wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERNET

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
49 Reads

1. The internet is the worldwide system of interrelated computer network.

2.These interconnected computer network uses the Internet protocol suite to link several different devices worldwide.

3. It is a network of network that includes of private, public, business and government network,which is connected by a wide collection of electronic, wired, wireless and optical networking methods.

4. The Internet has no Central control in both technological implementation or policies for internet access and it's usage.

5. Each network sets has it's own policies. Internet works and operates without a central governing body.

6. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, and file sharing.

7. The most prominent component of the Internet model is the Internet Protocol (IP). IP enables internetworking and, in essence, establishes the Internet itself. 

8. ARPANENT, the U.S government decided to make a network of computers that can allow communication among government agency and educational centers.

9. In addition to the ARPANENT, other countries also Started to develop their own personal computer network which rapidly connected up to ARPANENT.

10. Connecting all this network together would help to develop a global internetwork . Later the ARPANENT was known has the Internet.

11. The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers


Comments ()


Sign in

Read Next

Hacking Mobile Platforms

Blog banner

How to make Pancakes

Blog banner

Memory Management

Blog banner

?What Children Learn Between Activities: The Hidden Learning Moments in a Preschool Day

Blog banner

Emerging threats in cyber Forensics

Blog banner

Memory Management

Blog banner

KAHAWA TEA

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Crypto tax evasion

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

How to Grow Your Brand on YouTube Without a Big Budget

Blog banner

Deadlock and starvation in operating system

Blog banner

Dudhasagar waterfall ?

Blog banner

Interrupts in operating system.

Blog banner

Evolution of Operating Sytems

Blog banner

Memory hierarchy

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

RAID

Blog banner

MYNTRA

Blog banner

Cache memory

Blog banner

Assignment-3

Blog banner

Deadlock and Starvation

Blog banner

semaphores

Blog banner

TAILS OS

Blog banner

An Overivew Of Cache Memory

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Consumer to consumer Business model

Blog banner

File management

Blog banner

Uniprocessor scheduling

Blog banner

Data Analytics in Data Science

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Deadlock

Blog banner

Penetration Testing

Blog banner

TRELLO

Blog banner

What your Favorite colour says about You?

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

SQL Injection practice on DVWA

Blog banner

Self defence

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner