1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
8

Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho

w each technology contributes to the functioning of the Internet today.
Computers and Technology
1 answer:
maria [59]3 years ago
7 0

Answer:

The three important concepts in the Federal Networking Council's definition of the Internet are, namely;

  • Packet switching
  • The TCP/IP communications protocol
  • Client/server computing

Explanation:

  • Packet switching involves the transfer of data which are grouped into different packets and then sent over a digital network to their respective destination. After the data are received at the destination site, they are then extracted and used by the application software.
  • The transmission control protocol/internet protocol allows one computer to connect or communicate with another one through the internet. The internet protocol defines how to route and address each packet to ensure it gets to the right destination. The IP address of a particular device on a network is usually unique to that device.
  • Client/server computing describes how a server provides services by taking requests from clients computers and sharing its resources with one or more computers.
You might be interested in
Suppose you want to view a document that has several headings. what view would you use?
bija089 [108]
Um i think outline. :)
5 0
3 years ago
Grid computing is a type of computing in which:
fredd [130]

Answer:

b

Explanation:

A computing grid can be thought of as a distributed system with non-interactive workloads that involve many files.

7 0
3 years ago
Energy vampire devices can draw power even when they are turned off or in standby mode?
just olya [345]
Yes that is correct.
3 0
3 years ago
(50 points) Jeff wants to create a responsive web page where elements change size according to the size of the window. How would
iris [78.8K]

Answer:

make the element sizes a percentage

Explanation:

Without using a framework specified for this type of thing such as Bootstrap, the best way to do this would be to make the element sizes a percentage. By making the size of everything a percentage it will automatically resize itself to take up the same percentage of the screen at all times. Even when the browser window is resized to any size that the user wants. This also applies to monitors of different sizes and mobile devices.

5 0
3 years ago
Which expression correctly determines that String s1 comes before String s2 in lexicographical order
Assoli18 [71]

Options :

A.) s1 < s2

B.) s1 <= s2

C.) s1.compareTo(s2) == −1

D.) s2.compareTo(s1) < 0

E.) s1.compareTo(s2) < 0

Answer: E.) s1.compareTo(s2) < 0

Explanation: Lexicographical ordering simply means the arrangement of strings based on the how the alphabets or letters of the strings appear. It could also be explained as the dictionary ordering principle of words based on the arrangement of the alphabets. In making lexicographical comparison between strings, the compareTo () method may be employed using the format below.

If first string = s1 ; second string = s2

To compare s1 with s2, the format is ;

s1.compareTo(s2) ;

If s1 comes first, that is, before s2, the method returns a negative value, that is a value less than 0 '< 0', which is the case in the question above.

If s2 comes first, that is, before s1, the method returns a positive value, that is a value greater than 0 '> 0'.

If both are s1 and s2 are the same, the output will be 0.

8 0
3 years ago
Other questions:
  • C programming question:
    12·1 answer
  • Which searching method requires that the list be sorted?
    5·1 answer
  • A virtual private network (VPN) is used to securely connect to another network over a insecure network.
    9·2 answers
  • A URL suffix is called a domain name.
    11·1 answer
  • Eniac was the first desktop computer. t/f
    5·1 answer
  • Using the Vigenere cipher, does the length of the key matter?
    8·1 answer
  • Which of the following are mass communication methods? (Select all that apply.)
    9·1 answer
  • What key value does Accenture’s myConcerto bring to clients looking for automated solutions?
    6·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • Why does my smoke detector keep beeping even after i change the battery?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!