1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
3 years ago
13

An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______

Computers and Technology
1 answer:
Alona [7]3 years ago
4 0

Answer:

C. Employee Fax

Explanation:

An extranet is a private network that leverages internet technology and public telecommunication system to share part of a business's information or operations over a secure system with suppliers, vendors, partners, customers, or other businesses example is Electronic mail or Fax as it is an internet system, allowing companies to securely do business with other companies, or to sell products to customers.

You might be interested in
Write a question that the database will understand. Which records are not equal to 5? < 5 > 5 > =5 < > 5
Novay_Z [31]

Answer:

In the given question the option "<5, >5, and < >5" is not equals to 5.

Explanation:

In this question the option "<5, >5, and < >5" is not equal to 5. That can be described as:

  • In the following options, the value that is 5 is less than, greater than and less than greater than that means all option is not equal to 5.
  • In these options, only the third option is equal to the value.

That's why the answer to this question is "<5, >5, and < >5".

4 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
3 years ago
What type of firestopping technology expands as much as 25 times in volume?
love history [14]
The answer is Intumescent. I am pretty sure this is right.
7 0
3 years ago
When Creating a game ( Which I Am, FPS ofc ) what are the basic rules would you want to add
Gnesinka [82]

Answer:

2 ig

Explanation:

5 0
3 years ago
Write a program that computes the monthly net pay of the employee for a steel factory. The input for this program is the hourly
Mars2501 [29]

Answer:

#include<stdio.h>

int main()

{

float rate_of_pay,regular_hours,overtime_hours,grosspay,netpay,tax;

printf("Enter the Hourly rate of pay : ");

scanf("%f",&rate_of_pay);

printf("Enter the number of Regular hours : ");

scanf("%f",&regular_hours);

printf("Enter the number of Overtime hours : ");

scanf("%f",&overtime_hours);

grosspay=(regular_hours*rate_of_pay)+(1.5*overtime_hours*rate_of_pay);

netpay=grosspay-(grosspay*0.2);

printf("Employee's Gross pay = %f\n",grosspay);

printf("Tax = %f\n",0.2*grosspay);

printf("Employee's Net pay = %f\n",netpay);

return 0;

}

Note: The variables are declared as float, to support partial hours like 0.5,6.5 etc.

Explanation:

6 0
3 years ago
Other questions:
  • A ________ is a set of programs that manipulate the data within a database.
    12·1 answer
  • In a computerized accounting system, each transaction that is analyzed must be entered by hand into the appropriate journal and
    12·2 answers
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • Write a Temperature class that will hold a temperature in Fahrenheit, and will provide methods to get and display the temperatur
    5·1 answer
  • Briefly summarize two examples of cybercrime stories.<br> quick pleaseeee
    10·1 answer
  • What are registers in ICT used for?
    5·1 answer
  • Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
    7·1 answer
  • What method of thermal energy is at work when heat lamps are used to warm up baby chickens?
    11·2 answers
  • Examples of how the development of coding changed the way we live. What type of technology was created as a result of code?
    10·1 answer
  • What do you mean by computer ethics?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!