1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
13

A huge variety of networking hardware and software appeared. One challenge was to enable these different networks to communicate

with each other. ARPA accomplished this by developing the ________, which created a true "network of networks," the current architecture of the Internet. Web Protocol (WP) ARPA Protocol (AP) Internet Protocol (IP) Newrok Protocol (NP)
Computers and Technology
1 answer:
madam [21]3 years ago
6 0

Answer:

Internet Protocol (IP)

Explanation:

The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

You might be interested in
During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications co
oksano4ka [1.4K]

Answer:

The correct answer is "Technical Feasibility".

Explanation:

System investigation is used to Review that whether the system is feasible or not for the proposal that they will design or creating.in the system investigation stage, we do the technical feasibility. The technical feasibility is used to check technical resources like hardware, software, etc in the organization.

The  Technical Feasibility in the System investigation  is used to solve the problem of business

6 0
4 years ago
To create a query string, you add a ____ immediately after a url, followed by the query string.
salantis [7]
The answer is question mark (?).  To create a query string, you add a question mark (?) immediately after a url, followed by the query string.
5 0
3 years ago
Types of cybercrime​
sergij07 [2.7K]

Answer:

Types of cybercrime

Here are some specific examples of the different types of cybercrime:

*Email and internet fraud.

*Identity fraud (where personal information is stolen and used).

*Theft of financial or card payment data.

*Theft and sale of corporate data.

*Cyberextortion (demanding money to prevent a threatened attack).

*Ransomware attacks (a type of cyberextortion).

*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).

*Cyberespionage (where hackers access government or company data).

Most cybercrime falls under two main categories:

*Criminal activity that targets

*Criminal activity that uses computers to commit other crimes.

Explanation:

8 0
3 years ago
Read 2 more answers
Sierra owns a small business and handles many responsibilities, from logistics to marketing. She's seen a lot of success with Go
Elenna [48]

Answer:

A Smart Display campaign

Explanation:

She can go for Smart Display Campaign.

4 0
4 years ago
All of the following are report sections EXCEPT (Points : 4) detail.
lord [1]

Answer:Summary

Explanation: Summary is the briefing of any information or data and reducing the details about the subject.It is not a part of the report while it is designed because detailing is the part where the description is mentioned with every element so the requirement for summary is in that part and not in the report.

Other option are the part of the report designing because group footer is used for presenting the summaries of group, page footer the area below the main text and detail is the description of every element of the subject.Thus the only exception in the designing of report is summary.

6 0
3 years ago
Other questions:
  • Angelina, the outgoing student body president, has finished a report about the upcoming school election. She wants to add a bord
    7·2 answers
  • The chief architect now needs to design a memory with an addressability of 32 bits. Suppose the architect can only use the same
    6·1 answer
  • What type of graphic organizer will help jane compare the results of a student survey about teachers at her school?
    15·2 answers
  • Two positive outcomes generally associated with modern computing are greater _____.
    12·2 answers
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the int variable
    6·1 answer
  • PLEASE HELP WITH THESE QUESTIONS!!!! 19 POINTS!!!!!
    14·2 answers
  • A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate config
    11·1 answer
  • Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus
    7·1 answer
  • A related database stores data in the form of______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!