wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

URL vs Domain

profile
Pauras Lade
Aug 29, 2022
0 Likes
0 Discussions
84 Reads

URL and Domain Name system:
URL stands for Uniform Resource Locator. The URL specifies the Internet address of the file stored on a host computer connected to the Internet. Every file on Internet, no matter what its access protocol, has a unique URL. Web browsers use the URL to retrieve the file from the host computer and the specific directory in which it resides. This file is downloaded to the user's computer and displayed on the monitor connected to the machine.
URL's are translated in to numeric addresses using the Domain Name System (DNS). The DNS is a worldwide system of servers that stores pointers to web sites. The numeric address, called the IP (Internet Protocol) address, is actually the "real" URL.
Since the numeric strings are difficult for humans to use, alphanumeric addresses are employed by end users. Once the translation is made by the DNS, the browser can contact the web server and ask for a specific file located on its site.


Comments ()


Sign in

Read Next

Mobile Survey

Blog banner

VIRTUAL MACHINE

Blog banner

Save Environment

Blog banner

Reconnaissance

Blog banner

INTERNET

Blog banner

Music is life

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

OS ASSIGNMENT

Blog banner

Importance of business process documentation

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

Multiprocessor and Multicore Organization

Blog banner

JIRA SOFTWARE

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Data Mining

Blog banner

Security Issues and Countermeasures

Blog banner

STARVATION

Blog banner

Chicken Dum Biryani

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Operating Systems

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

EMAIL INVESTIGATION

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Development Of Modern Operating System

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Lifestyle of a photographer

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Operating system

Blog banner

Cache memory

Blog banner

CyberSecurity Color Wheel

Blog banner

Outlook.com

Blog banner

Scheduling

Blog banner

Data Mining

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Vulnerability Assessment

Blog banner

SECURITY TOOLS

Blog banner

Deadlock

Blog banner

Why we fail after giving 100% ?

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner