1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
12

A(n) _____ is a computer network that uses Internet Protocol technology to share information, operational systems, or computing

services within an organization.
Computers and Technology
1 answer:
stepan [7]3 years ago
3 0

Answer:

Intranet

Explanation:

According to my research on information technology and hardware, I can say that based on the information provided within the question the term being described is called an Intranet. This (like mentioned in the question) is a local or restricted communications network,usually made as a private network within an organization and is created using Internet Protocol Technology.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
13. In cell A17, use the SUMIF function to display the total membership in 2023 for groups with at least 40 members
expeople1 [14]

Answer:

On cell G16, type the formula "=SUMIF(G2:G11, ">=40")".

Explanation:

Formulas in Microsoft Excel are used to generate results or values to a cell. The formula must start with an equal sign. The formula above has the function "SUMIF" which is used to provide a sum of numeric values based on a condition.

6 0
3 years ago
Compare and contrast the properties of a centralized and a distributed routing algorithm. give an example of a routing protocol
Naily [24]

Answer and Explanation:

Centralized : Central node in the system gets whole data about the system topology, about the traffic and about different hubs. This at that point transmits this data to the particular switches. The benefit of this is just a single hub is required to keep the data. The hindrance is that if the focal hub goes down the whole system is down, for example single purpose of disappointment.

Distributed: Distributed nodes gets data from its neighboring hubs and afterward takes the choice about what direction to send the parcel. The weakness is that if in the middle of the interim it gets data and sends the parcel something changes then the bundle might be deferred.

Example :

Link State takes Centralized approach

Distance Vector takes Decentralize approach

8 0
3 years ago
Carla needs to list the role for each consultant. Those with four or more years of 26 15 experience take the Lead role. Otherwis
saveliy_v [14]

Answer :

The output is attached below

Explanation:

The following formula needs to be entered into cell N5:

=IF($M5>=4,"Lead","Associate")

4 0
3 years ago
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
What are the steps to insert an image into an email message place the steps in the correct order
AnnyKZ [126]

Answer:

How to insert photo into email?

Insert a picture into the body of an email message

To insert a picture that displays in the body of an email message, use the following steps: Position your cursor where you want the image in your message. Select Insert > Pictures. Browse your computer or online file locations for the picture you want to insert. I think this is helpful

8 0
3 years ago
Read 2 more answers
Other questions:
  • How to jail break iphone 7 with <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="7617023602">[email&#160
    11·2 answers
  • Digital cameras are less susceptible to UV light true or false
    13·2 answers
  • The first step in the five-step process for problem solving is to ____. take action complete the task understand the task or nee
    10·2 answers
  • Instructions:Select the correct answer.
    6·2 answers
  • Houston want to have a quick conversion with his friend about an upcoming school activity. which type of website would be most u
    12·2 answers
  • Emails, Documents, Videos and Audios are examples of- (a) Structured data (b) Unstructured data (c) Semi-structured data (d) Non
    10·1 answer
  • The transmission control protocol (TCP) layer helps computers to communicate in which of the following ways?
    10·1 answer
  • ________ programs help solve the problem of running out of storage space by providing lists of application programs, stored vide
    13·1 answer
  • How do you code to find the surface area 6 s2, volume s3 in python
    6·1 answer
  • Two examples that cannot be performed by humans and that computers are used for instead​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!