Skip to main content

Share: Domain Name

A domain name is a website URL, is the address, is your website name where Internet users can find and visit your website. Computers use IP addresses, which are a series of number. However, it is difficult for people to remember. Because of this, domain names were developed and used to identify entities on the Internet rather than using IP addresses.
 
A domain name can be any combination of letters and numbers, and it can be used in combination of the various extensions, such as .com, .net and more.
 
The domain name must be registered before you can use it. Every domain name is unique. If someone types in www.yourdomain.com, it will and only go to your website.
 
Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name.
 
"Domain names are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains: com, info, net, edu, and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users." - Wiki
 
The top-level domains (TLDs) such as com, net and org are the highest level. Top-level domains form the DNS root zone of the hierarchical Domain Name System. Every domain name ends with a top-level domain label. 
 
Below the top-level domains in the domain name hierarchy are the second-level domain (SLD) names. These are the names directly to the left of .com, .net, and the other top-level domains. As an example, in the domain sample.co.us, co is the second-level domain.
 
Next are third-level domains, which are written immediately to the left of a second-level domain. There can be fourth- and fifth-level domains, and so on, with virtually no limitation. Each label is separated by a full stop (dot).

Popular posts from this blog

Share: Artificial Intelligence, The Pros And Cons

Artificial Intelligence (A.I.) has become a major part of everyday life. From search engines and voice assistants to recommendation systems and smart tools, A.I. has changed how people learn, work, and communicate. While it brings many benefits, A.I. also has limitations and risks. Understanding both sides helps us use A.I. wisely and responsibly. Pros of A.I. 1. Increases Efficiency and Productivity A.I. can complete tasks faster than humans, especially repetitive or data-heavy work. Businesses use A.I. to automate routine processes, saving time and reducing mistakes. For students, A.I. tools can help summarise information, organise notes, or check grammar, making learning more efficient. 2. Enhances Learning and Creativity A.I. makes learning more personalised. Students can get instant explanations, examples, and feedback on almost any topic. Creative tools also allow people to design images, write stories, brainstorm ideas, and explore new possibilities that might be difficult to ac...

How-To: Google Authenticator: Guide to Setup, Backup, and Safe Usage

What is Google Authenticator? Google Authenticator is a free security app from Google that provides two-factor authentication (2FA) codes. Instead of just entering a password, you’ll also need to input a time-based code from the app. This extra step greatly reduces the risk of your account being hacked, even if someone knows your password. Unlike SMS codes, which can be intercepted, Google Authenticator works offline and generates unique codes every 30 seconds directly on your device. Why Use Google Authenticator? Stronger security: Protects against password leaks or phishing. Offline usage: Works without mobile data or Wi-Fi. Multi-account support: You can store codes for multiple accounts (Google, Facebook, Instagram, banking apps, etc.). Free and lightweight: No subscription fees, minimal storage needed. How to Set Up Google Authenticator Step 1: Install the App Download Google Authenticator from:  Google Play Store (Android) Apple App Store (iOS) Step 2: Enable 2FA on Your Acco...

Share: A little bit about e-Invoicing (07/07/2025)

With Malaysia's push toward digital tax compliance, e-Invoicing will soon become mandatory for all businesses, big or small. Spearheaded by the Lembaga Hasil Dalam Negeri (LHDN), this new system aims to improve transparency, reduce fraud, and automate tax reporting. Whether you’re a corporation or a small business owner, understanding how e-Invoicing works is crucial. 🔍 What is E-Invoicing? E-Invoicing is the process of issuing and receiving invoices electronically, using a structured digital format (like JSON or XML) that allows for automatic validation and processing by the tax authority. Unlike PDF or paper invoices, e-Invoices are machine-readable, submitted in real time, and stored digitally with built-in authentication, including QR codes and digital signatures. Once submitted through LHDN’s MyInvois system, the invoice is validated and becomes an official legal document, complete with a timestamp and unique identifier. This system removes the need for paper documentation an...