
<u>Networks were originally used as a government weapon 61 years ago</u> to <u>communicate information</u> such as data and research. However, individual networks were eventually discontinued by the government and made open to the public to use for things such as PAN, LAN, MAN, WAN, SAN, and so on.
<u>Our internet today is capable of communicating with bilions of computers.</u> This is possible due to your modem using radio wave-like speeds to connect to your ISP. Your ISP then connects to a larger network, which is connecting to thousands of other networks. You see, <u>the internet is just a large network of networks that are connected through very fast radiowaves</u>. However, it is not just a single network being used anymore; it's thousands of them. The term, "internet" was used to describe this large selection of networks. In short, <u>B</u><u> would be incorrect. </u>
The worldwide web is a protocol used by the internet to connect to select websites favourably from whoever's using it. This obviously would not define the network, as this is something that's used by it. Furthermore, <u>A</u><u> would not be correct.</u>
As described already, the network was a selection of computers used to communicate information to each other. <u>C </u><u>would not be correct </u>as it states that there is only one computer being used.


Answer:
It's up to personal preference.
Explanation:
iPhone/Apple gives more compliments to security than Android.
Android has more friendly user GUI and dev tools.
Answer:
D
Explanation:
All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.
Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.
To do this, ensure measures like
- Regular Program cleanup
- Patches management
- service pack installation
- service or usage policies
...among others.
Cheers
JOJO fan!?!!?!??!?!?!!?!?
Answer:
b. IT infrastructures and services
Explanation:
IT infrastructure or information technology infrastructure refers to the various components involved in the functioning of an IT enabled operations. These components include; hardware, software, network resources, etc.
It is usually internal to an organization and deployed within the confines of its own facilities.