1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
CaHeK987 [17]
2 years ago
14

Jennifer has been hired as a temporary employee at a local college. She is given a username and password to access certain parts

of the college's intranet What type of network is Jennifer using?
Computers and Technology
2 answers:
gulaghasi [49]2 years ago
4 0

LAN (Local Area Network)

<span>Basically, to be precise, Intranet is an extension of LAN in which IP services like HTTP, TCP/IP and several other standard protocols are added. Intranet is a private internet network that is used to add internet like services in an internal LAN.</span>

Mekhanik [1.2K]2 years ago
3 0
<span>Jennifer is using internet protocol network which uses IP to send and receive messages between one or more computers.

IP network is implemented in internet networks ,LAN(local area networks) and enterprise networks.All computers within an IP network have an IP address that uniquely identifies that individual host.</span>
You might be interested in
When you go to a website, your web browser requests a web page from:
lakkis [162]

Answer: web server

Explanation:

When you go to a website, your web browser requests a web page from the web server. For this to happen, the IP address for the webpage has to be identified first, tmaftee which the browser will request appropriate data from the web server.

Such request comes in form of data packet and takes place through HTTP and.utnhas all the necessary information that is needed by the web server for the delivery of the webpage data.

3 0
3 years ago
HELP ME ASAP
ruslelena [56]

it is title page and give me a ❤

3 0
3 years ago
The word blog is made from what two terms?
mafiozo [28]
• web + log = blog •
3 0
3 years ago
Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
Cerrena [4.2K]

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

8 0
3 years ago
JAVA
marshall27 [118]

Answer:

Answer is in the provided screenshot!

Explanation:

Steps required to solve this problem:

1 - define what characters are "vowels" by assigning them to an array.

2 - create a variable to record the amount of vowels there are in the string.

3 -  convert the input string into a character array and iterate through each character

4 - for each of the character of the string we go through, check if it matches any of the vowels

5 - return true if the vowel count is greater than 1

Alternative methods using the Java Stream API have also been wrote, please respond if you require them.

7 0
2 years ago
Other questions:
  • What should the timing of transition slides be per minute?
    9·2 answers
  • While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
    7·1 answer
  • A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser
    11·1 answer
  • Which of the following is true about main content? Select all that apply.
    10·2 answers
  • Given a variable temps that refers to a list, all of whose elements refer to values of type float, representing temperature data
    10·2 answers
  • Data types influence the following in the workflow: (Select all that apply)a. the color choices and layout decisions around comp
    15·2 answers
  • How do you answer questions
    15·1 answer
  • Which of the following best describes professional behavior in the IT field?
    11·2 answers
  • 8.Which of the following IC was used in third generation of computers?Immersive Reader
    13·1 answer
  • What is a fire wall and how does it work
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!