1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
CaHeK987 [17]
3 years ago
14

Jennifer has been hired as a temporary employee at a local college. She is given a username and password to access certain parts

of the college's intranet What type of network is Jennifer using?
Computers and Technology
2 answers:
gulaghasi [49]3 years ago
4 0

LAN (Local Area Network)

<span>Basically, to be precise, Intranet is an extension of LAN in which IP services like HTTP, TCP/IP and several other standard protocols are added. Intranet is a private internet network that is used to add internet like services in an internal LAN.</span>

Mekhanik [1.2K]3 years ago
3 0
<span>Jennifer is using internet protocol network which uses IP to send and receive messages between one or more computers.

IP network is implemented in internet networks ,LAN(local area networks) and enterprise networks.All computers within an IP network have an IP address that uniquely identifies that individual host.</span>
You might be interested in
The declarations and statements that compose the method definition are called the __________.
Fiesta28 [93]

Answer:

a. method body.

Explanation:

A method contains the following components:

  • method name
  • method arguments
  • method return type
  • method implementation code

All of these together constitute the method body. The method body contains the declarations and statements constituting the method definition.

Apart from this, when the method is invoked at runtime, it needs to be called with method-name and the actual parameter list which gets substituted for the formal parameters in the method body.

8 0
3 years ago
Data administration is a special organizational function that manages the policies and procedures through which data can be mana
aleksandr82 [10.1K]
That is a true statement sir.
5 0
3 years ago
What is another name for mesolithic age
Romashka-Z-Leto [24]
In archaeology, mesolithic is culture between paleolithic and neolithic. The term "Epipaleolithic" is often used for areas outside northern Europe, but was also the preferred synonym used by French archaeologists until the 1960s.
7 0
3 years ago
Read 2 more answers
how can a user open a blank presentation? 1.on the file menu, click new, and then click recent templates 2.on the file menu, cli
4vir4ik [10]

2.  on the file menu, click new, and then click blank presentation.

5 0
3 years ago
(tco 8) the process of granting a user access to an application is called _____.
Scrat [10]

I guess the correct answer is Authentication.

The process of granting a user access to an application is called Authentication.

3 0
3 years ago
Other questions:
  • You are responsible for performing all routine maintenance on your company's laser printers. Which of the following maintenance
    15·1 answer
  • Which one is a run-on sentence? you get mark the brilist
    5·2 answers
  • Turning up the transmit power or utilizing a high gain antenna to reach wireless users from a distance increases your exposure t
    12·1 answer
  • Count input length without spaces, periods, or commas Given a line of text as input, output the number of characters excluding s
    8·2 answers
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • Which cell formatting is most likely to use $?
    5·1 answer
  • Plz tell me how to get my deleted account back you will be highly PRAISED!!!!!!!!!!
    14·2 answers
  • What is the best programing language to use for building video games?
    10·1 answer
  • What is control structure write it's types​ .
    15·1 answer
  • Difference between Data and information​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!