Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

WK1 Discussion and Replies

Please see attachment for instructions.

 

 

W1 Discussion Instructions: Where it all Started

 

In 250 word, answer the questions below with 4 evidence base scholarly articles in APA format. 

1. Discuss what you find interesting about the origin of the internet covered in Chapters 7 and 8 of the PDF.

Book: Comer, D. E. (2018). The Internet Book: Everything You Need to Know about Computer Networking and How the Internet Works (Vol. 5th)

2. What do you feel they got right, wrong, and still has room for improvement. 

In 800 word total, replying to the 4 post below. Each reply must be 200 word. 

 

 


Kendrick Post #1

The origin of the internet is really interesting, especially how it changed from a military project into a worldwide communication network. The internet started in the late 1960s with ARPANET, which was a project supported by the U.S. Department of Defense’s Advanced Research Projects Agency (ARPA). ARPANET was created to help researchers share information over long distances and to build a network that could withstand disruptions, like possible attacks during the Cold War. The main goal of decentralization was definitely one of the important things they nailed, since it set up the basis for the strong and reliable global network we have today (Leiner et al., 1997).

But, there were a few mistakes. In the beginning, developers didn’t focus much on security, and this has resulted in ongoing problems such as data breaches, cyberattacks, and the continuous need for improvements in cybersecurity. The initial lack of focus on accessibility really held back how quickly the internet was adopted, particularly for users with disabilities.

There’s definitely still some work to do, especially when it comes to closing the gap in global digital access. Even though billions of people are online, there are still millions who don’t have access to dependable internet connections. It’s super important to expand internet access to areas that don’t have it. This way, everyone can have equal chances in education, jobs, and staying connected. Additionally, better privacy protections and clearer information about how data is collected and used are needed to tackle ongoing worries about user rights and corporate ethics (Cerf, 2009).

The origin of the internet shows how creative humans can be, but its future growth relies on tackling these challenges to build a more inclusive and safe digital world.

References

Cerf, V. G. (2009). Internet Governance Is Our Shared Responsibility. Communications of the ACM, 52(2), 47-49.

Leiner, B. M., et al. (1997). A Brief History of the Internet. Internet Society.

 

 


Jesus Post #2:

 

The internet has changed the world! That is an undeniable statement. When I first learned about the internet, or more precisely, computers, it was in the early 1990s. One of my best friends in high school had one at home that his dad gifted him. It was not connected to the internet, but it was functioning, and he used to play games on it. I fell in love with that magical box. However, as we have learned by now, the internet has been a project longer than I have been alive. In the 1960s, interest from the Department of Defense in computer networks sparked a new project that pushed the imagination of many brilliant scientists and engineers to devise new ways to connect the few computers available at the time (Comer, 2018). By encouraging vendors to use an open standard, DARPA’s project opened the doors for everyone in the world to have an opportunity to be part of the project (Comer, 2018). The TCP/IP language protocols allowed data to traverse multiple networks and ensure the data was received correctly (Comer, 2018).

No one imagined the Internet would be received with such enthusiasm and appreciation worldwide (Comer, 2018). Yes, there are differing views on whether the internet was a good or bad invention, but it can’t be denied that it indeed changed the world. The world became exponentially smaller. Anyone with internet access can now communicate with anyone else around the globe (Aperture, 2019). News travels much faster, in seconds or less, and we can see firsthand events that otherwise would have taken at least a day to reach our eyes (Aperture, 2019). Information, events, education, and any other communication can be shared by anyone and accessed by anyone connected (Aperture, 2019). This is positive and negative, especially now that anyone can post fake news (Aperture, 2019). Not only do the mass media networks share news, but anyone with a smartphone in hand (Aperture, 2019). Now, anyone can say whatever they desire, good or bad, with little precaution. But the internet also connects us to other countries, cultures, and ideas. Anyone can now get an education online (i.e., YouTube, Udemy, AMU, etc. ) or communicate via Facebook or one of the many available apps (TikTok, WhatsApp, etc.). Anyone can trade in the stock market, watch streaming videos, have an e-commerce business, or fight a war, all from the comfort of their desks (Aperture, 2019). I love that anyone can have access to a new world of creativity, learn any task, communicate with anyone in the world in seconds, and share ideas much faster. That has helped the world grow both technologically and as a society. We are no longer a bunch of countries but are becoming one world.

References

Aperture. (2019, February 8). How The Internet Changed Everything. 
YouTube. Retrieved from

Comer, D. E. (2018). 
The Internet Book: Everything You Need to Know about Computer Networking and How the Internet Works (Vol. 5th ).

 




Jennifer Post #3:

 

Hello classmates,

Currently living in San Antonio Texas, my husband and I were station in the UK (for 4 years) before arriving to Texas. I was born and raised in North Carolina, and I miss the 4 seasons, the beaches, and mountains all within a few hours away. My hobbies include, hiking, fishing, working out, and traveling. I really love the outdoors, which I feel like I have missed out living in Texas. My husband is an active Air Force member with 7 years left till retirement. We have one year, and two months left in San Antonio, and we hope to move back to the east coast (hopefully NC).

I’m a GS employee of the USAF working in communications security (COMSEC) for Joint Base San Antonio-Lackland Wing Cybersecurity section. As a GS employee I decided to utilize the tuition assistance program and further my education, in the Master’s program: Information Technology, with a concentration in Information Assurance and Security. With constantly moving I would like to stay competitive, and to become more knowledgeable in my career field. In completing this course, I hope to gain more up-to-date knowledge on computer networks and data systems, as I’m sure it has changed since I last worked in networking. Working in COMSEC sometimes feels far from an IT position at times, as we do a lot of administrative work in safeguarding. It has its ups and downs; sometimes we are super busy, and after inspections we can finally relax and catch up on other office matters.


Joshua Post #4:

 

Good morning. I am currently a signal warrant officer in the United States Army. I have been in the army for 15 years now and plan on making it a career. I am currently stationed in Augusta, GA, and luckily was born and raised here. I’ve had the opportunity to be stationed at several duty stations including Arizona, South Korea, Hawaii, and Texas.

I have completed the first two classes of my master’s program so far and I’m trying to obtain my master’s in information technology. Some of my hobbies are basketball, video games, anime, motorcycles, and cooking. I’m a family man and I love spending time with my family whenever I can. I have a beautiful wife, five kids, and two dogs. We love to go on carnival cruises and fishing. I love technology and I work with it every day doing my job.

My job title is Senior Network Technician in a Cyber unit. I work with building and fixing networks. I also advise teams and partners on proper ways to protect and utilize their equipment. This helps others with troubleshooting networking issues when they need help so my team can collect and process data that is collected. I hope to gain more knowledge about computer networks and data systems. Maybe some things to refine the knowledge I have to get me closer to obtaining more certifications. After completing my degree, I hope to advance my career in the Army before I retire.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

SQL 11 Help

Statements query You are required to complete the exercises 1-15 from Chapter 18. Save the script from #2 as CIS276DA_Lesson11Exercise2_JAM2334209.sql Save the script from #5 as CIS276DA_Lesson11Exercise5_ JAM2334209.sql Save the output from #5 as CIS276DA_Lesson11Exercise5_ JAM2334209.csv Save the script from #6 as CIS276DA_Lesson11Exercise6_ JAM2334209.sql Save the output from #6 as

SQL 12 Help

statement query You are required to complete Exercises 1 through 7 from Chapter 19. For each exercise, you need to submit specific files. Here’s what you need to do: Exercise 1: Submit the backup script file as CIS276DA_Lesson12Backup_JAM2334209. Exercise 4: Submit the SQL file as CIS276DA_Lesson12Exercise4_ JAM2334209.sql and the CSV

MOvie Project stage one

Follow the attach instructions to complete this work.  Note: Make sure it aligns with the attach Rubric. A project to do on Movie Instructions For the Final Project, you will select at least one film that represents your career or career goals.  For example, if you are working toward a cybersecurity

New website issue in the referral redemption section.

Hi, I need help. I created a new website and added a referral earning option, but it’s not working. When a new user creates an account using a referral code, the account is created, but the referral is not recorded for either the referrer or the new user. Sometimes, it

Project 2 of CSIA

follow the attach document to complete this work.  Please note: Make sure it aligns with the attach rubric. Project 2: Compare / Contrast Two State Government IT Security Policies For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security

Project 1 of CSIA

Follow the attach instructions to complete this work. Please make sure it aligns with the rubric. Project 1: Cybersecurity for OPEN Data Scenario: A federal agency has asked your cybersecurity consulting firm to provide a research report examining Open Data services’ usefulness and security issues. The report is intended for

Computer Crime and Digital Evidence

Module Code: UFCFP4-30-1 Student id-24059073 Date: March 2025 Module Details · Module Name: Computer Crime and Digital Evidence · Module Code: UFCFP4-30-1 Section 1: Overview of Assessment Students are entrusted with performing comprehensive evaluations of forensic tools, applying them in practical scenarios, and meticulously documenting their observations. The key emphasis

What is Backlink SEO?

   Backlink SEO refers to the process of acquiring high-quality backlinks to improve a website’s search engine rankings. Backlinks act as votes of confidence from other websites, signaling to search engines like Google that your site is valuable and trustworthy. The more authoritative backlinks you have, the higher your chances

SQL 10 help

SQL statements In this project, you will create a Node.js application that interacts with a MySQL database. You’ll practice executing various types of queries, such as INSERT, SELECT, UPDATE, and DELETE, to manage employee records in the database. Instructions: Setup: Make sure you have Node.js and MySQL installed on your

PHISHING EMAIL

From: Bannffield Pet Hospital ( [email protected]) To: Optimumm Wellness Plan Members Subject: CANCELLATION OF OPTIMUMM WELLNESS PLAN SUSPENSION OF Optimumm Wellness Plan (OWP) Dear Customer We are writing to inform you that the payment information for your pet’s Optimumm Wellness Plan (OWP) was unable to be processed. In order to

SQL3 Help

SQL statements help You are required to complete exercises 8, 9, 10, and 11 from Chapter 3. For each exercise, you need to create SQL statements and related CSV files. Here’s what you need to do: · Exercise 8: Write your SQL statement in a file named CIS276DA_Lesson3Exercise8_ JAM2334209.sql. Run

SQL 9 Help

Help statements Complete Exercises 1, 2, and 5 from Chapter 11. Complete Exercises 1, 2, 3, and 5 from Chapter 12. Write your script in a file named CIS276DA_Lesson9Chapter#Exercise#_JAM2334209.sql. Run the script and export the results to CIS276DA_Lesson9Chapter#Exercise#_JAM2334209.csv.

D 7 of 459

Follow the attach document to complete this work. Questions: 1. What is Generative AI and how is it similar/different to Traditional AI? 2. Do you believe that work created by Generative AI (e.g. ChatGPT) is comparable in quality to human created content?  What challenges and opportunities does Generative AI pose to

D 6 of 459

Follow the attach document to complete this work. Questions: 1. How is technology increasingly used in healthcare beyond electronic health records (HER)?  Give some examples. 2. Would you personally participate in robot assisted/telesurgery as a patient or a medical professional?  Why or why not? Resources 20 Examples Of IoT Wearables

D 5 of 459

Follow the attach document to complete this work. Questions: 1. What are service robots and how are they used and categorized?  Give examples of each. 2. How would you leverage service robots to improve the availability, confidentiality, and integrity of a large (20MW+) data center? Resources Robots as a Platform

D 4 of 459

Follow the attach instruction to complete the work. Questions: 1.  What are Smart Cities and how do they benefit citizens and the environment?  2.  Provide an example of the “Smartest” city you have ever visited and what are some of the potential cyber risks the citizens are compelled to take

Wk4_300

Need help with a question. Due 3/10/2025 @ 9PM n the Week 4 labs, you performed tasks such as creating a cluster, restoring files, configuring account lockout policies, and verifying RAM usage.  Note: Ensure you have completed all lab exercises from Week 4 before completing this assessment. Assessment Details Write a 350-

Event Khusus dan Promosi di Witching Pot

“Saya sangat puas dengan pengalaman taruhan di situs ini. Setiap elemen, dari navigasi hingga pembayaran, berjalan dengan mulus. Ini menunjukkan profesionalisme dan kualitas layanan mereka. Saya pasti akan kembali lagi!”