Answer:
A) False
Explanation:
Extranet
An extranet acts as a shared network, disseminating information present on the intranet. That is, if a private intranet shares some of its content with other users (be they sellers, customers, etc.), this shared network is what we call the extranet.
Intranet
Today, companies are looking for tools and methods to align internal communication, reduce costs, and centralize information and files. The intranet is one of these tools, which works restricted to a specific audience, such as a company. This way, collaborators can access it with their specific username and password.
The intranet is, then, a closed and internal network, and still allows the use of more communication protocols besides HTTP. Intranet access is typically done on a local server and a local network, which we call LAN, which means Local Area Network installed within the company.
This internal network connects users, allowing information exchange, file and document management, centralizing communication between users. With this tool, you can quickly and securely and efficiently connect companies and departments.
Answer:
// program in java.
// package
import java.util.*;
// class definition
class Main
{// main method of the class
public static void main (String[] args) throws java.lang.Exception
{
try{
// scanner object to read inputs
Scanner scr=new Scanner(System.in);
// variables
String name;
double price;
System.out.print("Enter item's name: ");
// read item's name
name = scr.next();
System.out.print("Enter item's price: ");
// read item's price
price= scr.nextDouble();
// print name
System.out.println("name of item is:"+name);
// print price
System.out.println("price of item is:"+price);
}catch(Exception ex){
return;}
}
}
Explanation:
Read name & price of item from user and assign it to variables "name" & "price" respectively with scanner object.Then print the name and price of item .
Output:
Enter item's name: Apple
Enter item's price: 100
name of item is:Apple
price of item is:100.0
Answer:
Proper Authentication is required. Not all the people should get all the data. If this is the case then you are definitely going to find that data protection is breached. We need to define each user's role as well as privileges clearly or else we are definitely going to suffer. Always ensure proper authentication.
Explanation:
We need to define each user's roles and privileges. And that can be done through Authentication and Authorization,
B, i say b because oversharing something personal could result in somebody you thought you loved going back telling someone else, causing rumors to be spread out