1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
2 years ago
5

The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth

er by common________ . Tier 1 networks form the Internet ________, a system of high-capacity routers and fiber-optic communication links arranged in a(n) ________ topology. Networks that form the Internet are maintained by ________that offer access to consumers. Before data travels over the Internet, it is divided ________ into by a protocol called ________, which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address ________. addresses are 32 bits long, whereas ________ addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by ________servers.
IP addresses that are temporarily assigned are called ________ addresses, whereas permanent ones are called ________ addresses. IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses ________, the name system allocates easy-to-remember domain names. ________level domains include and .edu. The servers that track these names are a vulnerable point in Internet security.
Computers and Technology
1 answer:
harkovskaia [24]2 years ago
3 0

Answer:

Advanced Research Projects Agency (ARPA); protocols; infrastructure; mesh; internet service providers (ISPs); packets; transmission control protocol (TCP); IPv4; IPv6; DHCP; dynamic; static; private; domain; top; .com.

Explanation:

The Internet is based on a U.S. government project called Advanced Research Projects Agency (ARPA). Today, the Internet is a collection of networks, tied together by common protocols. Tier 1 networks form the Internet infrastructure, a system of high-capacity routers and fiber-optic communication links arranged in a mesh topology. Networks that form the Internet are maintained by internet service providers (ISPs) that offer access to consumers. Before data travels over the Internet, it is divided into packets by a protocol called transmission control protocol (TCP), which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address. IPv4 addresses are 32 bits long, whereas IPv6 addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by DHCP servers.

IP addresses that are temporarily assigned are called dynamic addresses, whereas permanent ones are called static addresses. Private IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses domain, the name system allocates easy-to-remember domain names. Top level domains include .com and .edu. The servers that track these names are a vulnerable point in Internet security.

You might be interested in
Can i add ADSence on bangla content in blogsopt website?
Inga [223]

Answer:

I do not think you can! However, I am not sure since I mainly use Wix!!!

Explanation:

8 0
3 years ago
If you want to change the speed of a layer's horizontal scrolling, what should you change?
kirill [66]

Answer: A; X coefficient

Explanation: Hope I helped out !

-Carrie

Ps. it would mean a lot if you marked brainliest

6 0
3 years ago
A service provider recently upgraded one of the storage clusters that houses non-confidential data for clients. The storage prov
VARVARA [1.3K]

Answer:

<em>C. Purging</em>

<em></em>

Explanation:

<em>Data Purging in computer storage is a process that permanently erases and remove data from a storage space</em>.  Data deleting only removes the shortcut to the data but does not remove the data permanently, and can be easily recovered by an expert. <em>Data purging removes data permanently and also frees up the storage or memory space for other uses.</em> Data purging is relatively inexpensive and can be achieved with some special software tool.

Since the storage provider wants the hard drive back in working condition, data purging is the best option.

3 0
3 years ago
Pls help!!
alexira [117]

Answer:

4.24

Explanation:

First you find the mean of the data set, which is 7. Then to find standard deviation you have to follow the formula which tells you to subtract the mean from each number under the square root : √(2 - 7)^2 + (9 - 7)^2 + (10 - 7)^2 + (4 - 7)^2 + (8 - 7)^2 + (4 - 7)^2 + (12 - 7). Once you solve the parenthesis you square it, once you square it the negatives won't matter. That will leave you with this : √(25 + 4 + 9 + 9 + 25). The formula tells you to find the sum of those numbers (which is 72) then subtract one from how many numbers there are, 5 - 1 = 4, and divide your sum by that number. So 72 / 4 = 18. Then you find the square root of 18 and that becomes your answer.

7 0
2 years ago
In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is
STatiana [176]

Answer:

Record

Explanation:

4 0
3 years ago
Other questions:
  • The _____ is a computer-based test that measures the degree to which you associate particular groups of people with specific cha
    13·1 answer
  • How do I connect my CSS file and HTML page together? it's just not wanting to work for me. 
    5·1 answer
  • When admitting digital evidence at trial, the issue of ________ comes up when the evidence involves computer-generated records.
    13·1 answer
  • What is microsoft access?
    14·1 answer
  • Create and test a user-defined function named ufnFullName that combines the values of the two parameters named FirstName and Las
    15·1 answer
  • What makes the huns a formidable force for the roman empire?
    5·1 answer
  • ANSWER ASAP!!!!!
    10·2 answers
  • What hand glove is used to prevent electric shock and why​
    7·2 answers
  • Software licensed as proprietary
    11·2 answers
  • what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each one o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!