Query Controls Sample Clauses

Query Controls. Whois query controls fall into two categories: those that specify the type of field and those that modify the interpretation of the input or determine the type of output to provide. Object Type Control The following keywords restrict a search to a specific object type: DOmain: Search only domain objects. The input string is searched in the Name field. HOst: Search only name server objects. The input string is searched in the Name field and the IP Address field. Contact: Search only contact objects. The input string is searched in the ID field. Registrar: Search only registrar objects. The input string is searched in the Name field. By default, if no object type control is specified, then the Name field of the Domain object is searched. Interpretation Control The following keywords modify the interpretation of the input or determine the level of output to provide: ID: Search on ID field of an object. This applies to Contact IDs and Registrar IDs. Full or '=': Always show detailed results, even for multiple matches Summary or SUM: Always show summary results, even for single matches '%': Used as a suffix on the input, will produce all records that start with that input string '_': Used as a suffix on the input, will produce all records that start with that input string and have one and only one additional character By default, if no interpretation control keywords are used, the output will include full details if a single record is found and a summary if multiple matches are found.
AutoNDA by SimpleDocs
Query Controls. WHOIS query controls fall into two categories: those that specify the type of field and those that modify the interpretation of the input or determine the type of output to provide. Object Type Control The following keywords restrict a search to a specific object type: Domain: Search only domain objects. The input string is searched in the Name field. Search only nameserver objects. The Host: input string is searched in the Name field and the IP Address field. Contact: Search only contact objects. The input string is searched in the ID field. Registrar: Search only registrar objects. The input string is searched in the Name field. By default, if no object type control is specified, then the Name field of the Domain object is searched. Interpretation Control The following keywords modify the interpretation of the input or determine the level of output to provide: partial All records matching string are returned . Same as partial keyword full Displays entire detail associated with each returned record = Same as full keyword summary Displays summary $ Same as summary keyword help Displays help text ? Same as help keyword By default, if no interpretation control keywords are used, the output will include full details if a single record is found and a summary if multiple matches are found.
Query Controls. Whois query controls fall into two categories: those that specify the type of field and those that modify the interpretation of the input or determine the type of output to provide. Object Type Control The following keywords restrict a search to a specific object type: Domain: Search only domain objects. The input string is searched in the Name field. Host: Search only name server objects. The input string is searched in the Name field and the IP Address field. Contact: Search only contact objects. The input string is searched in the ID field. Registrar: Search only registrar objects. The input string is searched in the Name field. By default, if no object type control is specified, then the Name field of the Domain object is searched.
Query Controls. Whois query controls fall into two categories: those that specify the type of field and those that modify the interpretation of the input or determine the type of output to provide.

Related to Query Controls

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Administrative Controls The Contractor must have the following controls in place:

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Expansive Controls Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes will not be used to circumvent normal trunk servicing. Expansive controls will only be used when mutually agreed to by the Parties.

  • Financial Controls At all times, the Charter School shall maintain appropriate governance and managerial procedures and financial controls which procedures and controls shall include, but not be limited to: (1) commonly accepted accounting practices and the capacity to implement them (2) a checking account; (3) adequate payroll procedures; (4) procedures for the creation and review of monthly and quarterly financial reports, which procedures shall specifically identify the individual who will be responsible for preparing such financial reports in the following fiscal year; (5) internal control procedures for cash receipts, cash disbursements and purchases; and (6) maintenance of asset registers and financial procedures for grants in accordance with applicable state and federal law.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Restrictive Controls Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps set at appropriate levels on traffic toward each other's network, when required, to protect the public switched network from congestion due to facility failures, switch congestion, or failure or focused overload. CLEC and CenturyLink will immediately notify each other of any protective control action planned or executed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!