1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
5

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics

and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?
Computers and Technology
1 answer:
svp [43]3 years ago
5 0

It should be noted that the intention for the creation of the internet was simply for resources sharing.

The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.

It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.

Learn more about the internet on:

brainly.com/question/2780939

You might be interested in
Developers found a "time of check to time of use" (TOCTTOU) vulnerability in their application. The vulnerability made it possib
earnstyle [38]

This vulnerability above is taking advantage of the race condition process in the application.

<h3>What is race condition? </h3>

This race condition is said to be in the critical section or one that is a part of the program and it is a place where shared memory is accessed and it is concurrently worked on or executed by two or more threads.

Hence,  This vulnerability above is taking advantage of the race condition process in the application.

Learn more about race condition from

brainly.com/question/13445523

#SPJ2

5 0
2 years ago
While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
Contact [7]
Use currency conversion dialog box select rupee to us dollar
8 0
4 years ago
When was the bible of luke written​
Gelneren [198K]
85 C.E. I think that is when it was written, but I’m not 100% sure.
3 0
3 years ago
Triggers can be created in operational systemsto keep track of recently ------------------ records.o Deletedo Updatedo Inserted
Crank

Answer:

Inserted

Explanation:

Triggers can be created in operational systems to keep track of recently inserted records.

3 0
3 years ago
Middle of test help pls
olganol [36]

Answer:

I'm thinking d

Explanation:

i dont think we are advanced enough to do a,b, or c.

so imma say d

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following statements is true?a. Old paper documents, which were previously only available offline, are increasingly
    10·1 answer
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
    14·1 answer
  • Given a variable s associated with a str, write an expression whose value is a str that is identical except that all the letters
    15·1 answer
  • Meg[] elements = {new Lois(), new Stewie(), new Meg(), new Brian()}; for (int i =0; i
    15·1 answer
  • The "Father of the Computer" was _____________, an Englishman, who in 1836 produced designs for a "computer" that could conduct
    15·1 answer
  • What do u mean by software​
    7·1 answer
  • What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms
    6·1 answer
  • USB 3.1 offers an improvement over its predecessors by enabling a maximum data transfer rate of up to:
    8·1 answer
  • Cycle for science and technology<br>​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!