1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
2 years ago
15

Tier 1 networks form the internet ____.​

Computers and Technology
1 answer:
Phantasy [73]2 years ago
7 0

Answer:

Internet Backbone

Explanation:

The internet is a network of networks, no single tier 1 network (ISP companies like Sprint, IBM, Verizon, AT&T for example, they provide the cables and routers that connect the networks) can reach the entire internet on its own, so they merge together to form the Internet Backbone, a backbone network enables all users and companies to connect with each other.

You might be interested in
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
2 years ago
knowledge contributes vitally to the development of __________ memory, or recollections of personally experienced events that oc
Anettt [7]

Answer:

Episodic

Explanation:

Episodic memory are memory that enables a person to remember most important event that happen to them, which are unique to them and are tied to a specific time and place.

It can be the memory of every day events or experiences that occured to the person at a particular time and date.

Example:

Episodic memory is when an individual remember his /her date of birth or specific events and experiences.

Therefore Knowledge contributes vitally to the development of EPISODIC memory, or recollections of personally experienced events that occurred at a specific time and place.

5 0
3 years ago
A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
morpeh [17]

Answer: C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints

Explanation:

Option A is incorrect. There's no information on the speed and analysis of the fingerprint.

Option B is incorrect. No information regarding computer installation was given in the passage.

Option C is correct. With the information, it can be concluded that it is impossible for a top hacker to have access to the protected computer.

Option D is Incorrect. Information regarding time and investment costs that were incurred during the software development wasn't given in the passage

Option E is Incorrect. The passage didn't give information on the errors that the software produced.

8 0
3 years ago
What does a spam e-mail normally promise you?
nlexa [21]
The answer is a virus
7 0
3 years ago
Assume that the following variables have been properly declared and initialized.
grandymaker [24]

Answer:

       if (option1.equals(option2)){

           rsvp = true;

       }

       System.out.println(rsvp);

A full program is given in the explanation section

Explanation:

import java.util.Scanner;

public class Option {

   public static void main(String[] args) {

       boolean rsvp = false;

       int selection;

       String option1,option2;

       Scanner in = new Scanner(System.in);

       option1 = in.next();

       option2 = in.next();

       if (option1.equals(option2)){

           rsvp = true;

       }

       System.out.println(rsvp);

   }

}

4 0
3 years ago
Other questions:
  • Who is president is US
    5·1 answer
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • Recording music using a keyboard controller is commonly accomplished using which type of audio file format?
    13·1 answer
  • Data ____ travel over the Internet from router to router until reaching their destinations.
    7·1 answer
  • What do you think was the immediate effect of the introduction of handheld consoles and video games?
    6·1 answer
  • In the code segment below, assume that the int variable n has been properly declared and initialized. The code segment is intend
    5·1 answer
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable f
    6·1 answer
  • Primary functions of lighting are sufficient light to...
    13·1 answer
  • A data table is a range that displays what?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!