wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERNET

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
49 Reads

1. The internet is the worldwide system of interrelated computer network.

2.These interconnected computer network uses the Internet protocol suite to link several different devices worldwide.

3. It is a network of network that includes of private, public, business and government network,which is connected by a wide collection of electronic, wired, wireless and optical networking methods.

4. The Internet has no Central control in both technological implementation or policies for internet access and it's usage.

5. Each network sets has it's own policies. Internet works and operates without a central governing body.

6. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, and file sharing.

7. The most prominent component of the Internet model is the Internet Protocol (IP). IP enables internetworking and, in essence, establishes the Internet itself. 

8. ARPANENT, the U.S government decided to make a network of computers that can allow communication among government agency and educational centers.

9. In addition to the ARPANENT, other countries also Started to develop their own personal computer network which rapidly connected up to ARPANENT.

10. Connecting all this network together would help to develop a global internetwork . Later the ARPANENT was known has the Internet.

11. The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers


Comments ()


Sign in

Read Next

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Routers

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Mesh Topology

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

What is service level Agreement?

Blog banner

Jio .....A Revolution ?? ??

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Os(Computer security threats)

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Ubiquitous Computing

Blog banner

Information Technology In E- Commerce

Blog banner

From Model Mistakes to Metrics

Blog banner

Have You Explored India Yet?

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

PERT Overview

Blog banner

Phishing

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

MySQL

Blog banner

Deadlock Prevention

Blog banner

Blog on Smartsheet.

Blog banner

Elements and Principles of Photography

Blog banner

indian premier league

Blog banner

What is a Malware ?

Blog banner

Security and E-mail

Blog banner

Install Ubuntu in Vmware

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Zero-Day Attack

Blog banner

Real Time Scheduling

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Modern Operating System

Blog banner

Modern Operating System

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Memory Management

Blog banner

Microsoft Windows Overview

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

What is a Dumpster Diving Attack?

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Biometric Authentication Vulnerabilities

Blog banner