1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
11

Intranets: a. are based on mainframe technology. b. provide the platform on which a firm builds its information systems. c. are

multiple networks joined together. d. are typically used to communicate with the business's trusted vendors. e. use Internet technology for a private company network.
Computers and Technology
1 answer:
antoniya [11.8K]3 years ago
5 0

Answer: Option (e) is correct

Explanation:

Intranet is the private network that is created for sharing information and data ,handle computing facilities, sharing files etc through internet service within a organization. Members of the company can access this technology for performing activities on the network.

  • Other options are incorrect because numerous networks are not linked ,does not share information outside organization, does not act as information system's base and neither is linked with mainframe technology.
  • Thus,the correct option is option(e).
You might be interested in
Question 6 of 10
Snezhnost [94]

Answer:

C

Explanation:

Its C because if someone else was added they could see the email as well.

7 0
2 years ago
Write the algorithm for finding the perimeter of a rectangle using English like form step by step
olya-2409 [2.1K]
L+L+W+W= Permiter
Or Lenght+Lenght+Width+Width= Perimeter
That’s all just add all the 4 sides
8 0
3 years ago
Consider the most important item among all the categories of information stored on your personal computer. As it applies to that
GarryVolchara [31]

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

5 0
3 years ago
MmfbfMMMMMMMMMMMMMMMMMmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
Mumz [18]

Explanation:

bdhabsusvsjsvdhewjsbdueyssbwksv

6 0
3 years ago
A disk drive has 2000 cylinders, numbered 0 to 1999. The drive is currently servicing a request at cylinder 783, with the previo
Ket [755]

Answer:

Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a request at cylinder 143, and the previous request was at cylinder 125. The queue of pending requests, in FIFO order, is

Explanation:

5 0
3 years ago
Other questions:
  • A job posting is the best way to find out what _____ are required for a position.A.aptitudes B.hard skills C.soft skills D.dress
    10·2 answers
  • A company decides to reduce its IT labor force by hiring an external company to manage various aspects of IT administration, suc
    6·1 answer
  • What symbol following a menu command lets you know that a dialog box will be displayed? an arrow a check mark an ellipse a radio
    5·2 answers
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • ARP request is send to
    12·1 answer
  • You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
    11·1 answer
  • Someone please tell me please y my ps4 controller won’t charge:(
    12·2 answers
  • Create a class to represent light bulbs
    7·1 answer
  • Help plz (will give brainliest)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!