1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
5

The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth

er by common________ . Tier 1 networks form the Internet ________, a system of high-capacity routers and fiber-optic communication links arranged in a(n) ________ topology. Networks that form the Internet are maintained by ________that offer access to consumers. Before data travels over the Internet, it is divided ________ into by a protocol called ________, which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address ________. addresses are 32 bits long, whereas ________ addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by ________servers.
IP addresses that are temporarily assigned are called ________ addresses, whereas permanent ones are called ________ addresses. IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses ________, the name system allocates easy-to-remember domain names. ________level domains include and .edu. The servers that track these names are a vulnerable point in Internet security.
Computers and Technology
1 answer:
harkovskaia [24]3 years ago
3 0

Answer:

Advanced Research Projects Agency (ARPA); protocols; infrastructure; mesh; internet service providers (ISPs); packets; transmission control protocol (TCP); IPv4; IPv6; DHCP; dynamic; static; private; domain; top; .com.

Explanation:

The Internet is based on a U.S. government project called Advanced Research Projects Agency (ARPA). Today, the Internet is a collection of networks, tied together by common protocols. Tier 1 networks form the Internet infrastructure, a system of high-capacity routers and fiber-optic communication links arranged in a mesh topology. Networks that form the Internet are maintained by internet service providers (ISPs) that offer access to consumers. Before data travels over the Internet, it is divided into packets by a protocol called transmission control protocol (TCP), which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address. IPv4 addresses are 32 bits long, whereas IPv6 addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by DHCP servers.

IP addresses that are temporarily assigned are called dynamic addresses, whereas permanent ones are called static addresses. Private IP addresses cannot be routed over the Internet and are usually assigned to devices within LANs. Because it is difficult to remember IP addresses domain, the name system allocates easy-to-remember domain names. Top level domains include .com and .edu. The servers that track these names are a vulnerable point in Internet security.

You might be interested in
What is the name of the the world cell of the internet?​
irga5000 [103]

Answer:

mobile web is the the world cell of internet

7 0
3 years ago
A canister is released from a helicopter 500m above the ground. The canister is designed to withstand an impact speed of up to 1
Lisa [10]

Answer:

a) h = 1/2 gt² b) 99 m/s c) 14.1 m/s

Explanation:

a) As the only force acting on the canister once released is gravity, as it is constant, we can use one of the kinematic equations, as follows:

h = h₀ + v₀t + 1/2a t²

As we are told that the canister is simply released, it means that v₀ =0.

If we choose the direction of the acceleration (downward) as positive ,and we select the height at which it was released as our origin, so h₀ =0, the final expression for height is as follows:

h = 1/2 g t²

b) Combining this equation with the expression of t, from the definition of acceleration as the rate of change of velocity, we arrive to this expression:

vf² - v₀² = 2 g h  

As v₀ = 0, we have v₀ = √2.g.h = √2.9.8.500 m²/s² = 99 m/s

c) In order to be able to break the canister, impact speed must be larger than 100 m/s.

So, we can use the same equation as above, putting vf=100 m/s, and solving for v₀, as follows:

v₀² = vf² - 2.g.h = 100² m²/s² - 2.9.8.500 m²/s² = 200 m²/s²

v₀ = √200 m²/s² = 14.1 m/s

For any value of v₀ just barely larger than this, the canister will be broken.

7 0
3 years ago
The term used to describe whereby old and new media are available via the integration of personal computers and high speed satel
garri49 [273]

The term used to describe whereby old and new media are available via the integration of personal computers and high speed satellite based phone or cable links is: media convergence.

<h3>What's a good illustration of media convergence? </h3>
  • Smartphones, laptops, and ipads are the finest instances of media convergence since they combine several forms of digital media, including radio, cameras, TVs, music, and more, into a single, straightforward gadget.
  • The blending of formerly separate media platforms and technologies through digitization and computer networking is referred to as media convergence. Another name for this is technical convergence.
  • Media ownership concentration, sometimes referred to as media consolidation or media convergence, is the process through which a smaller number of people or organisations come to control a larger portion of the mainstream media.
  • According to recent study, there is a rising amount of consolidation in the media sectors, which are already highly concentrated and controlled by a very limited number of companies.

To learn more about media convergence, refer to the following link:

brainly.com/question/25784756

#SPJ4

6 0
2 years ago
A column to be used in a database is called the
Temka [501]

it is called an attribute

8 0
3 years ago
What does a rung lock do to an extension ladder?
Stells [14]
What’s a rung lock and an extension ladder
8 0
3 years ago
Other questions:
  • A(n) _____ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or indivi
    15·1 answer
  • When a file has been opened using the 'r' mode specifier, which method will return the file's contents as a string??
    12·1 answer
  • You need to immediately terminate process id 2129. which command should you use?
    15·1 answer
  • QUESTION 1 Someone may choose to own a car instead of leasing because: AThe car can be resold later to make some money back. BTh
    9·1 answer
  • 1. Perform the following Binary Additions 101101 + 10100 *
    13·2 answers
  • Radio waves pros and cons
    10·2 answers
  • Assume the list numbers1 has 100 elements, and numbers2 is an empty list. Write code that copies the values in numbers1 to numbe
    15·1 answer
  • A ___ is a node (or a device) that connects two different networks together and allows them to communicate.
    12·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • What command can you use if you accidentally delete a sentence in your document?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!