1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
15

The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles t

hat will allow computers to be able to better index Web sites, topics, and subjects.
Computers and Technology
1 answer:
shusha [124]3 years ago
4 0

Answer:

The answer is "Semantic".

Explanation:

It can be designed as an enhanced country-wide mobile version and represents a useful way to view the information as a globally connected database.

  • It is the network of information, that can be linked and processed effectively by machines instead of by human workers.
  • It is one of the creation of the Web, which is originally imagined a series of concepts, that allowed machines to better index websites, issues, and subjects.
You might be interested in
Richman Investments is an investment and consulting firm. Richman wants to expand its business operations both in the U.S. and i
Alika [10]

Answer:

All these can be done using PKI.

Explanation:

PKI or the private key infrastructure is a new way to encrypt the data transfer or the retrieval along with the network among various terminals. The communication can be single node, hierarchical, bridge, mesh and hybrid. In the case of mesh, the connection can be established between each terminal. However, the connection can be established in between each pair via a network which can be a private network or it can be via the internet. However, the channel is required to be encrypted, or else the data can be hacked and attacks like a man in the middle attacks are quite on cards certainly. And this can be done using the PKI, which can be installed using the Certificate Authority and Public-private key pair generator. Suppose a connection is to be established between each node. And for this, you need to generate the certificate, which is generated by the Certificate Authority. And this is generally a third party like Godaddy, Verisign, etc. You can make use of the CSFFL as well. The free certificate authority Let’s Encrypt makes use of the CSFFL. And you must be using a web server as well like Apache that comes with services like OpenSSL that can be used to generate the certificate, and you can have your root Certificate Authority. That issues the certificate to the issuing certificate authority and the issuing certificate authority after registration confirmation by a person or a Robot, issues the certificate to the node which is requesting access to another node. And this certificate has the personal details of the requesting node and information about the webserver or node to which the requesting node is opting for a secure connection. The Certificate, when received by the webserver, is then matched with the certificate copy kept at the Root Certificate Authority. These days we also have the certificate revocation authority and Google has come up with Certificate transparency. So we can build our certificate authority, or we can have online certificate authority. These certificates also have the digital signature, which can be decrypted via the private key that is kept with the sender. The public key is sent to the certificate authority, and it decrypts it with the public key. And certificates are distributed among various types of trusts, which can be single, hierarchical, bridge, mesh and hybrid.  And for each application, we have different certificates. Thus issues like non-repudiation, check over unauthorized access, restrict access to the resources, etc, can be ensured with the help of the PKI. And thus, we can secure the whole network at various levels like application level, transport-level, etc. Also, the company network can be bridged with the client or the business partner company if required using bridge level trust. However, we can also have a hierarchical level of trust. And thus we can secure the network using PKI and also confirm all the issues mentioned in the question are resolved. However, certificates are also being generated by Windows server 2012, and we can make use of it as well.

5 0
3 years ago
Host A sends two UDP segments to Server S, one to port 1234 and the other to port 2345. Host B sends one UDP segment to Server S
SOVA2 [1]

Answer:

A

Explanation:

8 0
2 years ago
In “Plugged In,” the author’s purpose is to persuade. Which of the following quotes from the text shows that the author’s purpos
lisabon 2012 [21]

The quote from the text that shows that the author’s purpose is to persuade is D. Critics say that kids stare at computers and TVs all day and do not get enough exercise. The facts stand in counterpoint to this belief.

An argumentative writing prompt is written in order to convince the readers about a particular issue.

According to the author, the fact that children are involved in watching movies, playing games, listening to music, etc doesn't mean that they can't still be productive.

There are some critics that believe that kids stare at computers and TVs all day and do not get enough exercise. This was countered by the author who stated that kids can still engage in exercises or do other productive things.

Read related link on:

brainly.com/question/24861556

3 0
2 years ago
Projects used for print and web have different ?
mr Goodwill [35]

Answer:

Sizes

Explanation:

6 0
3 years ago
3.5 lesson practice quiz Edhesive
erik [133]

Answer:

                                                                                     

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • PLS HURRY!! This OS introduced a very cool GUI that had animations and transparencies.
    5·1 answer
  • In which area of engineering does material selection play a vital role a design optimization b forensic engineering c mechanical
    6·1 answer
  • You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
    8·1 answer
  • Why is plastic durable?
    9·2 answers
  • Steps in the systems development life cycle​
    15·2 answers
  • Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • What is the Gain (dB) of a transmission if the Maximum Data Rate is 1 Gbps and the Bandwidth =7000 MHz? Group of answer choices
    6·1 answer
  • Please help
    11·1 answer
  • Write a method that returns a String that is just the first and last character of the given string Your return value should be o
    8·1 answer
  • What are the tools in creating an animation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!