What is domain explain, Computer Engineering

Assignment Help:

Q. What is Domain explain?

Domain can be an apartment complex, a town or even a country. Sub-domains can correspond to organizations like expertsmind. United States comes under a large domain. "US". Computers known as name servers contain database of Internets host addresses. They translate word addresses or persons understandable into numeric equivalents. Let's see another instance of Internet address:

https://www.expertsmind.com

What does it all mean? Actually to ISP server, very little. Server wants to see something quite different. It wants to see a 32-bit number as an Internet address. Something like this equivalent decimal grouping:

198.168.45.249

Internet addresses, known as universal resources locators (URL), are translated from one form to other using an address resolution protocol. First address is in the form we are most used to and that user use to access an Internet site. In this illustration, address is for a website, identified by hypertext transfer protocol (http) that controls access to web pages. Following http is a delimiter sequence, ://, and identification for world wide web (www).

Domain name, expertsmind.ac follows www and identifies general site for web.(dot) edu is one instance of a domain top, which is a broad classification of web users. Other common domain tops are:

.com for commerce and businesses

 .gov for government agencies

 .mil for military sites

 .org for all kinds of organizations.

Finally, in this illustration is a country code, again preceded by a dot. Here we are using us for United States, which is default country.

Addresses can be followed by subdomains separated by slashes (/) or dots as needed. These addresses are translated into a 32-bit (4 decimal numeric groups) address demonstrated for https:// www.expertsmind.us.


Related Discussions:- What is domain explain

What is the best way offload responsibility, What is the best way offload r...

What is the best way offload responsibility? The best way to offload responsibilities is to purchase services through a Service Provider. ISPs, customers and Service Provide

Explain traditional computer clusters, Q. Explain traditional computer clus...

Q. Explain traditional computer clusters? Grid computing employs resources of a lot of separate computers linked by a network (generally internet) to resolve large-scale comput

What is a accepting computation history, What is a accepting computation hi...

What is a accepting computation history?  An accepting computation history is explained as , Let M be a Turing machine and w be a input string,  for M on w is a sequence of con

Difference between the specparam and parameter constructs, What is the diff...

What is the difference between the specparam and parameter constructs? Specparam is a special kind of parameter which is intended to specify only timing and the delay values. K

Find the generating function, Find the generating function to denote the nu...

Find the generating function to denote the number of ways the sum 9 can be acquired while 2 distinguishable fair dice are tossed and the first shows an even number and the second s

Bell lapadula model, A computer system provides protection using the Bell-L...

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if A) the virus were placed on the system at system low (the compartment that all o

Importance of artificial intelligence, Businesses are interested in AI bec...

Businesses are interested in AI because of the characteristics it offers that no other systems type offers. That is AI ability to: a. Preserve Intelligence and Knowledge: C

What are the address-sequencing capabilities, What are the address-sequenci...

What are the address-sequencing capabilities required in a control memory? i. Incrementing the control address register ii. Unconditional branch as specified by address fiel

What qualifications needs to be an security professionals, Qualifications o...

Qualifications of security professionals For the security professionals, it is essential that they have adequate freedom to check the security measures and enforce them and

Delete the leaves of a binary tree, Write a recursive algorithm to delete t...

Write a recursive algorithm to delete the leaves of a binary tree. Programming Requirements You must use the binary search tree code provided.  Each algorithm must be impleme

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd