1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
2 years ago
5

The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth

er by common________ . Tier 1 networks form the Internet ________, a system of high-capacity routers and fiber-optic communication links arranged in a(n) ________ topology. Networks that form the Internet are maintained by ________that offer access to consumers. Before data travels over the Internet, it is divided ________ into by a protocol called ________, which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address ________. addresses are 32 bits long, whereas ________ addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by ________servers.
IP addresses that are temporarily assigned are called ________ addresses, whereas permanent ones are called ________ addresses. IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses ________, the name system allocates easy-to-remember domain names. ________level domains include and .edu. The servers that track these names are a vulnerable point in Internet security.
Computers and Technology
1 answer:
harkovskaia [24]2 years ago
3 0

Answer:

Advanced Research Projects Agency (ARPA); protocols; infrastructure; mesh; internet service providers (ISPs); packets; transmission control protocol (TCP); IPv4; IPv6; DHCP; dynamic; static; private; domain; top; .com.

Explanation:

The Internet is based on a U.S. government project called Advanced Research Projects Agency (ARPA). Today, the Internet is a collection of networks, tied together by common protocols. Tier 1 networks form the Internet infrastructure, a system of high-capacity routers and fiber-optic communication links arranged in a mesh topology. Networks that form the Internet are maintained by internet service providers (ISPs) that offer access to consumers. Before data travels over the Internet, it is divided into packets by a protocol called transmission control protocol (TCP), which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address. IPv4 addresses are 32 bits long, whereas IPv6 addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by DHCP servers.

IP addresses that are temporarily assigned are called dynamic addresses, whereas permanent ones are called static addresses. Private IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses domain, the name system allocates easy-to-remember domain names. Top level domains include .com and .edu. The servers that track these names are a vulnerable point in Internet security.

You might be interested in
A program that contains the following method: public static void display(int arg1, double arg2, char arg3) { System.out.println(
Oduvanchick [21]

Answer:

The method can be accessible from main method of any class.

Explanation:

Main method is the entry point of a program, which means when you start you program the first thing to execute is the main method.

public static void main(String[] args){

// Your code here

}

In the given display method you have int, double and char data types as a arguments. So in order to call display method you need to understand the datatype that you want to pass.

int only takes integers without decimal points.

double take numbers with decimal points.

and char only tak one character

so in order to call display method we need to pass those arguments in right order.

Below is the main method which will call the display method in a right way

public static void main(String[]args){

  display(25,50000.00,'T');

}

Output

The values are 25, 50000.0, and T

7 0
3 years ago
) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message
emmainna [20.7K]

Answer:

In Python:

entry = input("Sentence: ")

while True:

   if entry.count(",") == 0:

       print("Error: No comma in string")

       entry = input("Sentence: ")

   elif entry.count(",") > 1:

       print("Error: Too many comma in input")

       entry = input("Sentence: ")

   else:

       ind = entry.index(',')+1

       if entry[ind].isnumeric() == False:

           print("Comma not followed by an integer")

           entry = input("Sentence: ")

       else:

           break

print("Valid Input")

Explanation:

This prompts the user for a sentence

entry = input("Sentence: ")

The following loop is repeated until the user enters a valid entry

while True:

This is executed if the number of commas is 0

<em>    if entry.count(",") == 0:</em>

<em>        print("Error: No comma in string")</em>

<em>        entry = input("Sentence: ")</em>

This is executed if the number of commas is more than 1

<em>    elif entry.count(",") > 1:</em>

<em>        print("Error: Too many comma in input")</em>

<em>        entry = input("Sentence: ")</em>

This is executed if the number of commas is 1

   else:

This calculates the next index after the comma

       ind = entry.index(',')+1

This checks if the character after the comma is a number

       if entry[ind].isnumeric() == False:

If it is not a number, the print statement is executed

<em>            print("Comma not followed by an integer")</em>

<em>            entry = input("Sentence: ")</em>

If otherwise, the loop is exited

<em>        else:</em>

<em>            break</em>

This prints valid input, when the user enters a valid string

print("Valid Input")

Note that: entry = input("Sentence: ") <em>is used to get input</em>

4 0
3 years ago
Simple mail transfer protocol (smtp) uses the well-known port number ______________ by default.
Elden [556K]
I believe it's default is port 587. 
8 0
3 years ago
Read 2 more answers
In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web se
Viefleur [7K]

Answer: True

Explanation:

 Yes, the given statement is true that the web based database used the various types of database applications for transferring the information or data.

  • The web database applications are basically designed so that the users managed and easily access the information by using the internet.
  • It is works as the middleware form for transferring the data from the internal database of an organization to the web server and it is known as web page for the user interface.
  • We can store various types of business and also personal related data by using the web database.

4 0
3 years ago
write a function that returns a list, where each member of list contains previous day’s value multiplied by 2.​
sergeinik [125]

Answer:

Explanation:

The following code is written in Java, the function takes in a list with the previous day's values. The function then uses that list, loops through it and multiplies each individual value by 2 and returns the modified list. The first red  square represents the test case for the function, while the second red square in the image represents the output.

 public static ArrayList<Integer> doubleIt(ArrayList<Integer> mylist) {

       for (int x = 0; x<mylist.size(); x++) {

           mylist.set(x, mylist.get(x)*2);

       }

       return mylist;

   }

5 0
3 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • 1. Write a program to prompt the user to enter a single character and respond back whether or not the character is valid dna. 2.
    12·1 answer
  • 1.) How do parks and other green spaces benefit a community?
    7·2 answers
  • If you're sending an email from your laptop to a classmate the laptop is the
    11·1 answer
  • Who wants sum points? spam this and ill put 3 questions up for 100 points i have 7111 points rn
    7·2 answers
  • Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
    12·1 answer
  • It is possible to limit the search results to a range of publication dates.
    13·1 answer
  • interpret the following SQL create table persons (person I'd int, last name varchar (255) first name varchar (255) address varch
    7·1 answer
  • Match the following pls help
    5·1 answer
  • I WILL MARK BRAINIEST FOR THIS!!!!!!
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!