When a client computer knows the IP address of another computer and requires its hostname, it can be found in the DNS server's __________ PTR (pointer) resource record

a. PTR
b. A
c. Cname
d. NS


A. The PTR record contains the resolution of IP address to hostname.

Computer Science & Information Technology

You might also like to view...

To change a numbered or bulleted list style, _____, then right-click the list to display the shortcut menu. Point to Bullets or Numbering, then select a format.

A. select the list B. double-click the first item in the list C. point to any item in the list D. double-click the last item in the list

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The legal and ethical aspects of computer security encompass a broad range of topics. 2. Computer attacks are considered crimes but do not carry criminal sanctions. 3. “Computers as targets” is a form of crime that involves an attack on data integrity, system integrity, data confidentiality, privacy, or availability. 4. The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations. 5. No cybercriminal databases exist that can point investigators to likely suspects.

Computer Science & Information Technology

Match the following terms to their meanings:

I. Alternative text II. captions III. cropping IV. Custom path V. motion path A. Text boxes added to pictures to clarify the purpose B. Removes unwanted areas from an image C. Appears if a graphic does not display correctly D. Animation effect that moves an object along a line or curve E. A freeform path drawn on a slide

Computer Science & Information Technology

A format that changes the appearance of a cell based on a condition.

What will be an ideal response?

Computer Science & Information Technology