A huge variety of networking hardware and software appeared. One challenge was to enable these different networks to communicate with each other. ARPA accomplished this by developing the ________, which created a true “network of networks,” the current architecture of the Internet.

a. Web Protocol (WP)
b. ARPA Protocol (AP)
c. Internet Protocol (IP)
d. Newrok Protocol (NP)

c. Internet Protocol (IP)

Computer Science & Information Technology

You might also like to view...

Which of the following connectors is commonly used with two-pair UTP cable?

A. RJ-11 B. RJ-14 C. RJ-21 D. RJ-45

Computer Science & Information Technology

An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?

A. Integer overflow attack B. Smurf attack C. Replay attack D. Buffer overflow attack E. Cross-site scripting attack

Computer Science & Information Technology