1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
12

When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at C

ERN chose to make the underlying code publicly available on a royalty-free basis so that anyone who ever wanted to use it or build upon it could do so without having to pay any licensing fees to CERN or ask for CERN's permission.
Which of the following best describes the reasons for this decision?

a. CERN did not recognize the full potential of the World Wide Web and did not think it was worth investing any more of its own resources into its further development.
b. By offering the Word Wide Web as a freely available alternative, CERN hoped to discourage people from using America Online, CERN's biggest competitor for online communication services.
c. Had the technology been proprietary (i.e., closed and privately licensed), it would likely not have become as popular as it has or have been adopted by so many users and institutions across the globe.
d. Because Tim Berners-Lee did not ask his employers for permission before using CERN resources to develop the World Wide Web, as punishment, he was required to give the technology away for free and sacrifice the millions of dollars he could have personally made by selling his idea for a profit.
Computers and Technology
1 answer:
Svetllana [295]3 years ago
8 0

Answer:

c.

Explanation:

People trust open-source software - if they can see how it works and understand it, they can help improve it and build applications using it. If these protocols were not publicly available - then nobody would have implemented services using them - so nobody would be adopting it.

You might be interested in
When you use the Filter feature, what appears in each column label
Scrat [10]
<span>an arrow  ..............................</span>
5 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Alguien me prestta una cuenta de osu!, porfa
Mariana [72]

Answer:

english please........

7 0
3 years ago
The audience, setting, and type of presentation help determine presentation content. True or False?
WARRIOR [948]

True. The audience is the key to the style of presentation and the content is led by the key to the topic. If the setting blends well with the audience age, gender, background, the presentation will be more effectively presented and positive, which will be more helpful to sell the audience to the point that is being made by the presenter.

6 0
3 years ago
+20 POINTS!!!~~~~~When adding delegates to his mailbox, which role should Joel use if he would like the user to be able to read
DochEvi [55]

Answer:

b on edge

Explanation:

4 0
3 years ago
Other questions:
  • Text rotation is also called _________________.
    7·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    12·1 answer
  • Identify possible advantages and disadvantages of using automatic withdrawal to pay bills
    12·2 answers
  • What is Mars internal composition
    7·1 answer
  • Select the antonym for given word freedom
    7·2 answers
  • True or False? PPOs differ from HMOs because they do not accept capitation risk and enrollees who are willing to pay higher cost
    10·1 answer
  • Mary can view the thumbnails of her presentation slides when she’s creating the slides which element of the programs interface i
    8·1 answer
  • If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is ca
    13·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • Meats ages hair and feathers all contain this monomer
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!