1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
4 years ago
8

Intranets:

Computers and Technology
1 answer:
SOVA2 [1]4 years ago
7 0

Answer:

A, C, D and E

Explanation:

An intranet is synonymous to a private LAN or WAN network but in contrast to the extranet or internet. Resources are retrieved and/ or shared within devices in the private network. It uses the internet protocol suite model of networking for communication, but also uses private IP addresses, which are not routable on the internet.

The communication between devices can be a peer to peer connection or client-server connection, using the mainframe computer technologies as the dedicated servers of the network.

You might be interested in
What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
cestrela7 [59]

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

4 0
3 years ago
How many terms are in the expression 3x to the second + 4 y - 1
saul85 [17]

"Terms" are things you add up or subtract.

So ... + ... - ... has three terms.

3x² + 4y - 1 has three terms.


7 0
4 years ago
If the list above is named list1 and is implemented as a list, whatstatement would you use to find the number ofelements?list1.s
vfiekz [6]

Answer:

list1.size()

Explanation:

In order to find the number of elements in a List , we can use the size() method defined in the java.util.List interface.

This method returns an integer which corresponds to the number of elements in the list.

The usage syntax example is as follows:

int num = list1.size();

If the list referenced by list1 contains 6 elements, then this method will return the value 6.

8 0
4 years ago
You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows so
creativ13 [48]

Answer:

a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.

Explanation:

This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.

Hope this helps!

5 0
3 years ago
Most source code is typically available on the internet in tarball format or as a git repository. True or false?
Greeley [361]

Most source code is typically available on the internet in tarball format or as a git repository. Therefore, it's true.

<h3>What is a source code?</h3>

It should be noted that a source code simply means programming statement that area created by the programmer and saved in a file.

In this case, most source code is typically available on the internet in tarball format or as a git repository. Therefore, it's true.

Learn more about source code on:

brainly.com/question/4593389

#SPJ12

4 0
2 years ago
Other questions:
  • Which is the most visual social media site?
    11·2 answers
  • What advantage does having ultraviolet vision give bees?
    10·2 answers
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • The GeForce GTX 1060 graphics card requires 120 W of power. You plan to install it in a PCIe 3.0 ×16 slot. Will you need to also
    13·1 answer
  • Which is true about lists and stacks?
    8·1 answer
  • 9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is
    6·1 answer
  • Which of the following is not part of the processes involved in data valida
    11·1 answer
  • Write any two web browers​
    10·1 answer
  • Write a SQL query to display films in inventory that have never been rented for all stores. Include inventory ID, film ID, film
    13·1 answer
  • How to change your username in brainly​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!