You are on page 1of 3

Assignment: Internet and Networks

Brooke Tetrick
1


1. Internet Technologies
The evolution of Internet has changed the world completely and continues to
advance as time progresses. The timeline begins in 1962, before the term internet was
ever said nor thought of. At this period of time, there were around 10,000 computers
which were primitive, yet extremely expensive costing thousands of dollars. With these
prehistoric computers came a few thousand word of magnetic core memory. With this,
programming was extremely difficult. In the beginning of this historic timeline,
Advanced Research Project Agency (ARPA) created the Advanced Research Project
Agency Network (ARPANET) which was the worlds first operational packaging
switching networks. This network was created to implement networking protocols and
also known as the progenitor of what was to become the global internet.
2. MindTap vs. Internet Article 1
The article that is in MidTap compared to the Internet Article differs not because
of the information that is given, but because the Internet Article is briefer compared to
MindTap. Both of these articles agree with each other, although MindTap goes into more
detail when explaining the creation and advancement in the World Wide Web and how it
was brought to light. The one fact that I did uncover in the Internet article was that today,
almost one third of the worlds 6.8 billion people use the Internet regularly. Comparing
MidTap to the web article, MidTap does an excellent job of going over every aspect of
history. Additional facts given in MidTap include that is in 1957 most large mainframe
computers accessed from within an organization through a network of terminals. Also in
that same year, the Soviet Union surprised the world by launching Sputnik, the first and
only artificial earth satellite. The United States took the launch of the satellite as not only
a threat, but a challenge. Several years later in 1969, ARPA commissioned ARPANET
for research into networking. The historical perspective provides a better understanding
of todays emerging technology because with this comes with a lesson learned; therefore,
when looking at when it comes to Internet history many people had to fail in order to get
Assignment: Internet and Networks
Brooke Tetrick
2

to where the world is today. Without people trying and failing, the world may not have
the things we all have today. In some sense, it is okay to fail, but not okay to stop trying.
3. Spying on Verizon Customers: Wheres the outrage?
Currently what has come to light these past couple years is the federal
government spying on consumers that have Verizon. Instead of the consumers being
outraged, no one is really saying anything about their privacy being violated. Consumers
in the digital age have no reason to believe their electronic communications are off-limits
to government and private-sector entities, which is completely wrong. Rebecca Herold
states Whenever you have all these bits and bytes floating about, its very easy for others
to get a hold of it. She also said it is becoming very easy for a lot of people to access
each others data.
4. MindTap vs. Internet Article 2
Just like I completed Step 2 in this assignment, MindTap once again goes much
more in depth with the specific topic of communication compared to the Internet Article I
used. It is different because the Internet Article talks more about privacy rather than
communication where as MindTap goes over what types of communication the world has
and how it has evolved. For example, Bluetooth has come an incredibly long way in
advancing to where it is now. Bluetooth allows one to enable a wide assortment of digital
devices to communicate directly with each other wirelessly over short distances.
Bluetooth is most commonly used to wirelessly connect keywords and mice to the
desktop or laptop. In MindTap, it also goes over the essential information regarding the
Bluetooth and the true history behind the device. The two articles agree with eachother
when they talk about hackers. MidTap states in 5-3.4 that hackers have been known to
use Bluetooth to gain access to devices. A number of cell phone viruses have spread
through Bluetooth. The historical perspective provides a better understanding of todays
emerging technology because the more we are hacked and spied on, the more we all learn
from it. In the Internet Article some say the consumers should be outraged, but with this
comes a rise of anger and the consumers that are being spied on will get fed up and revolt
against the people doing it so they have no other choice, but to stop.

Assignment: Internet and Networks
Brooke Tetrick
3

You might also like