1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
8

1. Why was the Internet created?

Computers and Technology
1 answer:
lana [24]3 years ago
3 0

Answer:

1. The internet is any set of computer network that communicates using standardized protocols.The Internet was first invented for military purposes, and then expanded to the purpose of communication among scientists

2.ARPANET was the network that became the basis for the Internet. Based on a concept first published in 1967, ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the interconnection of four university computers.

3.The first permanent ARPANET link was established on 21 November 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute.

4. Vinton Grey Cerf born june 23rd 1943 in New Haven Connecticut is considered to be the father of internet.

5.Mosaic is a converged platform, which offers data engineering, advanced analytics, knowledge-led automation, IoT connectivity and improved solution experience to its users. Mosaic enables organizations to undertake quantum leaps in business transformation, and brings an insights-driven approach to decision-making. It helps deliver pioneering Analytics solutions at the intersection of physical and digital worlds.

6. client/server network. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server

7.An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

8.A Vlog is is a video blog post. You can think of it as an online journal or diary, while A blog is purely text based.

9. The main difference between podcast and webcast is live streaming. Webcasting is essentially broadcasting over the Internet, using online streaming to deliver content. Podcasts are delivered via the Internet but are not streamed.

10.Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people. Email should be used because it safe and secure.

11. Some of the email etiquette are: Do have a clear subject line. Don't forget your signature.Do use a professional salutation. Don't use humor. Do proofread your message. Don't assume the recipient knows what you are talking about..Do reply to all emails.

12.Text messaging, or simply "texting," is a cellular phone service typically limited to 160 characters, whereas instant messaging isusually a computer session with a longermessage size. ... Both text messaging andinstant messaging are often called just plain "messaging."

13.Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimediasessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone servicespecifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN), also known as plain old telephone service (POTS).

14.Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.

15.The B2B, B2C,C2C are types of ecommerce business models.

The B2B business model is one which facilitates business transaction from one company to another example an engineering manufacturing company sells equipment to a construction company

B2C:It is a business model in which a retailer sells directly to a consumer

C2C: It is a business model in which a consumer sells to another consumer through a platform or in-person.

16. Social ecommerce and mcommerce have different meanings, though both aim at making customers' lives easier. Simply put,ecommerce is an umbrella term for selling and buying online, while mobile commerce, or mcommerce, is a subcategory of ecommerce that focus on purchasing viamobile devices.

You might be interested in
Create a recursive method, a method that calls itself, that returns the number of vowels that appear in any string given. Keep i
kvv77 [185]
<h2>Answer:</h2>

//Define the method as noOfVowels

   //Let it receive the string to be checked as argument

   public static int noOfVowels(String string){

   

       //Check the length of the string

       

       //If it is less than 1, then it is an empty string

       //Hence return 0

       if(string.length() < 1){    

           return 0;

       }

       

       //Else,

       else{

           //get the character at the first position in the string

           //and convert it to a lower case

           char x = string.toLowerCase().charAt(0);

           //Check if the character is a vowel

           if (x == 'a' || x == 'e' || x == 'i' || x == 'o' || x == 'u'){

               //if it is a vowel, add 1 to a recall of the method.

               //But this time, call the method with  

               //the string excluding the first character.

               //i.e the substring of the string starting at index 1 rather than 0

               return 1 + noOfVowels(string.substring(1));

           }

           

           else {

               //If it is not a vowel, just recall the method with

               //the string excluding the first character

               //i.e the substring of the string starting at index 1 rather than 0

               return noOfVowels(string.substring(1));

           }

       }

   }

   

<h2>Explanation:</h2><h2></h2>

The code has been written in Java and it contains comments explaining every part of the code. Please go through the comments carefully.

The actual lines of code have been written in bold face to distinguish them from comments.

The code is re-written without comments as follows;

   public static int noOfVowels(String string){

   

       if(string.length() < 1){    

           return 0;

       }

       

       else{

           char x = string.toLowerCase().charAt(0);

           if (x == 'a' || x == 'e' || x == 'i' || x == 'o' || x == 'u'){

               return 1 + noOfVowels(string.substring(1));

           }

           

           else{

               return noOfVowels(string.substring(1));

           }

       }

   }

   

3 0
3 years ago
Often, the symptoms of withdrawal are __________.
guapka [62]
I would say none of the above as A, B, and C do not seem like sensible answers.
3 0
3 years ago
r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions. Tru
Dvinal [7]

r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions.

The above statement is <u>True</u>.

What are R packages?

<u>The statistical programming language R has extensions </u>known as R packages. Users of R can install R packages by <u>accessing a centralized software repository like CRAN</u>, which often contains code, data, and documentation in a common collection format.

The "library" directory is <u>where R </u><u>packages </u><u>are kept in the R environment</u>. During installation, R automatically install a number of packages. Later, when additional packages are required for a particular task, they are added.

To learn more about R packages, use the link given
brainly.com/question/26125959
#SPJ4

7 0
11 months ago
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
How does making a phone call differ when using: A public phone A cell phone
rosijanka [135]

Answer:

Differ in the quality of their transmission.

Explanation:

For example, when using the public phone box, wired transmission is done not wireless as in cell phones. Public phone box use electronic signals transmitted through a cable network to send voice data which are not very effective for long distance communication.

However, cell phones wirelessly send electromagnetic wave signal to a cell tower close to the caller and then the information is then transmitted to cell tower close to the receiver within a split of a second. This method of communication has much advantages.

7 0
3 years ago
Other questions:
  • Which activity cannot be done on a social networking site?
    12·1 answer
  • Does Windows 7 support secure boot in UEFI? Windows eight? Linux UBUNTU version 14?
    8·1 answer
  • Having a conversation with someone using a cellular phone is an example of _________ transmission. simplex full-duplex half-dupl
    11·1 answer
  • If you were doing a regular expression inside a Linux command line, which special character on the keyboard would give you two p
    13·1 answer
  • What is the purpose of an internet protocol address (ip address)? it specifies whether a computer is using a broadband network o
    10·1 answer
  • Given the following while() loop, which statement is true assuming A,B,C,D are int variables and A &gt; B? while ( ( A &gt;= B)
    8·1 answer
  • What is the output of adding 1001011 and 100000?
    7·1 answer
  • A motorist is using the AHP to choose a new car from three possible models Arrow, a Bestmobile and a Commuter. The choice will a
    15·2 answers
  • Please explain this code line by line and how the values of each variable changes as you go down the code.
    8·1 answer
  • Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!