1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
12

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics

and federal problem-solvers. How might that explain some of the security vulnerabilities present in the internet today?
Computers and Technology
1 answer:
Stels [109]3 years ago
6 0

Answer:

they trusted each other

Explanation:

thses were scientists with one goal in mind: making it work.  No cheating.

You might be interested in
Which is true about lists and stacks?
frutty [35]

Answer:

A. list are first in first out and stack are just a special case

<h3>hope this helps!</h3>
4 0
3 years ago
Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
Arte-miy333 [17]
The answer is an Intruder Prevention System (IPS). An Intrusion Detection System (IDS) will detect an attack but will not block it.
3 0
3 years ago
How do I type over Images (photo posted ​
Ber [7]
Oh a document, I do not believe that you have type on images, but if you were to type a text in a app called PicsArt and saved it and then put it onto the document over the picture it would work.
3 0
3 years ago
Read 2 more answers
Which of the following statements is true of alert files?
ozzi

Answer:

They are only generated by Wireshark.

3 0
3 years ago
Are all the computer users known as programmer ​
Evgesh-ka [11]

Answer:

Nope

Explanation:

programmers are diff

6 0
3 years ago
Other questions:
  • A network administrator is implementing dhcpv6 for the company. the administrator configures a router to send ra messages with m
    6·1 answer
  • Write a paper, 2-3 paragraphs that discuss how to defend ideas objectively through effective communication. Include the skills n
    6·1 answer
  • All web page urls begin with the letters ____.
    6·1 answer
  • What is Quantum Cryptography? How is it different from Public and Private-key transactions?
    6·1 answer
  • The space where text and content is entered and positioned for onscreen reading or printing
    8·1 answer
  • Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I
    8·1 answer
  • How can i fix a all white phone screen
    11·2 answers
  • Which statement describing the arcade games played in the 1970s is true?
    14·1 answer
  • Which of the following is a key aspect of any IT position? installation of fiber optic cables
    14·2 answers
  • I am making a project i have to advertise a product i picked a futureistic car
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!