1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lesechka [4]
4 years ago
11

How do the World Wide Web and the Internet work together?

Computers and Technology
1 answer:
Firlakuza [10]4 years ago
5 0

Answer:

Explanation:

The relationship between the World Wide Web and the Internet is that the Internet is a collection of connected computers through gateways by which the information that is stored in databases and on servers is transferred from one computer to another and the World Wide Web is the software that is used to retrieve the information requested by the users.  The World Wide Web (which we call the Web because we’re lazy typists) lives “on top of” the Internet. The Internet’s network is at the core of the Web, and the Web is like an attractive parasite that requires the Net for survival (dummies.com, 2010).  The Web page that are accessible on the web usually contain hypertext links and are sometimes called links. These links connect to other pages that are store on the same or even a different server; these servers can be in any location throughout the World.  This system of interlinked documents is known as hypertext (Dummies.com, 2010).

Links can create connections that let you go directly to related information. These invisible connections between pages are like the threads of a spider web — as you click from Web page to Web page, you can envision the Web created by the links. What’s so remarkable about the Web is that it connects pieces of information from all around the planet, on different computers and in different databases (Dummies.com, 2010).  Every Web page has a name attached to it so that browsers, and you, can find it. The name of this naming convention: URL, or Uniform Resource Locator. Every Web page has a URL, a series of characters that begins with http://. (Pronounce each letter, “U-R-L” — no one says “earl.”), (Dummies.com, 2010).  The Internet is a world wide network of computers that are connected (networked) and are using the communication method called TCP/IP. The Internet was named ARPANET in 1969 by the Advanced Research Projects Agency of the U.S. Department of Defence with just four computers connected together (Comentum.com, 2010).  The Internet, sometimes called simply “the Net,” is a worldwide system of computer networks – a network of networks in which users at any one computer can, if they have permission, get information from any other computer (SearchWinDevelopment.com, 2010).  Computers are connected to the Internet via modems and gateways. Some computers are used as servers which are continuously connected to the Internet and used to store web pages; these computers are usually referred to as servers. A house hold computer is primarily used by ordinary people to search for information on the web is usually known as a client. The request for information or search result is passed by the browser on the client to the server that contains the pages which have the relevant information in them via the net. The request passes through the modem then along the net to the correct server, the server then serves up the correct page, which is then sent back to client computer and presented to the user through the browser.

You might be interested in
When working with a spreadsheet, data analysts can use the _____ function to locate specific characters in a string.
jonny [76]

When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.

<h3>What is the CLEAN Function? </h3>

The CLEAN Function is known to be a tool that is often categorized in the Excel Text functions.

Note that this function tends to delete or remove any kind of non-printable characters from any specified or given text.

Note that As financial analysts, people tend to often import data from a lot of sources and the CLEAN function can help to delete nonprintable characters.

Hence, When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.

Learn more about spreadsheet from

brainly.com/question/4965119

#SPJ1

6 0
2 years ago
Which resources could be used a lot when installing a desktop app for synchronization purposes? Choose two answers.
Sergeu [11.5K]

Answer:

While installing desktop sync app such as drop box following two resources will be used a lot

  1. CPU
  2. RAM

Explanation:

CPU usage has been increased while installing desktop sync application, because it depends on the number of files that need to be synced. If the number of files is high the CPU usage will increase.

The need of memory such as RAM is also increased while installing the desktop sync application. As the number of files that need to be synced increases the RAM usage is also increases.

4 0
3 years ago
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
Anastaziya [24]

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

5 0
3 years ago
What is the protocol? What does it do? What layer of the OSI Model does it support?
melomori [17]

Answer:

Protocol: It is a set of rules that govern communication over electronic devices. It is bridge between two devices to communicate with each other. All layers of  OSI model support some protocol features of communication between devices over internet.

Explanation:

What is the Protocol

A protocol is a set of rules that govern communication over electronic devices that how to communicate with each other. These sets of rules include how to send data, what type of data may be transmitted, and how to receive the data and how to confirm that, data has been transmitted successfully.

You can think about protocol as a spoken language between two people. Therefore, people can understand their language easily if both know its rules and vocabulary. That means, if both people can speak with each other in the same language then they can communicate effectively with each other.

Similarly, if two devices support the same protocol, regardless of the type of device or manufacturers, they can communicate with each other effectively. For example, an android device can send email to an iPhone device using a standard mail protocol.

Today different Protocols exist for several different applications. For example wired networking (e.g. Ethernet), wireless networking (e.g. 802.11ac) and internet communication (e.g. IP).

The Internet protocol contains dozens of protocol which is used for transmitting data over the Internet. The protocol may be broken into four categories.

1. Link layer

2. Internet layer

3. Transport layer

4. Application layer

<u>OSI Model and Its Layers</u>

The Open System Interconnection (OSI) model is a conceptual model that is created by the International Organization for Standardization (ISO) which uses a standard protocol to enable communication between devices. In short, the OSI model provides a standard of communication between different computer systems. It has 7 layers, each layer has its own functionality as described below:

  1. Physical layer: Transmits raw bitstream over the physical medium
  2. Data link layer: Define the format of data on the network
  3. Network layer: Decide which physical path the data will take
  4. Transport layer: Transmit data using transmission protocols including UDP and TCP
  5. Session layer: Maintains connections and is responsible for controlling sessions and ports
  6. Presentation layer: Ensure that data is in a usable format and is where data encryption occur
  7. Application layer: Human-computer-interaction layer, where the application can access the network services

<u></u>

3 0
3 years ago
In the context of a global information system (gis), _____ offer electronic data interchange standards, encryption, secure e-mai
11Alexandr11 [23.1K]
Answer is (B) Value-added networks.

A van is a private network provider hired among online companies that facilitate EDI (Electronic Data Interchange) or other network services such as message encryption, securing mail, and management reporting. A Value Added Network provides an easy way for ecommerce businesses to share data and communicate securely.






8 0
4 years ago
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • The rectangular marquee tool can select an area to be used as a pattern?<br> True<br> False
    5·1 answer
  • You are required to design a 4-bit even up-counter using D flip flop by converting combinational circuit to sequential circuit.
    15·1 answer
  • How do buffers work?
    14·1 answer
  • Show that, if n is an integer and n^3 + 5 is odd, then n is even, using:
    12·1 answer
  • someone who wants the credentials of skilled training, but in less time that a four -year degree should consider
    8·1 answer
  • Antwon is building his technical writing portfolio.He created the following checklist: •check whether any part of the portfolio
    11·1 answer
  • Write a program that accepts a whole number as
    5·1 answer
  • Given a MxN matrix.Print the elements in odd rows from left to right and the elements in even rows from right to left.(Java or C
    11·1 answer
  • Who is the owner of apple company??​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!