1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
14

A ___________ is similar to an intranet in that it uses internet technologies, but is developed for users outside the organizati

on.
Computers and Technology
1 answer:
Vanyuwa [196]3 years ago
6 0
The blank is extranet
I hope this helped!
You might be interested in
Is MS DOS a network operating system?​
chubhunter [2.5K]

Answer:

Operating systems now use networks to make peer-to-peer connections and also connections to servers for access to file systems and print servers. The three most widely used operating systems are MS-DOS, Microsoft Windows and UNIX.

Explanation:

7 0
3 years ago
Whichmultiplexing technique involves signals composed of lightbeams?
Angelina_Jolie [31]

Answer:

3.WDM

Explanation:

WDM ( wavelength division multiplexing ) involves signals composed of light beams WDM is used in communication where fibers are used it is used for multiplexing of number of carrier signals  which are made of optical fibers by using different wavelength of laser light it has different wavelength so this WDM is used for signals composed of light beams it has property of multiplexing of signal

8 0
3 years ago
What protocol suite below is the most commonly used protocol for local area network (lan) communication?
grandymaker [24]
Answer TCP/IP is the most common protocol in Local Area Networks.
3 0
4 years ago
If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that devic
GalinKa [24]

Answer:

C. Address Resolution Protocol (ARP) poisoning.

Explanation:

An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.

A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.

When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.

4 0
3 years ago
A list contains the following items: Antelope, Baboon, Cheetah, Elephant, Giraffe, Hippo, Jackal, Lion, Okapi, Warthog. ​(a)​A b
Alex Ar [27]

Answer:

Antelope Baboon Cheetah Elephant Giraffe, first, then it would search Warthon then Okapi, the manner of a binary search essentially splits the list in half and goes from right to left and then does the same to the other side.

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Pretrial services programs are also known as early intervention programs. <br> a. True <br> b. False
    15·1 answer
  • 1.Characters archetypes are typical characters that represent universal patterns of human or human roles. (True or false)
    14·1 answer
  • // This pseudocode should create a report that contains an
    14·1 answer
  • Which one of the following is a correct declaration for a method named passAList that has as arguments an array list myList of s
    8·1 answer
  • Which of the following payment types require you to pay upfront?
    9·1 answer
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • What does configsys mean​
    15·1 answer
  • Write a method for the Invitation class that accepts a parameter and uses it to update the address for the event.
    9·1 answer
  • Can someone help me with this pls
    5·2 answers
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!