1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
8

Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho

w each technology contributes to the functioning of the Internet today.
Computers and Technology
1 answer:
maria [59]3 years ago
7 0

Answer:

The three important concepts in the Federal Networking Council's definition of the Internet are, namely;

  • Packet switching
  • The TCP/IP communications protocol
  • Client/server computing

Explanation:

  • Packet switching involves the transfer of data which are grouped into different packets and then sent over a digital network to their respective destination. After the data are received at the destination site, they are then extracted and used by the application software.
  • The transmission control protocol/internet protocol allows one computer to connect or communicate with another one through the internet. The internet protocol defines how to route and address each packet to ensure it gets to the right destination. The IP address of a particular device on a network is usually unique to that device.
  • Client/server computing describes how a server provides services by taking requests from clients computers and sharing its resources with one or more computers.
You might be interested in
Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform
Elan Coil [88]
This is the binary system. Numbers are easily translated from binary simply by each binary number in a bit of information has an exponential value. You can translate binary to words because each set of 8 0s and 1s can be translated into numbers which are labeled in a system called asscii. For each number there is a charecter or symbol associated. for example:0000 0011 would translate to 3 and in asscii that 3 would translate into a G. therefore 00000011 would be translated twice by the computer if you hit the g key on your keyboard until a G was displayed on your screen.
4 0
3 years ago
Using the flowchart diagram, identify the decision point of this solution. Identify vendors. Calculate amount due. Determine dat
andreev551 [17]

Answer:

answer is "is there an early pay discount"

Explanation:

3 0
4 years ago
Read 2 more answers
Write a structured algorithm that prompts the
MA_775_DIABLO [31]

Answer:

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

Explanation:

Algorithm is a sequence of instructions a computer is expected to follow to solve a particular problem.

Required :

Two inputs ; num1 and num2

Expected output

Algorithm :

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

The two numbers to multiply are entered ; the product is calculated by the program ; the the user inputs his or her own expecteted product ;

Both are compared and the output of the comparison is displayed (either correct oe incorrect)

8 0
3 years ago
Patti would like more information about product recalls. Which of the following resources would not be reliable and relevant? ww
motikmotik
The first list since it wasn't updated in so long.
8 0
3 years ago
Read 2 more answers
You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
leva [86]

Answer:

more /var/log/auth.log

less /var/log/auth.log

Explanation:

The commands that can be used to view the content of the auth.log file page by page are:

more /var/log/auth.log

less /var/log/auth.log

5 0
3 years ago
Other questions:
  • Progressively enhancing a web page for different viewing contexts (such as smartphones and tablets) through the use of coding te
    11·1 answer
  • R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
    8·1 answer
  • Ip addresses and their corresponding domain names are used to identify computers available through the internet.
    15·1 answer
  • True or false a relational database is one in which every data item is related to every other data item
    6·1 answer
  • Choose all of the correct answers for each of the following:
    10·1 answer
  • Which of the following statements about certificates is true?
    14·2 answers
  • Which of the following files has the Ionic styles? ionic.bundle.css ionic.js ionic.css ionic.bundle.js
    13·1 answer
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • You need to synchronize your mobile device data with your desktop computer. for security reasons, your organization prohibits sy
    5·1 answer
  • Limited time only for christmas give yourself free 100 points YES YES yes yes yes
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!