1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
8

The concept of the internet was developed by the u.s. department of defense as a network that ________ in event of an attack.

Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
8 0
<span>Would not be easily distrupted</span>
You might be interested in
Question 3 (2 points)
jeyben [28]

Answer:

The energy source that does not use heat in the process of converting it to electricity is;

c. Sunlight

Explanation:

In converting Sunlight energy source to electricity, the photons in the light from the Sun excite electrons in the solar cells silicon layers, such that the electrons travel from n-type silicon layer to the p-type silicon layer creating electric potential energy that does work as the electrons flow back in the form of electricity from the p-type to the n-type silicon layer through an external circuit

7 0
3 years ago
____ is scientifically seeking and discovering facts.
galina1969 [7]

Answer:

I believe it is science, but before you do anything with this answer, research more on it, just in case I'm wrong! :)

Explanation:

3 0
3 years ago
On your Windows server, you're planning to install a new database application that uses an enormous amount of disk space. You ne
hoa [83]

Answer:

ReFS format and Storage Spaces.

Explanation:

ReFS(Resilient File System)format was introduced in 2012 and it was the replacement for NTFS(NT File System).It was introduced as a part of the Windows Server.ReFS supports maximum value of 1 yottabyte (1 one million Terabytes). It also supports auto-correct form disk errors and data corruption.You need a storage space to store the data hence  we need storage space also.

4 0
3 years ago
The purpose of the ________ protocol is to ensure the integrity of the communication.
Vladimir [108]

The purpose of the transmission control protocol is to ensure the integrity of the communication.

The TCP/IP network architecture also refers to the Internet architecture. The Transmission Control Protocol (TCP) is a transport layer protocol, and the Internet Protocol (IP) is a network layer protocol.

<h3>What is Transmission control protocol ?</h3>

Transmission Control Protocol, or TCP, is a communications standard that enables computer hardware and software to exchange messages over a network. It is intended to send packets over the internet and make sure that data and messages are successfully delivered through networks.

  • TCP's (Transmission Control Protocol) purpose is to regulate data transport so that it is dependable. Connection management, dependability, flow control, and congestion control are the four fundamental TCP functions. Connection initialization (a three-way handshake) and termination are included in connection management.

Learn more about Transmission control protocol here:

brainly.com/question/14280351

#SPJ4

3 0
2 years ago
Who is the president of USA​
myrzilka [38]

Currently it is Donald J. Trump but he is leaving office so it will be Joe Biden :^)

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which is NOT a way the network operating sys-
    6·1 answer
  • A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be disp
    15·2 answers
  • Give two reasons why it is important to upgrade your browser when a new version becomes available.
    8·1 answer
  • What is master slide and tell about master slide
    6·1 answer
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    10·1 answer
  • What software development model focuses on improving the product in small steps each time through the cycle?
    14·2 answers
  • Your company's data center has suffered a recent power outage, and corporate applications were unavailable for two days. You hav
    11·1 answer
  • hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map
    6·1 answer
  • Which operating system (OS) is used to run your laptop?
    15·2 answers
  • Which of the following is used to store data in the computer's memory that can be
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!