is domain name system encrypted?

Answers

Answer 1

Answer:

they are all the same

Explanation:

all the packets look the same tis is because of HTTPS and HTTP/2, and how they both use connection


Related Questions

Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home computer to manage her personal business and wants to make sure her information and online accounts are protected from hackers.

What steps should Tessa take to protect her accounts? Check all that apply.

change passwords frequently
review privacy settings
change current screen name
purchase another computer
adjust safety settings

Answers

Answer:
Adjust privacy settings
Change passwords frequently
Adjust safety settings
Explanation:
Hope that helped

The steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Given that Tessa want to protect her accounts from the hackers,

We need to provide the steps to do the same,

To protect her accounts from hackers, Tessa should take the following steps:

a) Change passwords frequently: Regularly changing passwords for her online accounts can help prevent unauthorized access.

Strong, unique passwords that include a combination of letters, numbers, and symbols should be used.

b) Review privacy settings: Tessa should review the privacy settings on her online accounts and ensure that they are set to the appropriate level of security.

This includes adjusting who can see her personal information, posts, and photos.

c) Adjust safety settings: Tessa should check the safety settings on her computer and enable features like firewalls and antivirus software to protect against malware and other threats.

d) Change current screen name: If Tessa is using a screen name that can be easily linked to her personal information, it's advisable to change it to something less identifiable to reduce the risk of targeted attacks.

e) Purchase another computer: While purchasing another computer may be an option in certain cases, it's not a necessary step for general account protection.

However, if Tessa's current computer is outdated or lacks essential security features, upgrading to a more secure device could be beneficial.

Therefore, the steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Learn more about Hacking click;

https://brainly.com/question/28311147

#SPJ2

summarize how to write well-organized paragraphs

Answers

Decide on a controlling idea and create a topic sentence. ...
Explain the controlling idea. ...
Give an example (or multiple examples) ...
Explain the example(s) ...
Complete the paragraph's idea or transition into the next paragraph.

This type of file is created when you save your word processing document.
access,
data,
program, or
system

Answers

Answer:

data

Explanation:

Answer:

Data

Explanation:

Files contain data and stuff you have saved to the device.

3.7) BEST ANSWER BRAINLIEST

your answer will be reported if it is ridiculous


Which is NOT a question that might help a network engineer isolate which layer in a network has a problem?



Is the user operating the software correctly?


Is everything plugged in?


Are messages arriving in a timely manner?


Are the data displaying in a garbled manner?

Answers

Explanation:

i think it is are messages ariving in a timely manner?

Answer:

Is the user operating the software correctly?

Explanation:

Thats the correct one for edge

Assign sub_lyric by slicing rhyme_lyric from start_index to end_index which are given as inputs.

Sample output with inputs: 4 7
cow

Answers

In python:

sub_lyric = rhyme_lyric[start_index:end_index]

Just add this line of code wherever you need it. I hope this helps!

Answer:

start_index:end_index

Explanation:

put this where it says '''Your solution'''

Problem1: How Much Snow? Snow is falling at the rate of 0.8 inch per hour. Evaporation occurs at the rate of 2% per hour. Complete program HowMuchSnow.java to calculate how many inches of snow are on the ground after snowing a number of hours.

answer in coding on j creator

Answers

public class HowMuchSnow{

    public static void main(String []args){

       System.out.println("Hello World");

       System.out.println("There are "+ SnowFall(3) + " inches of snow on the ground.");

    }

    public static float SnowFall(float hours){

        float falling = 0.8f - (0.8f * 0.02f);

        return falling * hours;

    }

}

I hope this helps!

write a calss called animak that contains a static variable called count to keep track of the number of animals created

Answers

Answer:

Follows are the code to this question:

class Animal //defining a class Animal

{

static int count = 0;//defining static integer variable count

int myCount;//defining integer variable myCount

Animal() //defining default constructor Animal

{

myCount = ++count;//use myCount to hold incrementing value of count

}

public static int getCount()//defining a static method getCount

{

return count;//return count value

}

public static void setCount(int count)//defining a static method setCount that accept a parameter

{

Animal.count = count;//use class to hold value in count variable  

}

public int getMyCount() //defining a method getMyCount

{

return myCount;//return myCount value

}

}

public class Main//defining a class Main

{

public static void main(String[] ax)//defining main method  

{

Animal a1 = new Animal();//creating animal class object

Animal a2 = new Animal();//creating animal class object

Animal a3 = new Animal();//creating animal class object

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("first animal count: " + a1.getMyCount());//calling getMyCount method

System.out.println("second animal count: " + a2.getMyCount());//calling getMyCount method

System.out.println("third animal count: " + a3.getMyCount());//calling getMyCount method

}

}

Output:

please find the attached file.

Explanation:

please find the complete question in the attached file.

In the above-given code, a class "Animal" is defined, inside the class two integer variable "count and myCount" is defined, in which "count" is the static variable.

In the next step, the class constructor is defined that holds the incrementing value of count in the myCount variable, and use the get and set method to hold the value, in which set is static type.

In the main class, the "Animal" class object is created, which calls the getMyCount method to print its value and use the class name to call the set method.    

Write a single statement that prints outsideTemperature with a or - sign. End with newline. Sample output with input 103.5: 103.500000

Answers

Answer:

Written in C Language

#include <stdio.h>

int main() {

   float temp;

   printf("Temperature: ");

   scanf("%f",&temp);

   temp-=(temp + temp);

   printf("%.6f", temp);

    return 0;

}

Explanation:

This line declares temp as float

   float temp;

This line prompts user for input

   printf("Temperature: ");

This line gets user input

   scanf("%f",&temp);

This line negates the user input

   temp-=(temp + temp);

This line prints out the required output with a - sign

   printf("%.6f", temp);

Give a recursive algorithm that takes as input two positive integers x and y and returns the product of x and y. The only arithmetic operations your algorithm can perform are addition or subtraction. Furthermore, your algorithm should have no loops.

Answers

Answer:

#include <stdio.h>

int product(int x,int y)

(

 if(y==1)

    return x;

 else

    return (x+product(x,y-1));

)

int main()

(

 int a,b;

 scanf("%d %d",&a,&b);

 printf("%d\n*,product(a,b));

return 0;

)

Explanation:

See above code as explanatory enough.

How do I find questions to answer?

Answers

Answer:

you go to the left side

Explanation:

yea

By looking at the IP packets in your trace, answer these questions: 1. What are the IP addresses of your computer and the remote server

Answers

Hii, you've asked an incomplete question. However, inferred you may want to know about IP addresses and remote servers.

Explanation:

The IP (Internet Protocol) address in simple words refers to a unique set of numbers assigned to each connected device in a computer network (or internet network) using the Internet Protocol to send and receive information.

The remote server refers to a server (a computer providing data to other computers) that is found in another location different from the location of the user accessing them.

uppose that a datagram of 2,700 bytes (20 bytes of IP header plus 2,680 bytes of IP payload) arrives at a router and must be forwarded to a link with an MTU of 900 bytes. Also suppose that the original datagram is stamped with an identification number of 15. How many IP fragments will be created by the router to forward this packet

Answers

Answer:

Four (4) IP fragments will be created by the router to forward this packet.

Explanation:

Datagram = 2700 bytes

IP Header = 20 bytes

Maximum Transmission Unit = 900 bytes

Original datagram is stamped with an identification number of 15

Required number of fragments = [tex]\frac{Datagram - IP header}{MTU - IP header}[/tex]

⇒  [tex]\frac{2700 - 20}{900 - 20}[/tex]

⇒  2680 / 880 = 3.045

ceiling(3.045) = 4

The best way to make sure text stand out in eNotes would be to
A. resize it.
B. printit it
C. bold it
D. strike-through​

Answers

The answer is C.Bold it

Answer: (D) bold it.

Explanation:

Write a Java method to find the smallest number among six numbers.

Answers

Answer:

1. import java.util.*;

2. public class SmallestInArrayExample1{

3. public static int getSmallest(int[] a, int total){

4. Arrays.sort(a);

5. return a[0];

6. }

7. public static void main(String args[]){

8. int a[]={1,2,5,6,3,2};

Explanation:

Here is some coding information.

import java.util.Arrays;

public class SmallestIntArray{

   public static int getSmallest(int[] a){

       Arrays.sort(a);

       return a[0];

   }

   public static void main(String []args){

       int a[] = {1,2,3,4,5,0,1};

       System.out.println(getSmallest(a));

   }

}

The method getSmallest takes one arguement, an array of integers. The integers are then sorted in ascending order (smallest number first) then we return the first integer in the array.

import java.util.Arrays;

public class SmallestIntArray{

   public static int getSmallest(int a, int b, int c, int d, int e, int f){

       int ar[] = {a, b, c, d, e, f};

       Arrays.sort(ar);

       return ar[0];

   }

   public static void main(String []args){

       System.out.println(getSmallest(1,2,3,4,5,0));

   }

}

The method getSmallest takes 6 integers as arguements and then puts them into an array. We then sort that array in ascending order and we get the smallest number by returning the first integer in the array.

What is the best way to create a pseudocode plan within your program?

Use a flowchart in a file.

Use comments in IDLE.

Use comments in a file.

Use a flowchart in IDLE.

Answers

The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

What is a pseudocode?

Programmers can be set up or design their coding logic using pseudocode to organize and outline it. Learning about pseudocode can aid your development process if you create software.

The term pseudocode is one that often go through some of its fundamental building blocks.

Note that in IDLE or a file, you cannot be able to add flowchart shapes. In IDLE, you could build a pseudocode plan with comments, but you couldn't go back and add lines of code where they were missing.

Therefore, Making a file enables you to plan out your pseudocode using comments, and then fill it in with the actual code.

Hence, The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

Learn more about pseudocode plan from

https://brainly.com/question/27646993
#SPJ1

Answer:

Comments in a file

Explanation:

Give two example computer applications for which connection-oriented service is appropriate. Now give two examples for which connectionless service is best.

Answers

Answer:

File transfer, remote login, and video on demand need connection-oriented service.

Explanation:

I HOPE THIS HELPS

A connection-oriented service is a data transfer mechanism used at the session layer. Connectionless service is an in-data communication that is used to convey data at the OSI model's transport layer.

What is a connection-oriented service?

A connection-oriented service is a data transfer mechanism used at the session layer. Unlike its opposite, connectionless service, connection-oriented service necessitates the establishment of a session connection between the sender and recipient, similar to a phone conversation. Although not all connection-oriented protocols are considered reliable, this method is generally thought to be more reliable than a connectionless service.

What is a connection-less service?

Connectionless service is a notion in data communications that is used to convey data at the OSI model's transport layer (layer 4). It refers to data transmission between two nodes or terminals in which data is transferred from one node to the other without first confirming that the destination is accessible and ready to accept the data. There is no need for a session connection between the sender and the receiver; the sender just begins delivering data.

Telnet, rlogin, and FTP are examples of services that leverage connection-oriented transport services. And Connectionless services include User Datagram Protocol (UDP), Internet Protocol (IP), and Internet Control Message Protocol (ICMP).

Learn more about Connection-Oriented Services:

https://brainly.com/question/13151080

#SPJ2

According to Jonathan Zittrain, technology that cannot be modified by the user who wishes to create new uses for it is:_______

a. Sterile
b. Open
c. Generative
d. Clean

Answers

Answer:

a. Sterile

Explanation:

From a lecture that was given by jonathan zittrain, he described a sterile technology as a type of technology that will not develop. And going further he says that a y third party cannot do any sort of coding for such a technology. It works the same way always. He described it in these words 'what you see is what you get'.

__________ is a tool for building a new list from another list by applying an expression to each item in a sequence. Group of answer choices arrays nested lists list comprehension []

Answers

Answer:

Nested lists __________ is a tool for building a new list from another list by applying an expression to each item in a sequence.

Explanation:

The nested list can contain any sort object, even another list (sublist), which in turn can contain sublists themselves, and so on.  Nested lists can be used to arrange data in hierarchical structures.  Some nested lists are unordered lists, some are ordered lists, and others are description lists.  The most important observation of a nested list is that it usually appears as an element on another list.

Suppose you start with an empty queue and perform the following operations: enqueue 1, enqueue 2, dequeue, enqueue 3, enqueue 4, dequeue, enqueue 5. What are the resultant contents of the queue, from front to back?
a. 1, 2, 3, 4, 5
b. 1, 3, 5
c. 1, 2, 3
d. 3, 4, 5

Answers

Answer:

The correct answer is   d) 3 4 5

Explanation is given below  

Explanation:

A queue is FIFO data structure which means first in first out so when you perform operation enqueue 1, enqueue 2 it will add  1, 2 to queue when you perform dequeue it will remove front element which is 1 further when you perform enqueue 3 and enqueue 4 it will add 3 and 4 to queue and when you perform dequeue it will remove front element which is now 2 as 1 is already removed after that when you perform enqueue 5 it will add 5 to queue so now the queue is like 3 4 5.

The _________ contains logic for performing a communication function between the peripheral and the bus.

Answers

Answer:

I/O module

Explanation:

The I/o module is known as the input/output module. Such a module is usually connected to system on one end and and in the other end, one or more input/output devices are connected. Such a technique helps to exchange data between the processor and also the input /output device. It helps in information transfer between the internal storage and also the external storage.

__________consist of two or more computer-controlled machines or robots linked by automated handling devices such as transfer machines, conveyors, and transport systems.

Answers

Answer:

Flexible manufacturing systems

Explanation:

Flexible manufacturing systems which can be written in short form as (FMS) is the combination of more two or more machines which are controlled by computer.

The overall performance of the system is directed by computers thereby directing each work to the appropriate route where the needed activity will be carried out.

Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 the output is: 8 3 Your program must define and call a function. SwapValues returns the two values in swapped order. void SwapValues(int

Answers

Answer:

Written in C++

#include <iostream>

using namespace std;

void SwapValues(int num1, int num2) {

   int temp = num1;

   num1= num2;

   num2 = temp;

   cout<<num1<<" "<<num2;

}

int main() {

   int num1, num2;

   cout<<"Enter two integers: ";

   cin>>num1;

   cin>>num2;

SwapValues(num1,num2);

   return 0;

}

Explanation:

I've added the full program as an attachment where I used comments as explanation

Match the correct term from the list below with the correct statement.

Answers

Answer:

self-serving bias

feedback

self-fulfilling prophecy

communication

context

Why are computers popular in education these days?

Answers

Answer:

They have unlimited information

Explanation:

Answer:

computers are popular in education these days because students of this generation prefer to learn from mobiles and computers. They can gain lots of extra knowledge than from their book from computers and internet. If they get confused in some problems, they can just search it in Google and get the answer.

Question #6
Multiple Choice
What will you see after on the next line?
>>> int("3.9")

O 4
O an error statement
O 3
O 3.9

Answers

Answer:

an error statement

Explanation:

just took it. have a good one!

You will see after on the next line is an error statement. The correct option is second one.

What is on error statement?

"On error statement" enables an error-handling and specifies the location of the error within a procedure. The On Error statement is used in unstructured error handling and can be used instead of structured exception handling. S

An error statement is occurred after the code entered as >>> int("3.9")

Thus, the correct option is second one.

Learn more about  on error statement.

https://brainly.com/question/13735734

#SPJ2

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

Answers

Complete Question:

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

In other words, your program will keep asking for a new number until the number that the user inputs is within the range of the <firstParameter> and <secondParameter>.

The method should present a message asking for the value within the range as:

Please enter a number within the range of (<firstParameter> and <secondParameter>):

Note that <firstParameter> should be changed by the value received as that parameter and <secondParameter> as well.

If the user inputs a value that it is lower than the first value, the program will show the message:

The input number is lower than <firstParameter>

Note that <firstParameter> should be changed by the value received as that parameter

If the user inputs a value that it is greater than the first value, the program will show the message:

The input number is greater than <secondParameter>

Note that <secondParameter> should be changed by the value received as that parameter.

You do not need to modify anything in the main method, you just need to write the missing parts of your new getIntVal method.

Answer:

#include<iostream>

using namespace std;

void getIntVal(int num1, int num2) {

int num;

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

while(num<num1 || num>num2) {

if(num<num1) {

cout<<"The input number is lower than "<<num1<<endl;

}

if(num>num2) {

cout<<"The input number is greater than "<<num2<<endl;

}

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

}

cout<<"Output: "<<num;

}

int main() {

int num1,num2;

cout<<"Enter lower bound: ";

cin>>num1;

cout<<"Enter upper bound: ";

cin>>num2;

getIntVal(num1, num2);

return 0;

}

Explanation:

Programming Language is not stated, So, I answered using C++

I've added the full source code as an attachment where I use comments to explain difficult lines

True/False: When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Answers

Answer:

True.

Explanation:

In object-oriented programming language, a process known as encapsulation is used for the restrictions of the internal data of a software program from the outside code, therefore preventing an unauthorized direct access to the codes. This is achieved through the use of classes.

When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay

Answers

Answer:

1.111 second

Explanation:

We know propagation speed =  [tex]$2 \times 10^8$[/tex] m/s

                                                 =  [tex]$2 \times 10^5$[/tex] km/s

One packet size = 1000 bit

Distance between sender and the receiver = 1000 m = 1 km

The channel data rate = 1 Mbps =   [tex]$1 \times 10^6$[/tex] bits per sec

There is no transmission delays of ACKs,

The time to transmit one data packet  = [tex]$T_{trans}+2T_{prop}$[/tex]

Here, time to transmit frame = [tex]$T_{trans}$[/tex]

          propagation time = [tex]$T_{prop}$[/tex]

Therefore, [tex]$T_{trans}$[/tex] = [tex]$\frac{bits\ per\ frame}{transmission \ speed}$[/tex]

                            = [tex]$\frac{1000}{1 \times 10^6}$[/tex]      = 0.001 seconds

[tex]$T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$[/tex]

         = [tex]$\frac{1}{2 \times 10^5}$[/tex]            

         = 0.000005 seconds

Therefore, T = 0.001 +2(0.000005)

                     = 0.00101 seconds

We known, 1.1 million bits= 1100 packets

Therefore to transmit 1 million bits = 1100 x 0.00101

                                                         =  1.111 second

What do type in?
What are the HR tags
What are the h3 headings

Answers

Answer:

HR tags are horizontal breaks in a document.

Your code should look like this:

<html>

<head>

</head>

<body>

<h1>

first heading

</h1>

<h3>

other headings

</h3>

</body>

</html>

<style>

body {

   background-color: #505693;

   color: #FFFFFF;

}

hr {

   background-color: #6A5ACD;

}

</style>

How do you win a game of amoung us

Answers

Answer: As the Crewmates move around the map in Among Us to complete tasks, Impostors try to sabotage and kill them off anonymously. If the latter successfully kills off all the Crewmates without being noticed, then he/she wins the game.

Explanation: Have a blessed day!

Answer: Just go around vent, in secret and press emergency meeting ONE TIME. then say someone vented,  and say they vented but really it was you

Explanation:

:)

Other Questions
Entre Ana y Sergio tienen $500, pero Sergio tiene el doble de dlares que Ana. Cunto tiene cada uno? Halle la solucin por el Mtodo Grfico Ana : x ; Sergio :y { + = = { + = + = A __________ is a natural or human-made body of water surrounded by land. A: Dune B: Glacier C: Hill D: LakePlS aNsWeRrRr Would you prefer to write for television, film, or theater? Explain your answer. A man walks at the rate of 88 paces to the minute .if the average length of his pace is 0.875 m, find the time he takes to walk 2.31km Regular tickets to a concert cost $34.50, and VIP tickets cost $78.50. A total of 810 tickets were sold, and total ticket sales were $29,045. The equation 34.50r+78.50(810r)=29,045 can be used to determine the number of regular tickets r sold to the concert. How many of each type of ticket were sold? how does proctor explain his silence In this excerpt from Susan Glaspell's Trifles, why does Mrs. Hale advise Mrs. Peters to lie to Mrs. Wright about the broken bottles? EXCERPT:MRS HALE: (not as if answering that) I wish you'd seen Minnie Foster when she wore a white dress with blue ribbons and stood up there in the choir and sang. (a look around the room) Oh, I wish I'd come over here once in a while! That was a crime! That was a crime! Who's going to punish that?MRS PETERS: (looking upstairs) We mustn'ttake on.MRS HALE: I might have known she needed help! I know how things can befor women. I tell you, it's queer, Mrs Peters. We live close together and we live far apart. We all go through the same thingsit's all just a different kind of the same thing, (brushes her eyes, noticing the bottle of fruit, reaches out for it) If I was you, I wouldn't tell her her fruit was gone. Tell her it ain't. Tell her it's all right. Take this in to prove it to her. Sheshe may never know whether it was broke or not.SELECT ALL CORRECT ANSWERSMrs. Hale feels sympathetic toward Mrs. Wright.Mrs. Hale is responsible for breaking the bottles.Mrs. Hale doesnt want to cause Mrs. Wright any more grief.Mrs. Hale feels jealous of Mrs. Wright's tasty fruit preserves.Mrs. Hale doesnt want to clean up the broken bottles of preserves. 1.)Name at least five things that are easier to do with fast internet access.2.)If you had online homework, but did not have a computer, how would you go about completing this homework?3.)If you needed a job and wanted to find places that were hiring, how could you do that without fast internet access?4.)What do you think could be done to close the digital divide gap?Can anyone help me please hurry A gas is at 45L at 227K. What volume would the gas be at 311K? State one way the term propaganda would be used Which best describes the irony in the excerpt? The heat of the day is indicative of Mr. Shiftlet's negative feelings of his life and situation. Mr. Shiftlet would have preferred to travel with his new wife, Lucynell, but she has left him at the diner. The young boy rejected Mr. Shiftlet's offer to give him a ride, and now the man finds himself alone. Mr. Shiftlet has the car he wanted and managed to rid himself of his wife, but he still is not happy. Which type of sentence is this?Leonardo da Vinci, who was a renowned painter and sculptor, was also an inventor and scientist.simplecompoundcomplexcompound-complex We are studying Mole and Molar Mass of Elements and Compounds and i need help please thank you!!! 3x+y = 6 what is the slope and y-intercept Katie has red hair, green eyes, and freckles just like her mother. Her father has brown hair, brown eyes, and no freckles. Why does Katie look more like her mother than she does then her father?A. Because Katies father is older than her mother.B. Because Katies father doesnt have any freckles.C. Because Katies inherited more traits from her mother than her father.D. Because daughters always resemble their mothers more than their fathers. what is 78 divided by 37 for my little brother. BRIANLY AND POINTS TO BEST FASTER ANSWER5. Compare and contrast the results of question 19 and question 20.19. What occurs when the hydrogen ion concentration is greater than the hydroxide ionconcentration?20. What occurs when the hydroxide ion concentration is greater than the hydrogen ionconcentration? PART A: How does paragraph 22 contribute to thedevelopment of the story's plot?O A It shows how weak the Republican sniper is.OB It shows how quickly emotions can shift inbattle.OC It shows how the Republican sniper doesn'tsupport the war.OD It shows how dangerous it is to be a sniper. You have been put in charge of setting up the executive branch for the 51st state in the union. Describe how you would set up the executive offices to be consistent with the other 50 states. The "lock and key hypothesis" attempts to explain the mechanism of Vacuole formationSharing of electronsPinocytosisEnzyme specificity