What is domain explain, Computer Engineering

Assignment Help:

Q. What is Domain explain?

Domain can be an apartment complex, a town or even a country. Sub-domains can correspond to organizations like expertsmind. United States comes under a large domain. "US". Computers known as name servers contain database of Internets host addresses. They translate word addresses or persons understandable into numeric equivalents. Let's see another instance of Internet address:

https://www.expertsmind.com

What does it all mean? Actually to ISP server, very little. Server wants to see something quite different. It wants to see a 32-bit number as an Internet address. Something like this equivalent decimal grouping:

198.168.45.249

Internet addresses, known as universal resources locators (URL), are translated from one form to other using an address resolution protocol. First address is in the form we are most used to and that user use to access an Internet site. In this illustration, address is for a website, identified by hypertext transfer protocol (http) that controls access to web pages. Following http is a delimiter sequence, ://, and identification for world wide web (www).

Domain name, expertsmind.ac follows www and identifies general site for web.(dot) edu is one instance of a domain top, which is a broad classification of web users. Other common domain tops are:

.com for commerce and businesses

 .gov for government agencies

 .mil for military sites

 .org for all kinds of organizations.

Finally, in this illustration is a country code, again preceded by a dot. Here we are using us for United States, which is default country.

Addresses can be followed by subdomains separated by slashes (/) or dots as needed. These addresses are translated into a 32-bit (4 decimal numeric groups) address demonstrated for https:// www.expertsmind.us.


Related Discussions:- What is domain explain

Skip to line line number, The "SKIP TO LINE line number" is dependent on wh...

The "SKIP TO LINE line number" is dependent on which statement included in the report statement of the program. The "SKIP TO LINE line number" is dependent on "LINE-COUNT" stat

State the number of definitions of firewall, State the number of definition...

State the number of definitions of firewall Though there exist a number of definitions of firewall, in simplest terms it can be defined as "a mechanism used to protect a truste

Describe real and protected mode, Describe Real and protected mode: Op...

Describe Real and protected mode: Operation of Real mode interrupt:   When microprocessor completes executing the current instruction, it concludes whether an interrupt is act

Uniform memory access model (uma), Uniform Memory Access Model (UMA) In...

Uniform Memory Access Model (UMA) In this model, the main memory is uniformly shared by all processors in multiprocessor systems and each processor has equal access time to sha

Describe message passing model, Q. Describe Message Passing Model? In ...

Q. Describe Message Passing Model? In message-passing model there be a set of tasks which employ their own local memories at the time of computation. Many tasks may inhabit on

DFD, Define software architecture and describe which types of architectures...

Define software architecture and describe which types of architectures can be used in Email or Facebook applications

What is low-level formatting, What is low-level formatting?  Before a d...

What is low-level formatting?  Before a disk can store data, it must be divided into sectors that the disk controller can read and write. This process is known as low-level for

What is meant by hide area, What is meant by hide area? The hide comman...

What is meant by hide area? The hide command temporarily kept the contents of the field at the present line in a system-controlled memory called as the HIDE AREA.  At an intera

Micro-programmed control, Q. MICRO-PROGRAMMED CONTROL? A substitute to ...

Q. MICRO-PROGRAMMED CONTROL? A substitute to a hardwired control unit is a micro-programmed control unit in which logic of the control unit is specified by a micro-program. A m

Advantages and disadvantages of public-key cryptography, Advantages and Dis...

Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience  (ii) Electronic records may be authenticated by affixing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd