1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
2 years ago
5

The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth

er by common________ . Tier 1 networks form the Internet ________, a system of high-capacity routers and fiber-optic communication links arranged in a(n) ________ topology. Networks that form the Internet are maintained by ________that offer access to consumers. Before data travels over the Internet, it is divided ________ into by a protocol called ________, which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address ________. addresses are 32 bits long, whereas ________ addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by ________servers.
IP addresses that are temporarily assigned are called ________ addresses, whereas permanent ones are called ________ addresses. IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses ________, the name system allocates easy-to-remember domain names. ________level domains include and .edu. The servers that track these names are a vulnerable point in Internet security.
Computers and Technology
1 answer:
harkovskaia [24]2 years ago
3 0

Answer:

Advanced Research Projects Agency (ARPA); protocols; infrastructure; mesh; internet service providers (ISPs); packets; transmission control protocol (TCP); IPv4; IPv6; DHCP; dynamic; static; private; domain; top; .com.

Explanation:

The Internet is based on a U.S. government project called Advanced Research Projects Agency (ARPA). Today, the Internet is a collection of networks, tied together by common protocols. Tier 1 networks form the Internet infrastructure, a system of high-capacity routers and fiber-optic communication links arranged in a mesh topology. Networks that form the Internet are maintained by internet service providers (ISPs) that offer access to consumers. Before data travels over the Internet, it is divided into packets by a protocol called transmission control protocol (TCP), which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address. IPv4 addresses are 32 bits long, whereas IPv6 addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by DHCP servers.

IP addresses that are temporarily assigned are called dynamic addresses, whereas permanent ones are called static addresses. Private IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses domain, the name system allocates easy-to-remember domain names. Top level domains include .com and .edu. The servers that track these names are a vulnerable point in Internet security.

You might be interested in
Window is a very popular operating system becouse of its _ environment .​
Inga [223]
Window is a vary popular operating system because of its runtime and compatible environment .
hope it help
4 0
2 years ago
Read 2 more answers
If i were to give you free points woulld you take them?
kipiarov [429]

Answer:

D) friend me

Explanation:

6 0
3 years ago
Read 2 more answers
NO BODY KNOWS! How old is Cynthia Blaise!?
Fiesta28 [93]
I'd guess around 60-70 years possibly 55
3 0
3 years ago
Member function definitions: ______________.a. Always require the binary scope operator (::)b. Require the binary scope operator
lilavasa [31]

Answer:

Option (B) is the correct answer to the following questions.

Explanation:

The following option is correct because the binary scope operator is used to define the global variable only when the local variable has also the same name and we want to use global variable also or we also use scope operate when we do not want to use any function inside the class.

The following option (A) is wrong because we not always required binary scope operator and the option (C) is wrong because we cannot use the scope operator anywhere and the option (d) is already wrong because that binary scope operator would not be used in the function prototype.

7 0
3 years ago
Write a recursive method called, doMyMath, which takes as input any positive integer and calculates the factorial (use comments
gulaghasi [49]

Answer:

def doMyMath(n):  

    if n == 1:  

         return n  

    else:  

         return n*doMyMath(n-1)  

Explanation:

This line defines the function

def doMyMath(n):  

This line checks if n is 1. If yes, it returns n (1)

    if n == 1:  

         return n  

If otherwise, it calculates the fibonacci recursively

    else:  

         return n*doMyMath(n-1)  

To call the function from main, you can use:

print(doMyMath(5))

or

num = int(input("Number: "))   --- This gets the number from user

print("Result: ",doMyMath(num)) --- This calculates the factorial

<em>This question is answered in Python</em>

6 0
3 years ago
Other questions:
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • Rick needs to find the lowest number in a set of numbers that includes decimals. Which statistical function in a spreadsheet wil
    9·2 answers
  • Which of the following is not a skill set required by data scientists? A. Programming expertise B. Big data expertise C. Telecom
    11·1 answer
  • I will give Brainliest to the best answer, I need urgent HELP
    7·1 answer
  • I need 3 sentences on adware.<br> What they do and how they are a risk.
    5·1 answer
  • The function of while loop is
    14·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure
    13·1 answer
  • What are benefits of AI
    9·2 answers
  • Your server runs in quadruple-channel memory mode. How many memory controllers are being used?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!