1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
12

A(n) _____ is a computer network that uses Internet Protocol technology to share information, operational systems, or computing

services within an organization.
Computers and Technology
1 answer:
stepan [7]3 years ago
3 0

Answer:

Intranet

Explanation:

According to my research on information technology and hardware, I can say that based on the information provided within the question the term being described is called an Intranet. This (like mentioned in the question) is a local or restricted communications network,usually made as a private network within an organization and is created using Internet Protocol Technology.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Which of these devices features D-pads and analog sticks? ASAP PLEASE
Arisa [49]

Answer:

b. portable consoles

Explanation:

hope that helps :)

5 0
3 years ago
Read 2 more answers
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
2 years ago
In Coral programming: A half-life is the amount of time it takes for a substance or entity to fall to half its original value. C
viva [34]

Answer:

Yes, it will be after 6 hours: 50 mg, after 12 hours: 25 mg, and after 18 hours: 12.5 mg

Explanation:

Remember coral is a functional programming language and follows Pythons functional programming paradigm. Remember Python supports functional, imperative as well as OOPS paradigm.

The function will be:

def void calcamtleft(int amt):

   integer a=6

   integer time=6

   integer i=1

   while amt> 0:

       amt=amt/2

       print("After"+time+"  hours:" +amt+"mg")

       i++

       time=a* i

Hence in first loop amt=100

new amt=100/2=50

After 6 hours: 50 mg ( this will be printed)

i will increment then, and time will be = 6 *2 =12

now input amt=50

new amt=50/2=25

After 12 hours 25 mg (this will be output)

i will increment then, and time will be = 6 *3 =18

now input amt=25

new amt=25/2=12.5

After 18 hours 12.5 mg (this will be output)

i will increment then, and time will be = 6 *4 =24

now input amt=12.5/2= 6.25

new amt=6.25/2= 3.125

After 24 hours 3.125 mg (this will be output)

i will increment then, and time will be = 6 *5 =30

now input amt=3.125

new amt=3.125/2= 1.5625

After 30 hours 1.5625 mg

And this will continue till amt>0

7 0
3 years ago
Please help me with this , I’m stuck and cannot understand this , please help me with this , I’ll appreciate it alot
Licemer1 [7]

Answer:

im sorry but i cannot explain it

6 0
3 years ago
What is cell address?​
Nat2105 [25]

Answer:

A cell reference, or cell address, is an alphanumeric value used to identify a specific cell in a spreadsheet. Each cell address contains “one or more letters” followed by a number. The letter or letters identify the column and the number represents the row.

Explanation:

3 0
3 years ago
Other questions:
  • An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless netw
    13·1 answer
  • What additional features on your router would you implement if you were setting up a small wired and wireless network
    5·1 answer
  • Which of the following is the fastest way to open an Access database? a. Right-click the database icon. b. Start Access from the
    13·2 answers
  • When you copy a formula that contains an absolute reference to a new location, the reference ____. a. has a dotted outline in it
    6·1 answer
  • Do you know some website that can make a questionnaire? And I can use the link then put up on the social media so that everyone
    7·2 answers
  • Why is there no ide length or timing for study breaks?​
    12·1 answer
  • Which of the following is not an example of plagiarism?
    10·1 answer
  • Write the class RoadSegmet. The class inherits from Transportation Class. The Class have a vector hourlySpeeds data field which
    14·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • What keys on the keyboard have the ability to move the cursor around on a window?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!