1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
3 years ago
12

The intranet is the same as the internet. true false

Computers and Technology
2 answers:
Oduvanchick [21]3 years ago
8 0
False, it doesnt have a big network i think

galina1969 [7]3 years ago
5 0
False, the intranet <span> does not refer to a network that supports communication between different organizations.</span>
You might be interested in
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
As a sports store owner, the higher the price you charge for gear...
Nitella [24]
2 that’s because some people will buy it because they think the value of it is good and some might not because they believe it is too expensive.
8 0
3 years ago
Read 2 more answers
Bianca is preparing special dishes for her daughter’s birthday. It takes her a minutes to prepare the first dish, and each follo
blagie [28]

Answer:

The solution code is written in Python:

  1. a = int(input("Input first dish time: "))
  2. b = int(input("Input extra minutes: "))
  3. t = int(input("Input time available: "))
  4. dishesCount = 1  
  5. currentTotal = a + b
  6. while(currentTotal <= t):
  7.    dishesCount += 1
  8.    currentTotal += currentTotal + b
  9. print("Number of dishes can be prepared: " + str(dishesCount))

Explanation:

Firstly, prompt user to input the first dish time, extra minutes and time available and assign the values to variable a, b and t, respectively (Line 1-3).

Next, create variable dishesCount to hold the number of dishes can be prepared (Line 5).

Get the current total time by adding a and b and assign it to variable currentTotal (Line 6).

While the currentTotal is less than or equal to t, increment the dishesCount by one and then add the hour of current dish to the currentTotal (Line 9-10).

At last, display the number of dishes that can be prepared in t minutes (Line 12).

4 0
4 years ago
A cyberbully is someone who invades another person’s privacy by
e-lub [12.9K]
Insulting or harassing them over the Internet
8 0
4 years ago
Read 2 more answers
Which activity is performed during high-level design in the V-model?
SVETLANKA909090 [29]

Answer:

understanding component interaction

4 0
3 years ago
Other questions:
  • Which acronym describes technology in which all or most of a deviceâs electronic circuitry is on a single microchip?
    12·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • Which is the output of the formula =XOR(120&lt;102;83=83;51&lt;24)??
    11·2 answers
  • What does an operating system do?
    11·2 answers
  • To add a row labeled "total" to a query design click the ____ button in the show/hide group on the design tab on the ribbon.
    14·2 answers
  • One of the network printers is producing copies where the toner is smeared on paper after printing. What component should be che
    11·1 answer
  • Write the method addItemToStock to add an item into the grocery stock array. The method will: • Insert the item with itemName ad
    12·1 answer
  • Which of these expressions is used to check whether number is equal to value?
    15·2 answers
  • List and explain three computing devices from the 20th century​
    13·2 answers
  • What type of os must be installed on your machine to allow this type of action by another person?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!