1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
7

Which two factors most influenced the growth of the Internet during the 1970s?

Computers and Technology
2 answers:
eduard3 years ago
8 0

Answer:

The answer is "increase in the power of public universities and increased appreciation for a liberal arts education". DARPA and Russia had nothing to do with this. Yes, the computer hardware improvement led to a growth, but National Science Foundation funding in 1981, and hence this is also not an option. And electrical power supply had nothing to do with this. Hence, the above answer. as the concept of the internet is based on liberal arts of education, to impart practical and intellectual skillsets, and hence to grow the social responsibility among the citizens of the whole world. Also, the power of public universities had a big role to play definitely, and this was confirmed from Pentagon as well then when the question was raised, is this due to the risk of a nuclear attack.

Many people think that the main reason was the nuclear attack threat, but that was not an issue definitely. Actually this was the time of liberalization, and the power of the public universities was increased. Hence, they got the chance to share the information of various sorts with the people, and in the process internet started expanding.

Explanation:

The answer is self explanatory.

Gre4nikov [31]3 years ago
5 0

Answer:

Increase in the power of computer hardware and increased funding from the National Science Foundation.

Explanation:

At first in chose the answer as i stated above, but then checked i brainly to just see if i was right and read the answer provided and thought with that lengthy explanation they were correct, but the answer was wrong.  My first guess was correct as i stated above as my answer..

You might be interested in
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
Erica has always selected large numbers of cells by clicking and dragging her mouse. A shortcut that she could use is to select
labwork [276]
D. enter because if you enter something on a cuputer or laptop your selecting something
5 0
3 years ago
Imagine that you need to be late to work next Thursday because of a doctor's appointment. Compose your own e-mail appropriate fo
ratelena [41]
In form your boss a week early
8 0
3 years ago
Rachel wants to make sure that she uses effective communication skills at work. Which of the following is an example of somethin
BartSMP [9]

dont use slang or words like lol

5 0
3 years ago
Read 2 more answers
Write a few statements that open a file called "greeting", write the message "hey!" to the file -- and then close it. declare an
pshichka [43]
C++:

int main () {

std::ofstream output {"greeting.txt"};
output << "hey!";
output.close();

return 0;
}
6 0
3 years ago
Read 2 more answers
Other questions:
  • It is always better to run over and give more information when you are giving a presentation versus quitting on time.
    11·2 answers
  • The PICC team is scheduled to remove a PICC before client discharge. Assessment of the catheter indicates the PICC and determine
    7·1 answer
  • What is output by the following C# code segment?int temp;temp = 180;while ( temp != 80 ) {if ( temp &gt; 90 ) {Console.Write( "T
    7·1 answer
  • Anna’s computer will not power on. What aspect of the computer should Anna check (hardware or software)? How can Anna work to re
    5·1 answer
  • Lenovo's ThinkPad laptop computers is designed in the United States, the case, keyboard, and hard drive are made in Thailand; th
    14·1 answer
  • Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text.
    15·1 answer
  • . What is the relationship between frequency, wavelength and speed of a wave?
    15·1 answer
  • Write a program to randomly fill an array of float of 10 elements (use the rand() function and make sure to use #include ) in ma
    11·1 answer
  • How come I haven't moved to the next rank even though I have all of the right things to move on?
    10·2 answers
  • Digital communication and production chapter 17
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!