wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

URL vs Domain

profile
Pauras Lade
Aug 29, 2022
0 Likes
0 Discussions
84 Reads

URL and Domain Name system:
URL stands for Uniform Resource Locator. The URL specifies the Internet address of the file stored on a host computer connected to the Internet. Every file on Internet, no matter what its access protocol, has a unique URL. Web browsers use the URL to retrieve the file from the host computer and the specific directory in which it resides. This file is downloaded to the user's computer and displayed on the monitor connected to the machine.
URL's are translated in to numeric addresses using the Domain Name System (DNS). The DNS is a worldwide system of servers that stores pointers to web sites. The numeric address, called the IP (Internet Protocol) address, is actually the "real" URL.
Since the numeric strings are difficult for humans to use, alphanumeric addresses are employed by end users. Once the translation is made by the DNS, the browser can contact the web server and ask for a specific file located on its site.


Comments ()


Sign in

Read Next

Advanced Persistent Threats (APTs)

Blog banner

MORDERN UNIX SYSTEM

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

OS Evolution Achievements

Blog banner

Texting is actually better than talking in person

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Deadlock and starvation in operating system

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

HubSpot

Blog banner

Operating system

Blog banner

Mumbaicha Dabbawalla

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Network Forensics Tools and Techniques

Blog banner

Explain Kernel in OS

Blog banner

TRAIN TRAVELING

Blog banner

Memory Management

Blog banner

Functions Of Operating Systems

Blog banner

Importance of Network Security Risk

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

BUFFER OVERFLOW_142

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Modern operating system

Blog banner

Some facts about Technology

Blog banner

Information Technology In E- Commerce

Blog banner

Paid Email

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

INTRANET

Blog banner

Consumer to consumer business mode

Blog banner

My First Dream Bike

Blog banner

Deadlock and Starvation

Blog banner

Virtual Machine

Blog banner

Child labour

Blog banner

Virtual memory

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

PYTHON

Blog banner

Concurrency and Deadlocks

Blog banner

Deadlock and starvation

Blog banner

Some web vulnerabilities

Blog banner

The most common internet security threats

Blog banner

Banaras

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner