1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
4 years ago
5

Which network could NOT carry commercial traffic?

Computers and Technology
1 answer:
nalin [4]4 years ago
8 0

Answer:

ARPANET

Explanation:

ARPANET was created in 1969 to connect scientific and research users across multiple institutions for collaboration. It was not intended to carry commercial traffic. However as the network evolved it metamorphosed into a massively large global network based on TCP/IP which we now know as the Internet or world wide web(WWW). The internet now carries all kinds of traffic including commercial traffic.

You might be interested in
Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in
lisabon 2012 [21]

Let us assume that Sam has an Active Directory Domain in his SOHO network.  He can use features that come with an AD domain to deploy software packages via Group Policy Objects. These features from Microsoft not only give us simple ways to deploy software, but also provide solutions to uninstall too. Another option to consider using is through 3rd party software solutions like PDQ Deploy. This tool will help deploy any Windows application to multiple PCs in the same workgroup.

4 0
4 years ago
You are about to repair and change the resistor (small components),but the components are too small to solder and hold,what tool
exis [7]

Answer:

Needle-nose pliers

Explanation:

Required

Tool used to hold small components

The device to do this is the needle nose pliers.

This device has several functions, but it is specifically designed to hold small components in the computer when the computer is being repaired.

Among the other functions are:

  • Picking small and tiny screws
  • Cutting of wires
  • Hold wires against the side of the computer case
8 0
3 years ago
50 points, and brainliest if u get it right!
marshall27 [118]

Answer:

they are games in which payoffs are initially negative for both players and progress

6 0
3 years ago
Tag groups can be nested up to ____ levels deep, with up to _______ tag subgroups under a single parent.
zepelin [54]
Is it a multiple choices problem
3 0
3 years ago
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
Other questions:
  • Which of the following would help a photographer keep from dropping a camera? - - Rain hood
    6·2 answers
  • Your friends’ preschool-age daughter Madison has recently learned to spell some simple words. To help encourage this, her parent
    8·1 answer
  • Hi hehehehehehehehehheeheh<br>​
    10·1 answer
  • 1st row has 3 possible answers software program, web page, and web browser
    8·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • We will cover email use and management. Training topics include:
    5·1 answer
  • Explain why an organization's firewall should block outgoing packets the source addresses of which are not in the organization's
    10·1 answer
  • The introduction of an academic paper must include a:
    12·2 answers
  • What function does a resource manager in an IDE perform?
    14·1 answer
  • PLEASE HELP
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!