1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
8

Users of an extranet can access a company or organization’s entire intranet

Computers and Technology
2 answers:
Tasya [4]3 years ago
4 0

Answer:

yes

Explanation:

yes

bixtya [17]3 years ago
4 0

Answer:

yes    they    can

i hope this helps you :)

You might be interested in
look at sum of my horrible drawings lol these were last year XD let meh see sum of yalls art!! im not into drawing as much but i
Snowcat [4.5K]

Answer:

Explanation:

but i drew eyes like your but digtal

5 0
3 years ago
Which of the following is applicable during a hostile act:
Elanso [62]
Your question has been up too long, a moderator may have to delete it.
we will contact moderators to find your question and remove it, and hopefully, they will refund the points, which is not up to me.
<span>thank you for using brainly.</span>
3 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Which type of chart is most useful when a user is trying to visually represent sets of data as parts of a whole, such as product
nataly862011 [7]

Pie chart, I’m fairly sure the rest aren’t real

5 0
3 years ago
Read 2 more answers
Osha requires employers pay for most required personal protective equipment including
zzz [600]
*Metatarsal foot protection
*Rubber boots with steel toes
*Non-prescription eye protection
*Prescription eyewear inserts/lenses for
full face respirators
*Goggles and face shields
*Fire fighting PPE (helmet, gloves, boots,
proximity suits, full gear)
*Hard hats
*Hearing protection
*Welding PPE
7 0
3 years ago
Other questions:
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • One of the most famous ___ licenses is gpl, which ensures that a particular program remains free to distribute and allows its co
    10·1 answer
  • The term "Big Data" is relative as it depends on the size of the using organization.
    14·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • Contains the instructions your computer or device needs to run programs and apps
    5·1 answer
  • Im getting hit offline can someone help or give me some advice
    6·1 answer
  • All who are interested in forex trading and bitcoin mining follow me for account management to all who are busy with work so i c
    14·1 answer
  • Which image file format is the best format to use for photographs on the Web
    15·1 answer
  • Question 1 (3 points)
    6·2 answers
  • What is this line called that appears and disappears in the search box<br><br> WILL MARK BRAINLIEST
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!