During which phase of the development of the internet was the domain name system (dns) introduced?

Answers

Answer 1

Institutional phase of the development of the internet was the domain name system (DNS) introduced.  Thus, option B is correct.

What is a domain name system?

Web addresses are converted to email accounts via the Domain Name System (DNS), what computers utilize to view online articles.

In the institutional phase of the development, the major changes are happening in this the DNS or the domain name system is being introduced which helps in connecting the internet address to the IP of the customer or the person who is being accounted for. Therefore, option B is the correct option.

Learn more about the domain name system, here:

https://brainly.com/question/28145453

#SPJ1

The question is incomplete, the complete question will be:

A) Commercialization phase

B) Institutional phase

C) Innovation phase

D) Consolidation phase


Related Questions

you're installing network wiring for a new ethernet network at your company's main office building. the project specifications call for cat 5e utp network cabling and rj45 wall jacks. near the end of the project, you run out of wire before the last few runs are complete. you have a spool of cat 3 network cable in storage. upon closer inspection, it appears very similar to the cat 5e wiring. to finish the project, should you use the cat 3 cabling as a substitute for the cat 5e cabling? no. cat 5e cabling has more twists per inch than cat 3 cabling, reducing crosstalk and supporting higher data rates. no. the sheath surrounding cat 5e cabling is much thicker than the cat 3 sheath, creating an extra layer of shielding that reduces crosstalk and supports higher data rates. yes. you can use cat 3 cabling as a substitute for cat 5e cabling since they're electrically identical. no. cat 5e cabling uses a thicker copper wire than cat 3 cabling, enabling higher data transmission rates.

Answers

In order to finish this project, I would say: A. No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing crosstalk and supporting higher data rates.

What is a cable?

A cable can be defined as a type of wired connector which are either made of glass or copper and used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.

The types of twisted-pair cables.

In Computer networking, there are different types of twisted-pair cables and these include the following:

Cat 3Cat 5eCat 6 (Class E)Cat 6a (Class EA)Cat 7 (Class F)

In order to finish this project, I would say that the Cat 3 cabling shouldn't be used as a substitute for the cat 5e cabling because Cat 5e cabling has more twists per inch.

Read more on Cat 5e cables here: https://brainly.com/question/28402675

#SPJ1

cable operators and technicians hold onto their edge over digital subscriber line (dsl) and telco services with

Answers

Cable operators and technicians hold onto their edge over digital subscriber line (dsl) and telco services with professional installations and customer follow-up as DSL installations are performed by the customer.

Any individual or group that offers cable service over a cable system and directly or indirectly, through one or more affiliates, owns a sizable portion of that cable system, or who otherwise controls or is in charge of, through any arrangement, the management and operation of such a cable, is referred to as a cable operator.

Using its HFC network in Karachi and Lahore, Worldcall (Pvt) Ltd is the leading provider of cable modem broadband in Pakistan. Another HFC service provider in the nation is Wateen Telecom.

They were also subject to fees from the networks. Thus, the cable networks primarily make money from two sources: subscription fees they collect and advertising, which includes promoting and publicising goods like clothing, jewellery, etc.

Learn more about cable:

https://brainly.com/question/22076572

#SPJ4

A computer that is part of the workgroup can exist on the same network but is not authorized to access the domain resources. True or false?.

Answers

Answer:

True.

Explanation:

Which statement best describes the type of computer found in everyday
appliances?
A. They can be programmed with many applications to perform
varied functions.
B. They are interchangeable with desktop computers, smartphones,
or tablet computers.
C. They are housed in their own cases and paired with monitors,
keyboards, and mice.
D. They can manipulate information and are able to store, retrieve,
and process it.

Answers

A statement which best describes the type of computer found in everyday appliances is that: D. They can manipulate information and are able to store, retrieve, and process it.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouseHard-disk drive

Generally, a computer is a type of sophisticated electronic device that can be to store, retrieve, and process data into an output (information) that is meaningful and useful.

In conclusion, we can reasonably infer and logically deduce that a statement which best describes the type of computer found in everyday appliances is that they can manipulate information and are able to store, retrieve, and process it.

Read more on computers here: brainly.com/question/14614871

#SPJ1

Answer:

They can manipulate information and are able to store, retrieve, and process it.

1.3.2

Explanation:

_________ architecture refers to the structure of web applications that are built with three main layers

Answers

Three-tier architecture refers to the structure of web applications that are built with three main layers.

Three-tier architecture can be described as a program that establishes a link between the public and server as it segregates the software into three layers named the presentation tier, the logic tier, and the data tier.

The presentation tier is concerned with the client as it sends contents to the client's browser and hence serves as a means for the interaction between the user and the web application.

The logic tier is the part that includes the server program that receives the information from the presentation tier and then processes the collected information.

The data tier provides support and security to the application and is the part that stores the processed data.

In this type of architecture program, each tier can be managed independently by a different squad of people and changes can be made to any tier without altering the rest of the tiers.

To learn more about three-tier architecture, click here:

https://brainly.com/question/13090960

#SPJ4

Answer:  Multi-tiered

Identify the network and the host address in the ip address of 10.30.40.50 with a subnet mask of 255.0.0.0

Answers

An IP address of 10.30.40.50 with a subnet mask of 255.0.0.0 can be broken down as follows:

The network address is 10.0.0.0

The host address is 30.40.50

To find the network address, we need to AND the IP address with the subnet mask. This gives us the following:

10.30.40.50 AND 255.0.0.0 = 10.0.0.0

To find the host address, we need to AND the IP address with the inverse of the subnet mask. This gives us the following:

10.30.40.50 AND 0.255.255.255 = 30.40.50

Or taking a more theoretical approach;

The network and host address in the ip address of 10.30.40.50 with a subnet mask of 255.0.0.0, here's a quick tutorial.

To identify the network address, you'll need to look at the first octet of the IP address and the subnet mask. In this case, the first octet of the IP address is 10, and the first octet of the subnet mask is 255. This means that the network address is 10.0.0.0.

To identify the host address, you'll need to look at the last three octets of the IP address. In this case, the last three octets of the IP address are 30.40.50. This means that the host address is 30.40.50.

Learn more on network address here:

https://brainly.com/question/6888116

#SPJ4

Because rdram could be used only with intel components, amd and many major system and memory makers threw their support behind an alternative to rdram called?

Answers

Because rdram could be used only with intel components, amd and many major system and memory makers threw their support behind an alternative to rdram called doubling data rate SDRAM (DDR SDRAM).

The memory subsystem known as Rambus Dynamic Random Access Memory (RDRAM) is made to transfer data more quickly. RDAM consists of a bus path that connects RAM to microprocessors and other PC components, a RAM controller, and random access memory (RAM).

Because Intel was so confident in it, the 850 chipset-based Pentium 4's initial platform only supported RDRAM. What went wrong, then? High latency, greater heat, and a more expensive price tag were a few problems that the technology was unable to solve.

Rambus created many synchronous dynamic random-access memory (SDRAM) varieties from the 1990s to the early 2000s, including Rambus DRAM (RDRAM), Concurrent Rambus DRAM (CRDRAM), and Direct Rambus DRAM (DRDRAM).

Learn more about rdram:

https://brainly.com/question/13748829

#SPJ4

String instruments excel at performing smoothly, connected notes, which is called? a. legato. b. tremelo. c. pizzicato. d. staccato.

Answers

String instruments excel at performing smoothly, connected notes, which is called option a. legato.

What is a legato?

Legato is known to be a kind of a musical performance method that is known to make or create  fluid, continuous motion that often exit between notes.

Note that all of the individual note is said to be played to its highest duration and then it often mix up directly into any of the note that follows.

Therefore, based on the above, String instruments excel at performing smoothly, connected notes, which is called option a. legato.

Learn more about String instruments from

https://brainly.com/question/26557019

#SPJ1

What would happen if a program tried to access a variable that was defined locally in another part of the program?.

Answers

The thing that would  happen if a program tried to access a variable that was defined locally in another part of the program is that said project would fail or will not succeed.

What are variables and how are they important for a program?

Variables are known to be tools that are used to save information that will be referenced as well as be altered in a computer program.

Note that they also give a method that one can make use of in labeling data with a form of descriptive name, so our programs can be known well and more clearly by the reader.

Therefore, The thing that would  happen if a program tried to access a variable that was defined locally in another part of the program is that said project would fail or will not succeed

Learn more about computer variable from

https://brainly.com/question/27975087

#SPJ1

Name the piece of hardware found in a tablet computer that is both an input and output device.

answer and i will mark u as brainliest

Answers

Answer:

The screen is both an input and output device.

Explanation:

A service that lets you store data in a remote location over the internet is called.

Answers

A service that lets you store data in a remote location over the internet is called cloud storage

Cloud storage refers to the provision of various services via the Internet. Software, networking, databases, servers, and data storage are examples of these resources.

Instead of storing files on a local device or hard drive device, cloud-based storage allows them to be saved to a remote location.  So  long as an electronic device has internet access, it has access to data and the software programs needed to run it.

Cloud storage is becoming increasingly popular among individuals and businesses for a variety of reasons, including security, cost savings, increased efficiency, speed and productivity.

To learn more on cloud storage: brainly.com/question/17371158

#SPJ4

A named constant is like a variable, but it its content cannot be changed while the program is running. true false

Answers

A named constant is like a variable, but it its content cannot be changed while the program is running is a true statement.

What is a constant in programming?

Data values are known to be component that often stay the same at all time if a  program is to be executed and they are known to be called constants.

Note that Constants are not expected to be altered. Literal constants are seen as real values that are known to be fixed into the source code.

Therefore, A named constant is like a variable, but it its content cannot be changed while the program is running is a true statement.

Learn more about named constant from

https://brainly.com/question/13034246

#SPJ1

you are assembling components in a network rack and need a device that connects three network segments. which of the following devices will meet your networking needs?

Answers

Answer:Ethernet router

Explanation: An Ethernet router is a device that connects two or more network segments or subnets. This would meet your networking needs.

The ___of a process contains temporary data such s functon parameters, return addresses, and local variables.

Answers

The stack of a process contains temporary data such as function parameters, return addresses, and local variables.

Stack is the tool that uses the phenomena of Last In First Out(LIFO) to temporarily store the data for the time being. The stack pointer specifies the last inserted data so that it can be removed first when new data is being entered. The size of the stack is generally changeable.

There are two types of stacks called register stacks and memory stacks. The register stacks can only be used to store limited data while memory stacks have the ability to store a vast amount of data and local variables.

The stack process usually involves two steps, the first is known as push in which the temporary data is allocated at the position directed by the stack pointer depending on the size of the data, The second step is pull in which the last entered data is removed from the allotted location.

To learn more about stack, click here:

https://brainly.com/question/13152669

#SPJ4

you have received a text encoded with morse code and want to decode it. input: your program should read lines from standard input. each line contains a morse code message. each letter in the code is separated by a space char, each word is separated by 2 space chars. the output will contain encoded letters and numbers only. output: print out the decoded words.

Answers

The program that decodes the code that comes in morse code is given below:

The Code

package com.codeeval.easy;

import java.io.BufferedReader;

import java.io.File;

import java.io.FileReader;

import java.io.IOException;

import java.util.HashMap;

import java.util.Map;

public class MorseCode {

*The complete code is attached as a file

Read more about programming here:

https://brainly.com/question/23275071
#SPJ1

The number ____ is the standard dots per inch used for blogs, social media, webpages, and emails.

Fill in the blank

Answers

The number 72 dpi is the standard dots per inch used for blogs, social media, webpages, and emails.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture) or on a display monitor.

In Computer technology, resolution is typically expressed as a function of the number of pixels on both the horizontal axis and vertical axis. This ultimately implies that, the resolution of an image (picture) determines its quality and sharpness.

For any print project, the preferred resolution is typically 300 dpi, while the optimum resolution for social media, blogs, webpages, and emails is typically 72 dpi.

Note: dpi is an abbreviation for dots per inch.

Read more on resolution here: brainly.com/question/28182244

#SPJ1

The default section of a switch statement performs a similar task similar to the __________ portion of an if/else if statement.

Answers

The default section of a switch statement performs a similar task similar to the option c. trailing else portion of an if/else if statement.

What is a Switch statement?

In regards to computer programming languages, a switch statement is known to be a kind of a type of selection control method that is often used to give room for the value of a variable or expression to be altered to the control flow of program execution through the use of search and map.

Therefore, The default section of a switch statement performs a similar task similar to the option c. trailing else portion of an if/else if statement.

Learn more about switch statement from

https://brainly.com/question/20228453

#SPJ1

The default section of a switch statement performs a similar task similar to the

__________ portion of an if/else if statement.

a. conditional

b. break

c. trailing else

d. All of these

e. None of these

Question: which networking functions occur at the network layer of the osi model?

Answers

Answer: Packetizing, Routing, Forwarding, Flow Control, and Congestion control.

Explanation:
Packetizing is where a routing device takes the information from the upper layer and creates the packets to send over to the correct format for layer 2 transmission.

Routing is telling the information where to travel on the network in the packet form, with the least expensive route for the traversal.

Forwarding is intrinsically linked to routing, meaning it basically has the same function to pass data to the correct destination on the network.

Flow Control is done here too where two routing devices will negotiate the transfer speed of the data.

Congestion Control is also done here where the router attempts to prevent huge overflow of datagrams being handled.

It is also possible for error control to be implemented here, but that is more likely to be implemented in layer 2 since data can be broken up into multiple packets in layer 3.

Cheers.

In which disclosure paradigm will disclosure potentially provide little advantage to either the attacker or defender?

Answers

The military is a setting where the disclosure paradigm may offer minimal benefit to either the attacker or the defender.

According to the "disclosure paradigm," the more information a corporation provides about its operations, the better off we are.

The act of disclosure is the public disclosure of facts or information. What is meant by adequate disclosure for firms is making the relevant information public to customers, investors, and everyone else involved in the company's operation.

The public's crisis of confidence in the business sector is centered on disclosures. They ought to be seen as a crucial and educational component of doing business with or investing in a firm.

Learn more about disclosure paradigm https://brainly.com/question/28139061?

#SPJ4

If 123.35.30.2 is a classful internet protocol (ip) address, what class is it in?

Answers

If 123.35.30.2 is a classful internet protocol (IP) address, the class which it is in is: Class A.

What is IP address?

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

Classes of IP address.

In Computer networking, there are different classes of Internet protocol (IP) address and these include the following:

Class A: 0 - 127Class B: 128 - 191Class C: 192 - 223Class DClass E

In this context, we can reasonably infer and logically deduce that the class which 123.35.30.2 is in is Class A.

Read more on IP address and Classes here: https://brainly.com/question/28392479

#SPJ1

What is the state of data that is sitting in ram ready to be read, updated, or processed?

Answers

Answer: Data stored in RAM is considered volatile and can be read from or written to (updated); however, it has no permanence. Can be considered data in transit.

Explanation:
Not really sure why your answers are limited here, but an argument can be made for all three; however, processed can be inclusive of both read and updated. I’ll expand a bit below.

RAM stands for Random Access Memory and it is used by your system to store information for a running application or process necessary to allow that process to run. This memory is read by that application and updated by that application to allow a quick access by the operating system for the processor when needed faster than reading from your HDD or SSD and then writing back to that long term storage. In this way, RAM allows the appearance of a faster system. RAM can be consider data in transit since it’s always being updated and read by the application or operating system.

An internal corporate-wide area network that uses internet technology to connect computers and link employees in many locations and with different types of computers is known as what?.

Answers

An internal corporate-wide area network that uses internet technology to connect computers and link employees in many locations and with different types of computers is known as the intranet.

An intranet is a computer network that shares information, services, and systems within an organization. Intranet utilizes familiar internet protocols so HTTP web services, email, and file transferring can be found there. It can also be considered as a private extension of the internet limited to only a single organization.

Intranets are generally controlled by the communications, HR, or IT departments of the institution.

There are many benefits of intranets, as collaboration is enhanced because the intranet makes data accessible throughout the organization allowing for easier teamwork. In addition to this, it also saves costs as all the information needed for employee manuals, requisition forms and more can be accessed electronically through the intranet. This saves the costs on the likes of printing and distribution.

To learn more about intranets, click here:

https://brainly.com/question/13139335

#SPJ4

you're working with an existing fiber optic installation in your building. you want to know the length of each cable that runs through the walls. which tool should you use? toner probe otdr multimeter smartjack

Answers

Since a person is working with an existing fiber optic installation the tool that one need to or should  use is OTDR.

What is an OTDR used for?

The term OTDR is known to be a type of  fiber optic instrument that is said to be used in the function of  characterizing, troubleshooting as well as the keeping or maintenance of optical telecommunication networks.

Note that OTDR testing is carried out by transmitting as well as examining pulsed laser light traveling via an optical fiber.

Hence, Since a person is working with an existing fiber optic installation the tool that one need to or should  use is OTDR.

Learn more about fiber optic installation from

https://brainly.com/question/26259562

#SPJ1

a is a network that is confined to a small area. computers and can be connected wired or wirelessly. today, are built into new computers and are integrated into the motherboard during manufacture. each card has its own uniquely identifiable . is used to identify the computer where data originated on a network.

Answers

Answer:

A) local area network  B) peripherals C) network interface cards

D) address

Explanation:

Answer:

A (✔ local area network) is a network that is confined to a small area.

Computers and (✔ peripherals) can be connected wired or wirelessly.

Today, (✔ network interface cards) are built into new computers and are integrated into the motherboard during manufacture.

Each card has its own uniquely identifiable (✔ address.)

(✔ Media access control) is used to identify the computer where data originated on a network.

Explanation:

I just did the Assignment on EDGE2020 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

dion training is hiring a penetration testing firm to conduct an assessment of its corporate network. as part of the contract, the company has specified that it will not provide any network details to the penetration testing firm. instead, the company wants to see how much information about the network can be found by the penetration testers using open-source research and scanning the corporate network. what type of assessment is this considered? unknown environment testing partially known environment testing known environment testing semi-trusted environment testing see all questions back next question

Answers

The type of assessment that is known to be considered in the above scenario is known environment testing.

What is environment testing?

Environmental testing is known to be a kind of the measurement in regards to the performance of equipment when it is found to be under a given or specified environmental conditions

Note that in regards to the Environmental testing, the environmental conditions can be: extremely high as well as low temperatures. large, swift variations in temperature and others.

Therefore, The type of assessment that is known to be considered in the above scenario is known environment testing.

Learn more about environment testing from

https://brainly.com/question/21902774
#SPJ1

list the command to create a generation 2 virtual machine named svr-02 in the v:\vm folder that has 4gb of ram and uses the disk at v:\vhd\svr-02.vhdx

Answers

First, create the disk that will be used for the virtual machine. You can do this with the command:

VHDX create v:\vhd\svr-02.vhdx -SizeBytes 4GB

Second, create the virtual machine with the command:

New-VM -Name svr-02 -Generation 2 -Location v:\vm -MemoryStartupBytes 4GB -SnapshotFilePath v:\vm\svr-02.vhdx

That's it! You now have a generation 2 virtual machine named svr-02 in the v:\vm folder that has 4GB of ram and uses the disk at v:\vhd\svr-02.vhdx.

Learn more on virtual machine here:

https://brainly.com/question/27696457

#SPJ4

Is our world better or
worse because of
digital representation?

Answers

Answer:

is better cuz with digital representation u get to learn more when u use them

the idea of clicking text to link to other pages of content was made possible in 1980’s with the launch of personal computers by

Answers

The idea of clicking text to link to other pages of content was made possible in 1980’s with the launch of personal computers by Bill Atkinson of Apple Computer.

Who is Bill Atkinson?

Bill Atkinson is known to be a famous American computer engineer as well as a photographer.

Atkinson was known to be a man who had worked at Apple Computer from the year 1978 to 1990

Therefore, The idea of clicking text to link to other pages of content was made possible in 1980’s with the launch of personal computers by Bill Atkinson of Apple Computer.

Learn more about Apple Computer from

https://brainly.com/question/27255447

#SPJ1

A(n) _____, such as microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Answers

A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

What is a personal information manager PIM software?

A personal information manager (PIM) is known to be a kind of a software application that is known to function by the use of  tools to help one or computer users to be able to handle and monitor contacts, calendars, tasks, appointments as well as other forms of personal data.

Therefore, A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Learn more about ​personal information manager (PIM) from

https://brainly.com/question/23664875

#SPJ1

A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.

a. swim lane

b. ​personal information manager (PIM)

c. ​fact-finding application

d. ​enterprise architecture

The formation of fossil fuels is a process that takes millons of years and starts from enrgy from the sun the sun contrubetes to the formation of fossil fuels by ?

Answers

The creation of fossil fuels is a long-term process that begins with solar energy. The sun contributes to the formation of fossil fuels by providing energy to the living things that eventually turn into fossil fuels.

Decomposing vegetation and animals make up fossil fuels. The Earth's crust contains these fuels, which can be burned to provide energy. Coal, oil, and natural gas are examples of fossil fuels. In sedimentary rock formations, which are accumulations of rock, dead plant and animal materials, and layers of sediment, coal is a substance that is frequently discovered. More than 50% of a coal's composition must be fossilized plant material.

Learn more about fossil fuel https://brainly.com/question/2029072

#SPJ4

Other Questions
Question f(1)= ? Please explain You are deciding between two landscaping companies to work on your backyard renovation. Company A charges a $50 fee to come out to your house plus $10 an hour to work. Company B charges $15 per hour and $30 to show up. How many hours will it take for both companies to equal the same price, and how much money will it cost at that time? Read the excerpt:I believe this government cannot endure, permanently half slave and half free. I do not expect the Union to be dissolvedI do not expect the house to fallbut I do expect it will cease to be divided. It will become all one thing or all the other.Abraham LincolnWhy was the idea expressed by Abraham Lincoln in this speech significant?A. People at that time were still trying to compromise on the issue of slavery.B. It was the first time Abraham Lincoln spoke about slavery.C. The speech began Abraham Lincoln's run for the presidency.D. It was the first time someone expressed the idea that the Union could dissolve. when workers are asked to participate in a research study, vulnerabilities related to the subject's employment may include: employees may experience pressure from management to participate in the study because the employer perceives the study to be advantageous to the Please show work, and brainliest will be yours. Enter your answer in the provided box.an empty vial weighs 63.28 g. if the vial weighs 436.33 g when filled with liquid mercury (d = 13.53 g/cm3), what volume of mercury is in the vial? A character that profits from experience and undergoes a change or development is called.:______. Approximately 3 people out of every 30 are left handed. About how many left handed people would you expect in a group of 140 people? Which are the core functions of government in addressing the health of its citizens that are also the core public health functions? A runner has run 1.192 kilometers of a 10-kilometer race. How much farther does hneed to run to finish the race? Show your reasoning. How do I solve this Occupational Therapist is the use of everyday activities in-helping people manage their medicine.-rehabilitation of physical and mental illness.-resource management. a person travels by car from one city to another. she drives for 27.6 min at 62.7 km/h, 9.6 min at 115 km/h, 46.1 min at 45.2 km/h, and spends 12.3 min along the way eating lunch and buying gas. 8. Liberal hasA. one syllable.B. two syllables.c. three syllables. Rewrite each expression as an equivalent exponential expression. Epoetin alfa is a genetically engineered hemopoietin that stimulates the production of __________. What is the independent variable shown on this graph?O Only flow time (s) is the independent variable.O Only temperature ("C) is the independent variable.Both flow time (s) and temperature ("C) areindependent variables. In which of these pairs of numbers is 2 greater than the first and less than the second? 2.1, 2.3 2, 2 2.7, 3 2 , 2 Can+you+provide+a+cut-off+time+by+which+you+can+be+99%+sure+that+the+baseball+game+would+end? a rigid tank is divided into two equal parts by a partition. one part of the tank contains 2.5 kg of compressed l Confidentiality of study participants is most effectively protected by which action?