1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
11

The "fathers of the Internet" are Vinton Cerf and ________. Select one: A. Robert Kahn B. Robert Cailliau C. Tim Berners-Lee D.

Bill Gates
Computers and Technology
1 answer:
krok68 [10]3 years ago
7 0

Answer:A)Robert Kahn

Explanation: Vinton Cerf and Robert Kahn are the two inventor who are responsible for the invention of the the internet facility with the protocols .

Vinton Cerf is the person who introduce the TCP/IP protocols and the internet services through the architecture. He had a co-inventor or colleague named Robert Kahn who also helped in the introduction of the TCP/IP protocols from the DARPA program structure.He also made people realize about the importance about the packet-switching technique.

You might be interested in
Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and kn
nadezda [96]

A transaction is a simple task carried out as part of corporate operations. Transaction processing systems (TPS) handle business transactions for the corporation, supporting overall enterprise operations.

A TPS creates papers pertaining to a non-inquiry transaction and records the transaction itself, together with all of its results, in the database.

Today, TPS are required for business operations in practically every firm. TPSs feed information into organizational databases; they also serve as the framework for management-oriented information systems. Source data automation frequently involves direct data entering. Electronic data interchange is being utilized by transaction processing systems more and more. These systems offer computer-to-computer communication without the need for repeated data entry by substituting paper documents with formatted transaction data sent over telecommunications networks.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

5 0
1 year ago
Which wireless technology connects with most mobile devices?
LenaWriter [7]

Answer:

¡) Internet

¡¡) Alexa

¡¡¡) Electronic Devices

8 0
2 years ago
​A(n) ____ statement can include rules for site visitors, a statement of copyright in the site design and content, and can restr
laiz [17]

Answer: TOS

Explanation:

 Terms of service is the agreement and the set of rules and regulations for the site visitors. It include all the terms and condition or the disclaimer when addressing the particular website.

Terms of service are set before designing the any type of the site and content in the system that restrict all the types of business that the users conduct in the site.

7 0
3 years ago
Floating point values (real numbers that can handle up to 5 decimals)
Ann [662]

Answer:

1.45638

Explanation:

p please mark me as brainlest

4 0
3 years ago
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
Tema [17]

Answer: inattention, lack of knowledge, and negligence.

Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.

5 0
3 years ago
Other questions:
  • Dial-up connections can be made over a(n) ____ line or phone line. isdn dsl ipx tcp/ip
    12·1 answer
  • How can i add card reader to pc answers?
    9·1 answer
  • Select all the items that determine your preference for a concert ticket. a) band that is playing b) date of the concert c) pric
    7·1 answer
  • A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
    14·1 answer
  • What is required for sitting with your seatbelt on while driving?
    7·1 answer
  • A ____________ is a network connection that typically carries encrypted data over the Internet to and from a remote access serve
    13·1 answer
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • Just answer in five-line. Question:
    9·1 answer
  • Why might an algorithm created to assist in hiring decisions be biased?
    15·1 answer
  • Write a Python class that inputs a polynomial in standard algebraic notation and outputs the first derivative of that polynomial
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!