1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
8

The World Wide Web (not the Internet) went live in this decade:

Computers and Technology
2 answers:
Oksi-84 [34.3K]3 years ago
7 0

Answer:

b

Explanation:

ElenaW [278]3 years ago
4 0

Answer:

d. 1990s

Explanation:

The <em>World Wide Web</em> is a kind of friendly information system that uses hypertext, and since its creation has made Internet available for most people.

The<em> Internet</em> already existed quite before the World Wide Web: the first computer network was ARPANET (created in 1969), a project of the Advanced Research Projects Agency of the United States Department of Defense.

Further developments in computers' protocols (ways in which computers communicate with each other) resulted in a network of networks, or the Internet, in 1983.

Although the World Wide Web was a proposal first published on March 12, 1989, by Tim Berners-Lee of the European Nuclear Research Center (CERN) --this is why it is considered that the World Wide Web was created in 1989-- the idea came into life at the end of the year 1990, for the following reasons:

  • After that proposal of 1989, Berners-Lee wrote another on May 1990, and in September 1990 he received support to develop those ideas.
  • Some of the essential technologies needed to create the World Wide Web were already available by October 1990, that is, the HTTP (Hypertext Transfer Protocol), the HTML (Hypertext Markup Language) and the URI (Universal Resource Identifier), all considered been developed by Berners-Lee.
  • On November 12, 1990, with the Belgian engineer Robert Cailliau, who was working in similar ideas, wrote a more formal proposal of such a system to share information across the CERN where they mentioned: "build a Hypertext project called WorldWideWeb" [Wikipedia, 2019].

Well, by the end of December 1990, in a NeXT computer, and after the creation of the first web server and the first web page browser, the first web site, running at CERN, appeared on December 20, 1990.

This idea was rapidly adopted outside the CERN in 1991 and, by the end of the 1990s, more than 130 million people could access the Internet using the World Wide Web technology.

In conclusion, the World Wide Web went live in the decade of 1990s: was a project, a proposal by the end of 1989 and started to work as a fast-adopted technology at the beginning, and throughout, the 1990s.

You might be interested in
Which Tab provides the command to add a hyperlink to a document?
Natali [406]

Answer:

I love it is your responsibility is accepted the second one was for the database reply to your account we should wear the same same Dp xd I have tow bar is the only one hour u

7 0
3 years ago
Read 2 more answers
What does %d, , %c, %s mean and what's their difference?
Leviafan [203]
Not sure in what environment your asking for, but in C programming, %d is an integer (basically a number), %c is a character, that is a single alphanumeric character, where as %s is a series of alphanumeric characters, in programming %s is actually just an array of characters (so multiple %c), but don't worry about that to much. 

Examples in c. 

int number = 1;
char character = "c"; (numbers (integers) can be characters)
char string[5] = "abcd"; ([5] implies 5 characters, here there are 4, that is because an invisible character exists known as a "null terminator" (\0).
6 0
3 years ago
Read 2 more answers
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
Xbox one is not turning on and power brick is orange why is that?​
NISA [10]

Answer:

the power supply is working fine but has been set to energy-saving power mode.

Explanation:

A steady orange light on the power brick means that the power supply is working fine but has been set to energy-saving power mode. This happens as a safety precaution when a power surge is detected. In order to fix this, you must first unplug the power brick from both the Xbox one and the wall socket. Next, you have to leave the power brick disconnected for about 30 seconds to a minute so that the energy completely fades. Finally, plug back in the cable and restart your console. It should now have a steady white light and be back to functioning perfectly.

5 0
3 years ago
Which of the following are examples of typical problems an ISS professional would encounter? Check all
natali 33 [55]
I’m guessing B! Seems to be the best
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement correctly describe the FAFSA
    5·2 answers
  • A 10MB file is compressed into a 2MB file for storage. What is the compression ratio?
    6·1 answer
  • A pages visual organization is known as the
    14·2 answers
  • Predictive coding software leverages .............................when experts review a subset of documents to teach the softwar
    15·1 answer
  • 1) Open the file DiceSimulation.java attached below. Create a new project on NetBeans called DiceSimulation. Copy the code from
    13·1 answer
  • Which of the following is time-dependant? Group of answer choices
    8·1 answer
  • CAN YOU PLEASE HELP WITH THIS DUE IN 10 MINUTES
    8·1 answer
  • Malware is a combination of which two words? A. malevolent and software B. malignant and software C. maladapted and software D.
    8·1 answer
  • It is an electronic device that capable of accessing accepting processing product and storing data​
    13·1 answer
  • An application is getting downloaded, the total size is 52GB. So the speed of the WiFi is like.. 10mb per second, so the questio
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!