1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
2 years ago
12

General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another na

me for this network that operates behind a firewall is a(n): Group of answer choices specialized network extranet intranet information system functional network
Computers and Technology
1 answer:
enyata [817]2 years ago
6 0

Based on the fact that General Electric uses its own private corporate network to link its 340,000 employees behind a firewall, this is called an <u>Intranet</u>.

<h3>What is an intranet?</h3>

An intranet refers to a network that functions like the internet but isn't available to everyone. It is instead available to only people who are part of the organization that set it up.

This intranet allows for its users to share information and communicate with each other using all sorts of tools and collaborative software.

Intranets operate behind a firewall which means that they are less prone to attacks by hackers and can be quite faster. This is what General Electric is doing with its employees which means it uses the intranet.

Find out more on an intranet at brainly.com/question/13742795

#SPJ1

You might be interested in
A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error.
OverLord2011 [107]

Answer:

C. Denial of Service

Explanation:

Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.

5 0
3 years ago
Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
Sergio039 [100]

Answer:

DNA analysis

Explanation:

DNA is unique for all individuals. DNA analysis is the process of analysing the DNA characteristics of an individual.

DNA profiling is used in forensics to identify the suspects involved in criminal activities.

1. In the process, DNA of the suspects is matched with the DNA found in the site of the crime.

2. If a match is found, it indicates that the genetic relationship exists between the suspect and the criminal or the crim.

3. The order from the court is needed to obtain the DNA of the suspects. The sample can be in the form of blood or saliva.

4. The sample obtained should have adequate cells which contain the DNA.

Issues  

The DNA obtained from the crime site is not pure or proper enough to be ideal for the DNA profiling.

Degraded sample

1. The sample obtained from the site of the crime is not always adequate to obtain the actual DNA.

2. The sample can be contaminated due to the environmental factors.

3. The sample obtained is too less and hence, should be examined accurately in order not to waste the sample.

DNA mixture

4. The sample obtained from the site of the crime is found to contain DNA from more than one individual.

 

Profiling types

DNA profiling can be carried out by using any of the techniques mentioned below.

1. RFLP analysis (  Restriction fragment length polymorphism )

This uses the Southern blot technique. The blot process needs a large amount of the sample. Also, this works well only when the sample is not degraded.

2. Polymerase chain reaction (PCR) analysis

3. STR analysis ( short tandem repeats )

4. AFLP ( amplified fragment length polymorphism )

This is an automated and low-cost process. It is easy to set up and operate which makes this process common in low income countries.

All the methods mentioned above have their own advantages and drawbacks.

5 0
3 years ago
Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
Oxana [17]
A quick way to restore the arrow pointer after you have used it for drawing is to press the esc key.  The esc key is <span>used for any of the different </span>functions<span>, as to interrupt or cancel the current process or running program, or to close a pop-up window.</span>
7 0
3 years ago
True or false? Opinionated websites can still be credible. A. True B. False
kumpel [21]
False. the information should not be biased in order to be creditable
5 0
4 years ago
Read 2 more answers
3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
Neko [114]

Answer:

a

Explanation:

Megan doesn't have a registered business. She can't claim insurance

4 0
3 years ago
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • Chris wants to guarantee that the instructions within the loop are executed one time regardless of thestatus of a condition. Whi
    9·1 answer
  • Which of these is an effective color scheme?
    14·1 answer
  • Which one of the following may be used as an input as well as an output device? A. Fax machine B. Scanner C. Printer D. Voice re
    9·1 answer
  • Consider having three String variables a, b, and c. The statement c = a + b; also can be achieved by saying_____________.a. c =
    11·1 answer
  • How to can you avoid becoming a victim of identity theft?
    10·1 answer
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA
    14·1 answer
  • ¿Que similitudes y que diferencias tenían el estado y la iglesia en el proceso de colonizacion de america?​
    6·1 answer
  • 3. Answer the following questions.
    14·1 answer
  • O
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!