ARPANET is built using which protocol ?

1 Answer

Answer :

Arpanet is created using Internet Protocol .

Related questions

Description : What is Arpanet ?

Last Answer : I am the wrong person, so it is better to know the right time. The United States Department of Defense launched the Advance Research Project Agency Network (ARPANET) in 1989 . This is the first human step in the world of computer networks.

Description : When was Arpanet born ?

Last Answer : ARPANET was born in 1989.

Description : Who launches ARPANET ?

Last Answer : US Department of Defense launches ARPANET .

Description : When is TCP / IP launched in ARPANET ?

Last Answer : TCP / IP was introduced in ARPANET in 1983

Description : When is ARPANET closed ?

Last Answer : ARPANET closed in 1990.

Description : What is Protocol ?

Last Answer : The protocol is a network of computers that follow a set of rules for exchanging data.

Description : In what decade did Internet Protocol come into use ?

Last Answer : answer:

Description : What are the functions of protocol in data communication ?

Last Answer : The rules for exchanging data or information that actually exist in the form of software are called protocols. Communication software or protocols perform the following tasks in order to transmit data ... The components of a data transcript system are modem , transmitter , switch , receiver etc.

Description : Who was the first to introduce Internet Protocol ?

Last Answer : Raymond Samuel Tomlinson was the first to give the idea of ​​Internet Protocol.

Description : In what decade did Internet Protocol come into use ?

Last Answer : Internet Protocol was first used in the sixties and seventies.

Description : In what year was the Tcp / IP protocol invented ?

Last Answer : Tcp / IP protocol was invented - 1972.

Description : In what year was the Difference Engine and Analytical Engine built ?

Last Answer : 1991 Difference engine and Analytical engine are made.

Description : Which virus was first detected in ARPANET / ARPANET , the pioneer of Internet in the early 1970's ?

Last Answer : The first Creeper virus was first identified in the early 1970 's in the Internet pioneer ARPANET / ARPANET.

Description : What is the use of Arpanet ?

Last Answer : Internet Protocol.

Last Answer : ARPANET - Advanced Research Project Agency Network

Last Answer : Advanced Research Project Agency Network.

Last Answer : In 1990 Arpanet Off Is.

Description : What are the difference between Arpanet and internet?

Last Answer : ARPANET is the computer network developed by the U.S. Department of Defense in 1969 from which the Internetoriginated.

Description : What is the full form of arpanet?

Last Answer : ARPANET in full is Advanced Research Projects AgencyNetwork.

Description : What is the full form of arpanet?

Last Answer : ARPANET in full is Advanced Research Projects AgencyNetwork.

Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers

Last Answer : IMPs

Description : The first Network was called ________ a) CNNET b) NSFNET c) ASAPNET d) ARPANET

Last Answer : d) ARPANET

Description : ARPANET stands for: a) American Research Project Agency Network b) Advanced Research Project Agency Network c) Admissible Research Project Agency Networking d) None of Thesse

Last Answer : b) Advanced Research Project Agency Network

Description : The original ______grew into the internet: a) CASDER b) ARPANET c) INFANET d) None of These

Last Answer : b) ARPANET

Description : Internet's Initial development was supported by: a) ARPANET b) IBM c) Microsoft d) None of These

Last Answer : a) ARPANET

Description : This is a global collection of high-powered computer that are connected together with cables, telephone lines, microwave dishes, satellites etc. A) Arpanet B) Internet C) Network

Last Answer : B) Internet

Description : What is it called to control office activities using ICT ?

Last Answer : Using ICT to control office activities is called e-governance.

Description : As a result of using information technology, an employee becomes much more efficient in his work '- Explain the statement. ?

Last Answer : As a result of the huge development of information and communication technology, different types of changes have taken place at different levels of society. Early on, it was thought that automation and ... worker much more efficient. As a result, many organizations can do more work with less staff.

Description : How many students take admission test in National University using internet ?

Last Answer : About four lakh students take admission test in National University using internet .

Description : What are the reasons for using Elements ?

Last Answer : Elements are the basic elements of HTML that describe every part of the HTML page In HTML , any beginning and end tag and the middle part are called elements. Some tags do not have any elements, such as , etc.

Description : Explain the mystery of the life of jute using any technology ?

Last Answer : The secret of jute life has been revealed through genetic engineering technology. Our country's scientist. Maksudul Alam has revealed the secret of Jute's life. Genetic engineering is the ability ... , genetic engineering is the technique of creating new chromosomes by replacing new DNA with DNA .

Description : What are the benefits of using Star Topology ?

Last Answer : This type of network connects all computers to each other through a central device hub / switch. As a result, information can be exchanged at a specific computer address through a central device. If a ... different types of cables such as co-axial or fiber optic cable can be used in this network.

Description : Write using a hybrid computer ?

Last Answer : Use of Hybrid Computer: Various complex and difficult scientific and technical problems can be solved very easily and quickly through this computer. It is used in laboratories to determine the ... digital part. The digital part reveals the patient's condition based on the information obtained.

Description : What are the benefits of using e-book ?

Last Answer : It is possible to get instant information through e-book download. Practically no library room is required to store ebooks. E-books can be easily stored on a computer or reading device. E-books ... and marketable. E-books can be printed on demand as they are printable, which saves money.

Description : Who proposes data management using HTTP ?

Last Answer : Tim Barnes Ltd. offers data management using HTTP.

Description : What are the disadvantages of using a credit card ?

Last Answer : : Credit card numbers are currently being cracked excessively. If anyone knows your credit card number, you will be able to withdraw money without any need for a card. This is one of the disadvantages.

Last Answer : The benefits of using ICT are: - Collecting , exchanging , disseminating and using information.

Description : What is the Kyoto Protocol? (1) It is an agreement among countries to take steps for reducing acid rain (2) It is an agreement among countries to take steps for planting trees to control ... using nu-clear energy (4) It is an agreement among countries to take steps for reducing global warming

Last Answer : (4) It is an agreement among countries to take steps for reducing global warming Explanation: The Kyoto Protocol is an international treaty, which extends the 1992 United Nations Framework Convention on ... premise that (1) global warming exists and (2) man-made CO2 emissions have caused it.

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : the maximum window size for data transmission using the selective reject protocol with n-bit frame sequence numbers is: a. 2^n b. 2^(n-1) c. 2^n – 1 d. 2^(n-2)

Last Answer : b. 2^(n-1)

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys

Last Answer : c. his private key using his signature hardware  

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system