The internet is based on which three key technologies?.

Answers

Answer 1

The internet is based on the client/server computing, the packet switching, development of the communications standards for the linking networks and the computers

What is the internet?

The internet is a vast network that connects computers all across the world. It is a wide and open network that can be used to share, communicate and transfer information or data.

The internet is made on HTTP client/server computing, the packet switching, and standards for linking networks and computers TCP/IP, HTTP.

Find out more information about the internet.

brainly.com/question/1757772


Related Questions

whats the quickest way to earn money?

I need 125 dollars sooo yea. HELP ME PLEASE!!!!

Answers

Answer:

get a job

Explanation:

Are computer science jobs in demand?

Answers

Explanation:

Yes. they're because the world has evlolve to be a global village

Write a function called ​replace_elem​ that takes an array and two values and uses the simple search algorithm to replace all instances of the first value with the second value.

I NEED THIS SOON

Answers

The replace_elem program is an illustration of functions, whose execution is carried out when the function name is evoked or called.

The main program

The program written in Python, where comments are used to explain each action is as follows:

#This defines the function

def replace_elem(myList, a, b):

   #This iterates through the list elements

   for i in range(0,len(myList)):

       #The following if condition replaces the element

       if(myList[i] == a):

           myList[i] = b

   #This prints the new list elements

   print(myList)

Read more about python programs at:

https://brainly.com/question/26497128

How to transfer bookmarks from one computer to another.

Answers

Answer:Plug a flash drive into your computer.

Open Firefox on your computer.

Press Ctrl+⇧ Shift+B.

Click Export Bookmarks to HTML.

Navigate to the location where you want to save the bookmarks

Explanation:i tried it and it worked

Write a program that reads 12 integers into a 2D integer array with 4 rows and 3 columns. The program then outputs the 2D array in reverse order according to both rows and columns

Answers

A program that reads 12 integers into a 2D integer array with 4 rows and 3 columns is given below:

The Program

for(int i =0;i<arr.length;i++) //arr.length=no of rows

{

 for(int j = arr[i].length-1;j>=0;j--)//arr[i].length=no of col in a ith row

   {

       System.out.print(arr[i][j]+" ");

   }

   System.out.println();

}

Read moe about computer programs here:

https://brainly.com/question/23275071

#SPJ1

Over 14 million Americans are unemployed. Now imagine you're one of them. Your savings are gone. You've lost your house. And you're down to your last $1,000. Can you make it through the month?

1. How do you feel about your situation? Do you think you can live 30 days with $1,000? Explain.

Answers

Answer:

yes I can live with 1000 dollars without spending in unnecessary things

1: The situation you've described is undoubtedly challenging and can bring about various emotions such as stress, worry, and uncertainty.

2: Living with $1,000 for a month can be extremely difficult, especially considering expenses like housing, utilities, food, transportation, and other essential needs.

Given that;

Over 14 million Americans are unemployed.

Now imagine you're one of them.

However, whether or not it is possible to make it through the month with $1,000 depends on several factors such as individual circumstances, location, and lifestyle choices.

It would require careful budgeting, prioritization of expenses, and seeking out available resources and assistance programs.

To increase the chances of making it through the month, it would be advisable to create a detailed budget, focusing on essential expenses first.

This may involve cutting non-essential costs, exploring options for temporary shelter or assistance programs, seeking employment opportunities, and utilizing community resources like food banks or support services.

It's important to remember that everyone's situation is unique, and seeking advice from financial experts or support networks can provide personalized guidance and assistance during challenging times.

To learn more about the unemployed visit:

https://brainly.com/question/305041

#SPJ3

5-10 Tools under the selection tools


repot if didn't say truth

Answers

answer is 5 because 5-10=5

Explanation:

5-10=5

why is data field should be atomic? Please help…..

Answers

By normalizing data to its atomic level, you can provide the right data to the right person in the right context at the right time. Uncovering the atomic level helps you to better understand the way that the data can support an interaction.

Explanation:

Hope it helps you!!

Which of the following is not a resource to find scholarship opportunities?

Answers

Answer:

B. school counselor

Hope it helps!!!brainliest pls!!!!!

The school counselor is not a resource to find scholarship opportunities. Thus option B is correct.

What is a scholarship?

A scholarship is a form of financial aid that allows the student that comes from the weaker section to go for further advanced education. hey are awarded on the basis of various criteria and include academic merit, athletic skills, and financial needs.

Find out more information about the scholarship.

brainly.com/question/26045714

A network consists of five computers, all running windows 10 professional. All the computers are connected to a switch, which is connected to a router, which is connected to the internet. Which networking model does the network use?.

Answers

Answer:

Star. It uses both a switch and a hub. As Star network does.

why header files are needed in every c program ?expalin​

Answers

Answer:

Header files serve two purposes. System header files declare the interfaces to parts of the operating system. You include them in your program to supply the definitions and declarations you need to invoke system calls and libraries.

Discovering soft drinks and ice are commonly purchased together is which of the following types of data mining analysis? Question 2 options: Marketing basket analysis Direct marketing Trend analysis Interactive marketing

Answers

Answer:

Marketing basket analysis

Explanation:

Basket analysis involves analyzing large data sets, such as purchase history, to reveal product groupings, as well as products that are likely to be purchased together.

(50 points!!) 2.6.5: Response: Creative Commons
Directions: Referring to the previous inforgraphic, give a short description of each of the following license types in your own words.

CC BY
CC BY-SA
CC BY-ND
CC BY-NC
CC BY-NC-SA
CC BY-NC-ND
Of the six licenses, which type is the most restrictive in terms of how you can use the work? Which type is the least restrictive? Answer in complete sentences.

Answers

A short description of each of the following license types in my own words are:

CC BY- This means that the creator must be given the credit.CC BY-SA- This allows users to be able to distribute and make changes to the original work, as long as credit is given to the original owner.CC BY-ND- This refers to the freedom to use a work and is a non-derivative license.CC BY-NC- This means that a reader must get specific permission from the creator to reuse their work.CC BY-NC-SA- This allows other people to make use of a work non-commercially and make edits as long as they give credit to the owner. This is the least restrictive.CC BY-NC-ND- This is the most restrictive as it allows a user to only redistribute the material but not to make any changes to the original.

What is Creative Commons License?

This refers to a type of copyright which allows a user to make use of another's work provided that he gives credit or in some cases, to only make use of the material based on specific permission from the owner.

Read more about creative commons license here:
https://brainly.com/question/17542186

which of the following is an example of new and emerging classes of sofware

Answers

We need to know what was listed :)!

What mathematical equation was created by a founder of intel?.

Answers

Arithmetic Logic Unit is said to be mathematical equation was created by a founder of intel.

What was this Arithmetic Logic Unit about?

Arithmetic Logic Unit is known to be Part of the CPU that was set up to perform mathematical equations. It is known to act as a passway to and from the processor.

Gordan Moore is known to be the founder of Intel. He is the man who has helped shape the modern world and produce  the base technology root.

Learn more about Arithemetic Logic Unit from

https://brainly.com/question/26486053

Hello! Can you help me for a project with 4 structures (without classes) in C++?
Please I must be done with this tomorrow..

Answers

Answer:

Explanation:

Some projects you can build with C++

   Login and Registration System.

   Car Rental System.

   Bookshop inventory system.

   Student Report Management System.

   Casino Number Guessing Game.

   Sudoku Game.

   Credit Card Validator.

   Helicopter Game.

True or False: Once you rename a field, the new field name must be used in the rest of the search string.

Answers

If you rename a field, the new field name must be used in the rest of the search string is a true statement.

How do one change the name of a field in Splunk?

Note that one has to use the rename command to rename some other fields. This command is said to be vital for giving fields more better names, such as Service ID instead of sid .

Conclusively, if you rename an original field, the original name is said to be not available to any other search commands.

Learn more about Splunk from

https://brainly.com/question/26470051

Classification of computer Purpose personality ?​

Answers

Answer: Physiology, Performance, and Personality Characteristics.

Explanation: I think this is correct, sorry if it's not!!

Stuart is running for class president and needs to calculate votes as they come in over the next week. Which response best explains why a computer would perform this task
better than a human?
Computers can replicate human tanks

Computers can think creatively
Computers don't require sloop
Computers process information more quickly

Answers

Answer:

Computers process information more quickly

Explanation:

Answer:

computers process information more quickly

All persons who have access to cji are required to have security training within _____ months of assignment.

Answers

Answer:

At a minimum, all personnel with access to CJI must complete Security Awareness Training within six months of initial assignment and retraining every two years after that.

Explanation:

At a minimum, all personnel with access to CJI must complete Security Awareness Training within six months of initial assignment and retraining every two years after that.

Hoped this helped you out

A brainlyiest is always appreciated

Draw a flow chart for the examples in selection 1:2:1
Someone help me please.

Answers

Answer:

See picture

Explanation:

Here is an example of a flowchart I found on the web. You use a rhombus shape for a decision, that usually branches into a yes and a no branch.

Without more details, that's about as much that can be said.

Four ways to improve the performance of a hard disk include.

Answers

Answer:

Defragmenting, and optimizing, also on Windows to not use Paging unless you have an SSD. And to install a lightweight OS like Windows 11 super-lite, Linux etc.

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

Answers

Answer:

ransomware

Explanation:

Which of the following is Microsoft Windows 10 virtualization technology?

Guest OS
Hyper-V
Hyper-10
Network utilities

Answers

Answer:

Hyper-V

Explanation:

lets you run a software version of a computer, called a virtual machine. Each virtual machine acts like a complete computer, running an operating system and programs

example:

you can run a virtual Linux computer on your windows

microsoftdocs

Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?

Answers

Answer:

Hacking

Explanation:

The reason why is because hackers also use hacking as a way to copy personal information from your computer or try to take your identity.

The type of attack that copies data unauthorized is known as hacking.

What is hacking?

Hacking is an illegal activity that was done by a man known as a hacker.

In hacking, the hacker can access your personal data and can copy it without your permission.

The attacker accesses a device and allows them to copy personal information using an unauthorized radio frequency connection is known as hacking.

More about the hacking link is given below.

https://brainly.com/question/14835601

#SPJ2

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses

Answers

Answer: Nessus, Nmap, Tcpdump, Fping

:) Those are tools that can be installed on Linux, that do all that

What does it mean when apple music says request timed out?.

Answers

Answer:

Your internet connection is bad, or you VPN is on when your not connected to WIFI

Explanation:

Learned from experience, HOPE THIS HELPS!!

When your browser fetches pages and graphics to form a web page, it stores that material on your device in temporary files referred to as: Group of answer choices browser home page email client FTTH browser cache

Answers

Answer:

cache

Explanation:

a cache is temporary files that are pulled from the servers, and these files are a part of the web page.

A grade 8 girl types her age as 18 years old as to gain access to a certain website. Is this statement ethical or unethical? Give atleast 2 reasons for both options.

Answers

Answer:

The answer is ethical.

Explanation:

Because first off she is lying about her age and second apparently she is too young to get in the website.

You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter how many times you explain the solution to them, they do not understand what you are saying. What should you do?

A. Go to the user's site
B. Suggest they call back tomorrow
C. Suggest they call another technician
D. Suggest you talk to their manager

Answers

Answer:

D

Explanation:

First when you are troubleshooting a client your main goal is to solve their issue, you dont want to say hey call later i cant help you or say call someone else because picture this you need help and someone hangs up on you or says (B.) or (C.) it comes off as rude i would say. Regarding (A.) im not 100% sure what exactly do you mean by user's site? But asking for their manager (D.) or someone else (preferably higher up) seems to be the right action to be taken.

The phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem.  D. Suggest you talk to their manager

How do you resolve troubleshooting problems?

To run a troubleshooter:

Select Start > Settings > Update & Security > Troubleshoot, or select the Find troubleshooters shortcut at the end of this topic.

Select the type of troubleshooting you want to do, then select Run the troubleshooter.

Allow the troubleshooter to run and then answer any questions on the screen.

To learn more about troubleshooting desktop problem, refer

https://brainly.com/question/15714846

#SPJ2

Other Questions
A store offers discounts on lunch-size chip bags when buying larger quantities. The graph below represents the total cosin dollars, for the number of bags purchased.ERREPricesNuncatch Who BaseWhat is the difference in the price per bag for 150 bags versus 50 bags?$0.18 per bag$0.17 per bag$0.15 per bag$0.05 per bag Which particle has a mass of9.11 x 10-28 g and charge of -1?electronprotonneutron How noble gases are important for the stability of an atom? The piece of art above is an example of a ___________. A. Collage c. Mosaic b. Stained glass d. Structure Write an exponential function that goes through points (0, 13) and (2,637). what is the fact family for 6,7,13 what is the answer A painting titled bacchus by caravaggio. a man is half clothed with wine and fruit. what traditional baroque characteristics can you identify in the piece above? a. open composition b. emotionality c. diagonal composition d. all of the above hi i need help with mandarin i need help with the countries What will be the total cost of Marla's ARM If the term of the loan were 25 or 20 years Instead of 30? Use the variable-rate loan calculator to find the answers. Write them In the spaces below. Compare the values you just obtained with the total cost of Marla's 30-year variable-rate mortgage. Write down your observations and conclusions. Ammonia (NH3(g), Delta. Hf = 46. 19 kJ/mol) reacts with hydrogen chloride (HCl(g), Delta. Hf = 92. 30 kJ/mol) to form ammonium chloride (NH4Cl(s), Delta. Hf = 314. 4 kJ/mol) according to this equation: NH3(g) HCl(g) Right arrow. NH4Cl(s) What is Delta. Hrxn for this reaction? kJ. Imagine you are a recipient, having a transplant received to you. Write a letter to a donor family to thank them please help me with this How much longer is a one inch button than a 3/8 inch button? Pls helpSherwin has twice as many stamps as his friends Allan and Gene combined. Allen has 55 stamps in his collection. Sherwin has 200 stamps in his collection.How many stamps does Gene have in his collection?The equation 2 (x + 55) = 200 models this situation. which choice shows the sequence of operations needed to solve this problem, using both arithmetic and alegbra? Which battle of the French and Indian war do you believe had the most effective strategy? 5+3=x, what is x? helphelphelp mary has 30 nickels and dimes totaling $2.40. how many of each does she have? Describe the concept of water cycle. Type the correct answer in the box. Express your answer to three significant figures. Calcium nitrate reacts with sodium phosphate to form sodium nitrate and calcium phosphate. Given 96. 1 grams of calcium nitrate, whats the theoretical yield of calcium phosphate? Use the periodic table and the polyatomic ion resource. The mass of calcium phosphate the reaction can produce is grams. -x+2y=8How do I put this into slope-intercept form???If you can please show your work!