1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
13

Which of the following BEST describes an extranet?

Computers and Technology
1 answer:
zimovet [89]3 years ago
8 0

Answer:

D. an Internet connection allowing outsiders limited access to a firm's internal information system

Explanation:

An extranet is a private network that allows partial access to a company's network to partners, services providers, and selected customers. It provides a secure way of information exchange between the business and its stakeholders. An extranet is comparable to a Demilitarized Zone (DMZ) in that it gives authorized parties access to needed services but not the whole network.

You might be interested in
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
2 years ago
What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
Ostrovityanka [42]
Some of the disadvantages of using layered protocols are the redundancy and overall lower performance.
Reimplementing everything from remote and wired to connectionless and association situated application correspondence, with each ringer and shriek of BGP, MPLS, multicast steering and so on would be a gigantic endeavor and potentially unmanageable in this solid across the board convention. I could envision specialty utilize situations where most extreme execution is imperative most importantly where an exceptionally basic framework might be wanted.
8 0
2 years ago
Please pass this on... ( #helpsavelives )
olya-2409 [2.1K]

Answer:

Thank you

Explanation:

That made my day. I will make sure to pass it on.

4 0
3 years ago
what company is credited with solving a problem by creating a program that would work on all computers
seropon [69]

Answer:

The General Problem Solver (GPS) is a particular computer program created in 1957 by Herbert Simon, J. C. Shaw, and Allen Newell intended to work as a universal problem solver, that theoretically can be used to solve every possible problem that can be formalized in a symbolic system, given the right input configuration

Explanation:

7 0
3 years ago
Will you benefit from understanding management principles even if you decide not to go into management
satela [25.4K]

Answer:

Yes

Explanation:

It says it.

5 0
3 years ago
Other questions:
  • Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________. a. ​can us
    6·1 answer
  • What do you have to do to see the html code on a website?
    15·2 answers
  • Which of the following is a goal of paraphrasing​
    12·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • After adding an image to her flyer, Danica played around to see which layout would look the best. At one point, her text was on
    8·2 answers
  • Write a statement that increments numUsers if updateDirection is 1, otherwise decrements numUsers. Ex: if numUsers is 8 and upda
    11·1 answer
  • Huan wants to enter the science fair at his school. He has a list of ideas for his project. Which questions could be answered th
    14·1 answer
  • What is 36 Denary in Binary?? PLEASE ANSWER I WILL GIVE U BRAINLY!!
    9·2 answers
  • Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W
    15·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!