1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
12

The most likely reason a firm would decide to establish an extranet would be the desire to Multiple Choice speed the flow of inf

ormation on its private network by increasing the bandwidth. make the information on its network widely available to the general public. share information and collaborate with a select group of outside organizations or individuals. overcome the speed and capacity limitations of its external connection to the Internet by gaining access to the very-high-speed Backbone Network Service.
Computers and Technology
1 answer:
brilliants [131]3 years ago
6 0

Answer: share information and collaborate with a select group of outside organizations or individuals.

Explanation:

When a company uses an intranet, it is for the purpose of sharing information within the company so in the same vein, an extranet is done to share information with entities outside the company be it people or organizations.

For information to be shared, the other companies and organizations need to have the means and authorization to join the extranet. Extranets are very useful as they enable collaboration across vast distances thereby increasing productivity.

You might be interested in
Which of the following is not a skill set required by data scientists? A. Programming expertise B. Big data expertise C. Telecom
ziro4ka [17]

Answer:

Explanation:Option C is the correct answer.

8 0
3 years ago
When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit,
zysi [14]

Answer:

2. testing cybersquatting

Explanation:

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. In this case, phishing domain refer to a domain that is not a trustworthy one but try to deceive user into using it in place of the genuine domain.

Cybersquatting also known as domain squatting is registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses.

Identity theft is the illegal use of someone else's personal information in order to obtain money or credit. It is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

From the above definition, it is seen that someone registering a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit is called testing cybersquatting.

3 0
3 years ago
Read 2 more answers
. Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
sp2606 [1]

Answer:

a) The composition of the stack is :- 80,50,20,10.

Where 80 is the top and 10 is the last element.

b) The sequence of the popped items 40,30,70,60,90.

Explanation:

Stack is LIFO type data structure means Last in First Out.The element inserted last will be out of the stack first.The removal and addition is only at the one end that is top.

First 10,20,30,40 will be inserted in the stack. 40 is a the top.Now two pop operations occurs. 40 and 30 will be removed from the stack.

Now 50,60,70 will be inserted in the stack then again two pop operations so 70 and 60 will be removed from the stack.

Now the stack contains 50,20,10.Top = 50.

80 and 90 are added to the stack and 1 pop operation that is 90 will be removed.

Stack is 80,50,20,10 . Top = 80.

Sequence of integers popped=40,30,70,60,90.

4 0
3 years ago
Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
-Dominant- [34]

Answer:

The answer is "True".

Explanation:

Integration control is a system selection, which is important to ensure the proper coordination of the different components of the programs. Analogies between conflicting goals and solutions must be made to meet or surpass the needs and wishes of participant groups. This mechanisms use events for identifying, defining, combining, unifying and coordinating software development procedures and events, that's why the given statement is true.

6 0
3 years ago
What types of information are commonly included in headers and footers? Check all that apply.
polet [3.4K]
Date
Page number
File path and file name
3 0
3 years ago
Other questions:
  • What is the role of programmers in an organization?
    6·1 answer
  • Courteous behavior on the road will
    10·2 answers
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • Consider the following program segment: //include statement(s) //using namespace statement int main() { //variable declaration /
    9·1 answer
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • Plz help fast! will mark brainliest!<br><br>List three ways that music is used in modern society.
    6·1 answer
  • Computer software is regarded a bridge between the hardware and software.elaborate the statement outlining types and functions o
    10·1 answer
  • 100POINTS!!!!!!!!!!!!!!!!!!!I WILL ANSWER ALL OF YOUR QUESTIONS PLEASE LOVES:)))Upload your completed project including the foll
    12·1 answer
  • What Is the device used to produce hard copies from personal computer ​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!