1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
CaHeK987 [17]
3 years ago
14

Jennifer has been hired as a temporary employee at a local college. She is given a username and password to access certain parts

of the college's intranet What type of network is Jennifer using?
Computers and Technology
2 answers:
gulaghasi [49]3 years ago
4 0

LAN (Local Area Network)

<span>Basically, to be precise, Intranet is an extension of LAN in which IP services like HTTP, TCP/IP and several other standard protocols are added. Intranet is a private internet network that is used to add internet like services in an internal LAN.</span>

Mekhanik [1.2K]3 years ago
3 0
<span>Jennifer is using internet protocol network which uses IP to send and receive messages between one or more computers.

IP network is implemented in internet networks ,LAN(local area networks) and enterprise networks.All computers within an IP network have an IP address that uniquely identifies that individual host.</span>
You might be interested in
What’s your fave tv show?
kompoz [17]

Answer:

the vampire diareas

Explanation:

7 0
3 years ago
Read 2 more answers
____________________________ and _________________________ are 2 negative impacts of the internet on businesses.
Bogdan [553]

Answer:

i no you its me remember and the answer is b.

Explanation:

7 0
3 years ago
25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
STALIN [3.7K]
A, B , and E sorry if I’m wrong
4 0
2 years ago
WILL GIVE BRAINLIEST!!!!!!!!!
sukhopar [10]

Answer:

True

Explanation:

7 0
3 years ago
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
V125BC [204]

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

8 0
2 years ago
Other questions:
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
    12·1 answer
  • Which of the following statements is true?
    13·1 answer
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • Using the Vigenere cipher, does the length of the key matter?
    8·1 answer
  • You are given the task of reading in n numbers and then printing them out in sorted order. Suppose you have access to a balanced
    12·1 answer
  • What development first helped people shape their communities through<br> informed decisions?
    5·1 answer
  • How to create create a database in mysql using clv files
    11·1 answer
  • Which code snippet is the correct way to rewrite this in Semantic HTML?
    11·1 answer
  • An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!