social media. Not everything is true. This is because practically anyone can post a news story even if it's completely made up. Lately there have been some efforts to do fact checking, but there's still a lot of fictional stuff out there. Be sure to avoid clicking on any links you may not recognized as they could be phishing links, or may lead to harmful malware. It's probably just best to get an antivirus of some kind.

What is the value of grade after the segment of code executes int result = 95?
if (result >= 90) grade = "A";
if (result >= 80) grade = "B";
if (result >= 70) grade = "C";
if (result >= 60) grade = "D";
else grade = "E";
Asnwer Choices
1.A
2.B
3.C
4.D
5.E

Answers

Answer:

the answer is A

because 80 to 90 is B

so 90 to 100 is A

Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow each number with a space.
Sample output with input: 8
8 16 32 64
Here's what I havenum_insects = 8 # Must be >= 1print(num_insects, '', end='')while num_insects <= 100 : num_insects = num_insects * 2 print(num_insects,'', end="")This code prints the number 128 even thought the loop is set to end after 100? Why is that?

Answers

Answer:

The while loop is executed one more time when num_insects is 64. It gets doubled and 128 gets printed. Then the while loop is not executed anymore since 128 exceeds 100.

So the reason you see 128 is because the multiplication by 2 happens inside the loop before you print. You enter it with 64, but by the time you get to the print statement, it was already multiplied.

The solution is to switch the print and the multiply:

num_insects = 8 # Must be >= 1

while num_insects <= 100 :

   print(num_insects,'', end="")

   num_insects = num_insects * 2

This has one added advantage that the very first print statement outside the loop can be removed.

Game Informer (often abbreviated to GI) is an American-based monthly magazine featuring articles, news, strategy, and reviews of popular video games and associated consoles. Formed in August 1991,[1] the magazine has nearly 3 million subscribers according to Andrew Reiner, making it the highest circulated video game magazine,[2] and as of the first quarter of 2007, it is listed as the 23rd largest overall magazine. Game Informer is now ranked among the top four magazines for reaching males 18 to 34.[3] It is owned and published by GameStop Corp., the parent company of the video game retailer of the same name. Due to this, a large amount of promotion is done in-store, which has contributed heavily to its large subscription base,[4] especially as a subscription is included with the store's Gamer's Edge discount card. Contents [hide] · · 1 GI Staff · · 2 Recurring events · · 3 Reviews · · 4 Website · · 5 References · · 6 External links Judging from this introduction, what kind of information would you expect to find in the article? a. How many people subscribe to Game Informer c. A list of games about which Game Informer has written b. Who works for Game Informer d. none of the above

Answers

Answer:

it is d i just took it

Explanation:

There is not any kind of information would you expect to find in the article, hence option d is correct.

What is information?

Information is defined as a vague idea that describes something with the capacity to inform. Information is most fundamentally concerned with the interpretation of what may be sensed. Facts and text elements including a glossary, table of contents, photographs, and captions are characteristics of informational literature.

Game Informer is a consumer advocate who aims to assist gamers in finding games they will enjoy, and it has built a solid reputation for reliable reviews and clear, succinct reporting by an experienced staff. You can access both the PC/Mac browser version of Game Informer as well as the Game Informer app for iOS or Android with a single digital subscription.

Thus, there is not any kind of information would you expect to find in the article, hence option d is correct.

To learn more about information, refer to the link below:

https://brainly.com/question/13629038

#SPJ2

Which of the following options allow you to access a computer remotely?

a. NTP
b. SSH
c. Server
d. VPN

Answers

Answer:

b. SSH

Explanation:

Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.

Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.

Thus, option "B" is the right answer.

Select the statement below that would most likely appear in a description of the Link-State routing protocol. Assume the referenced routers are all part of the same network: Group of answer choices Each router talks, sends updates, to all other routers on the network Each router only talks, sends updates, to its neighbors Each router will be controlled by a large master router All of the above

Answers

Answer:

Each router only talks, sends updates to its neighbors

Explanation:

There are two types of routing protocol, they are, link-state and distance-vector routing protocol. The link-state protocol is performed by nodes or routers prepared for packet switching. Each node is responsible for mapping out the route of the network, using the reachability protocol to assert the connectivity to neighboring nodes, updating its route and sending the link-state update messages periodically to neighboring nodes.

Which of the following is the primary difference between analog and digital communication?

Im marking Brainliest

electric cables vs. fiber cables

electric pulses vs. electronic devices

radio signal vs. microwave signal

radio signal vs. radio frequency

Answers

Answer:

Radio signal vs. microwave signal.

Explanation:

it's the suitable but again it's a weak answer to compare analog from digital signals

Answer:

Electric pulses vs. electronic devices

Explanation:

edg2021

direct quote from AV notes: "Analog technology transmits information using electric pulses. The human voice is the best example of analog communication. As the telephone was the major communication channel in the past, analog communication was common and the only type used.

Today, we depend on digital communication. Digital technology breaks down information into numerical bits and transmits the bits to digital receivers that decode the bits and recompose the original information. "

PLZ HELP THIS ENDS TODAY
During slide show mode, hitting the B key will do which of these?

End your presentation

Blank the screen with black screen

Move back one page

Move to the first page of your presentation

Answers

Answer:

B or Period. Pressing the B key or period key pauses the slideshow and displays a black screen, which you can write on. Press the B or period key again to resume the slideshow.

Answer: It blanks the screen black.

You should use the arrow keys.

Explanation:

I tried it.

Several key people were involved in programming-language development in the 1970s and 1980s

Answers

Answer:

Brian Kernighan and Dennis Ritchie created the C programming language, and Bjarne Stroustrup took it to the next level by creating C++ in the 80's.

Answer:

Bjarne Stroustrup released C++ programming language in the1980s.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Explanation:

1,3,4

A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general issues with the data. You advise the company to implement live monitoring and use ad hoc queries on stored JSON data. You also advise the company to set up smart alerting to detect anomalies in the data.You need to recommend a solution to set up smart alerting.What should you recommend?A. Azure Security Center and Azure Data Lake StoreB. Azure Data Lake Analytics and Azure Monitor LogsC. Azure Application Insights and Azure Monitor LogsD. Azure Site Recovery and Azure Monitor Logs

Answers

Answer: B. Azure Data Lake Analytics and Azure Monitor Logs

Explanation:

There is a feature on Azure Monitor called Application Insights. This feature offers clients the ability to implement live monitoring of applications as well as detect anomalies.

With its analytics tools, clients can diagnose the issues reported by users as well as follow and understand the activities of users.

What skills, knowledge, and strengths do you feel you bring to the FlexPath program?

Answers

Answer:

The answer is below

Explanation:

Skills: Problem-solving skills, Great attention to details skills

Knowledge: Computer Literacy, Mathematical and Statistical skills

Strength: highly disciplined and well determined.

Hence, I understand that I possess all the aforelisted skills, knowledge, and strength, that would assist me during the Flexpath program.

This will make me excel and complete the required courses with good grades.

Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?

Answers

Answer:

Run OCI session authenticate and provide your credentials

Explanation:

The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials

do you agree or disagree with the assertion that edutech transforms teachung and learning ​

Answers

Answer:I agree!

Explanation:

Agree

In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to see what is actually going on in memory. Show the values of str1, str2, and str3 and the output after each line of code on a piece of paper.

Answers

Answer:

The memory with variable names str1, str2, and str3 all have equal and the same value after the first if-statement.

Explanation:

The str1 was first assigned a null value while the str2 and str3 were assigned the string value "Karen" with the String class and directly respectively. On the first if-statement, the condition checks if the str1 is null and assigns the value of the variable str2 to str1, then the other conditional statement compares the values of all the string variables.

Other Questions
________ is the enthalpy change when 1 mole of a substance is formed from its elements under standard conditions.A. HcB. HnC. HfD. Ha Find the third side in simplest radical form: thailand's physical futures Frank is going to plant b vegetable seeds in one garden and 4b + 4 vegetable seeds in another. How many seeds is Frank going to plant? Show your work PLEASE HELPPPPP I NEED IT RIGHT THIS MINUTE PLEASEEEEEEEEEEEEEEEEEEEEEEEEE Graph 16x - 4y = 2. Help plssssssssssssssss Which organism is a carnivore? giraffe elephant lion bear Name three items to remember when completing a job application. When a company prepares financial statements using standard costing, which items are reported at standard cost Mrs. Braun is the art instructor at the local high school. Dale is a student. One day the maintenance staff forgot to display a warning that the floors had been mopped and were wet. The stairway to the art studio was so slippery that Dale fell down the stairs, breaking his arm. Mrs. Braun was teaching class at the time. When she heard the noise of his fall, she ran out to see what was wrong. She, too, slipped and broke her ankle.1.)From whom can Mrs. Braun recover damages? How will she recover these damages? Is there a limit to the amount she can recover?2.) Why does the law treat these two injured people differently? Is this fair? Explain. A small co ffee company roasts coff ee beans in its shop. The unroasted beans cost the com- pany 200 cents per pound. The MARGINAL cost of roasting coff ee beans is 150 - 10q + q^2 cents per pound when q pounds are roasted. The smell of roasting beans imposes costs on the company's neighbors. The total amount that neighbors would be willing to pay to have the shop stop roasting altogether is 5q^2; where q is the number of pounds being roasted. The company sells its output in a competitive market at 450 cents per pound. What is the socially efficient amount of co ffee for the company to roast? I need help in question 9 plzzz Riley wants to make 100 ml of 25% saline solution but only has access to 12% and 38% saline mixtures. At a pizza party, where each person had their own pizza, 12 people ate 100% of their pizza, 7 people ate 75% of their pizza, and 3 people only ate 50% of their pizza. What was the average amount of pizza eaten by all people attending the party? ABC Corporation is one of the largest energy companies in the UnitedStates, with over $50 million in publicly traded shares. The corporation's unusual accounting practices have disguised the fact that the company has accumulated significant losses over the past five years, making it appear far more profitable than it is. The CEO of ABC Corporation has decided to continue misleading investors by hiding its mounting debt in order to support the company's current market valuation.How would a deontologist evaluate this decision?a. ABC Corporation is acting unethically because it has certain rights as a corporation, and therefore has a corresponding duty to consider the public good.b. ABC Corporation is acting unethically because the results of its dishonesty are likely to be negative for its employees, for its shareholders, and for society as a whole.c. ABC Corporation is acting unethically because it sees the investors' interests as unequal to the interests of the CEO and the corporation.d. ABC Corporation is acting unethically because it is not striving for truthfulness or high-mindedness.Select the example where the court has established personal jurisdiction over the defendant.a. Frank, an accountant, is suing a client for unpaid bills. The client is located in Mississippi, and Frank lives and works in Virginia. Frank initiates his lawsuit in his home state, because he knows many of the state judges.b. Miguel is being sued by an acquaintance of his over unpaid debts. Both Miguel and the plaintiff are residents of Colorado. Miguel has not been personally visited by a process server with a summons to appear in court, but he did receive one in the mail at his home.c. Drew is being sued by a man who claims that Drew committed slander by speaking ill of him. Drew lives in Oregon, but the man is from Texas. Drew has received a summons ordering him to appear in court in Texas to respond to the complaint.d. Aisha, a resident of New York, is visited by a process officer at her workplace in New York City and delivered a summons to appear in court in Maryland. The lawsuit against her relates to property damage that occurred in a home she rented in New Jersey, which is owned by a woman from Maryland. Committees that consider a proposed bill have the authority to reject or approve it, but not make changes. make changes and sign it into law. make changes, approve it as is, or reject it. approve it and send it to voters for final say. Help plzzzzz it's for my midterm please I beg of u Why do we perform stork stand test Damian bought a box of raisins that weighed 40 ounces. How many pounds of raisins did Damian buy?2 1/233 1/24