1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
5

What task did the u.s. government undertake that many people identify as the birth of the internet

Computers and Technology
2 answers:
blsea [12.9K]3 years ago
8 0
The answer is a. the government developed a computer system to be used in military communications. It started in the 1960s and was developed and used to serve as communication without experiencing disturbances from bombs and gain security for military purposes. This was the time when ARPANET (Advanced Research Projects Agency Network) came into the picture. Soon it was opened to people starting from the 70s when emails were used and became more popular. It then paved for further development and largely contributed to technology and communication.
natta225 [31]3 years ago
4 0
Option "a" is the answer. The US government developed a computer system to be used in military operations. They did so by awarding contracts to different science laboratories in 1960. One of the projects they funded was ARPANET, the first internet protocol.  
You might be interested in
Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
Ray Of Light [21]

Answer: (B) Legal hold

Explanation:

As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.

The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.

The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.

 

3 0
3 years ago
Assuming that a user enters 15 as input, what is the output of the following code snippet? Scanner in = new Scanner(System.in);
snow_tiger [21]

Answer:

The output of the following code is "The number is SMALL!"

Explanation:

When the following java code is executed. Firstly the program will ask for "Please enter a number" after input the number 15 as per the question, than it check the condition which is "number > 20", if the number is greater than 20 it shows "The number is LARGE!", but the given number is smaller than 20.

3 0
3 years ago
Assume that the final grade for a course is determined based on this scale - A: 900 points, B: 800-899 points, C: 700-799 points
saul85 [17]

Answer:

In Python:

def get_letter_grade(points):

   if points>=900:

       grade ="A"

   elif points>=800 and points < 900:

       grade ="B"

   elif points>=700 and points < 800:

       grade ="C"

   elif points>=600 and points < 700:

       grade ="D"

   else:

       grade = "F"

   return grade

Explanation:

This defines the function

def get_letter_grade(points):

The following if-else if conditions check the score to determine the appropriate grade

<em>    if points>=900:</em>

<em>        grade ="A"</em>

<em>    elif points>=800 and points < 900:</em>

<em>        grade ="B"</em>

<em>    elif points>=700 and points < 800:</em>

<em>        grade ="C"</em>

<em>    elif points>=600 and points < 700:</em>

<em>        grade ="D"</em>

<em>    else:</em>

<em>        grade = "F"</em>

This returns the grade

   return grade

5 0
2 years ago
Is a three-prong grounding plug with the third pong broken-off safe to use.
ad-work [718]
What is the answer choices dude
8 0
3 years ago
How do you draw first angle of orthographic projection ​
attashe74 [19]
Https://technologystudent.com/designpro/ortho1.htm
5 0
2 years ago
Other questions:
  • How useful is the creation of folders for your computer
    9·1 answer
  • Yet another variation: A better packet switched network employs the concept of acknowledgment. When the end user’s device receiv
    11·1 answer
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • In the ______ stage of the systems development life cycle, the design specifications are translated into computer code.
    11·1 answer
  • How many possible keys does the playfair cipher have? an approximate power of 2
    14·1 answer
  • Amazon.com uses a customer profiling system whenever a customer visits its website. using this system, amazon can offer products
    6·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    14·2 answers
  • A_______VPN connection is a private network that uses a public
    12·1 answer
  • What does syntax error mean :-;<br>explain briefly.<br><br>thankyou!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!