1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
3 years ago
8

What kind of networking is only for the use of people within the company

Computers and Technology
2 answers:
zaharov [31]3 years ago
6 0
LAN = Local Area Network
mariarad [96]3 years ago
6 0
<h2>Answer:</h2>

An <u>Intranet</u> is used by people within the company for networking.  

<h2>Explanation: </h2>

An internal networking enables people within a company for sharing data or information. Intranet is a private access to the employees of a company where the details about the company are confidential and not to be used for other purposes.

Networking within the system helps understand things better about the goals and requirements of the company. Members of teams feel connected and help each other, which in turn contributes to their career satisfaction. The future of the organization depends on the positive contribution of the employees.

You might be interested in
What is shouting pertaining to the internet
Ludmilka [50]
Hi!

What is considered shouting on the internet is when WHEN YOU TYPE IN ALL CAPS LIKE THIS!!! Doing this seems to make the words appear louder and more prominent. You can also add more emphasis to ALL CAP words by adding ***ASTERISKS***.
8 0
3 years ago
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Which of the following is not a scene mode?
tatiyna
I believe the answer is C) Model.
7 0
4 years ago
Read 2 more answers
Whats the differences between texting and emailing, and why the latter (emailing) is more common in professional communication.
Trava [24]

The primary distinction between texting and email is that texting requires cellular data, whereas email requires a consistent internet connection.

<h3>What is email?</h3>

E-mail, or electronic mail, refers to messages sent and received by digital computers via a network.

An e-mail system allows computer users on a network to communicate with one another by sending text, graphics, sounds, and animated images.

People prefer email for business communication because it is easily accessible on a mobile phone. It's simpler, and they believe they're more adaptable during the day.

To receive email, the recipient must have internet access. Viruses are easily transmitted through email attachments, and most email providers will scan your emails for viruses on your behalf.

Thus, email is more common in professional communication.

For more details regarding email, visit:

brainly.com/question/14666241

#SPJ1

6 0
1 year ago
Convert the following numbers from decimal to binary, assuming unsigned binary representation:________.
kumpel [21]

Answer:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

Explanation:

The method to generate the binary number from a decimal is :

Keep on dividing the number by 2 and keep on tracking the remainder

And the quotient is again divided and remainder is tracked so that the number is completely divided.

And then write the binary digits from bottom to top.

Please have a look at the method in below examples:

A) 35

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 35 & 1 \\  2 & 17 & 1 \\   2 & 8 & 0  \\ 2 & 4 & 0  \\ 2 & 2 & 0   \\ 2 & 1 & 1\end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary number is 100011

B) 3

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 3 & 1 \\  2 & 1 & 1 \\  \end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 11.

C) 27

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 27 & 1 \\  2 & 13 & 1 \\   2 & 6 & 0  \\ 2 & 3 & 1  \\ 2 & 1 & 1   \end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 11011.

D) 16

\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 16 & 0 \\  2 & 8 & 0 \\   2 & 4 & 0  \\ 2 & 2 & 0  \\ 2 & 1 & 1   \\\end{tabular}\end{center}

Writing the remainder from bottom to top.

So, binary equivalent is 10000.

Answers are:

Binary representations of following are:

A) 35 = <em>100011</em>

B) 3 = <em>11</em>

C) 27 = <em>11011</em>

D) 16 = <em>10000</em>

8 0
3 years ago
Other questions:
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • Sam wants to move from his current role in his organization to a managerial role. Which certification will help him get on a man
    6·1 answer
  • Which presidential race has been called “the dirtiest in American history”
    10·1 answer
  • Difference between a print device and a printer
    13·1 answer
  • Choose all of the items that represent functions of the operating system kernel.
    15·2 answers
  • 3. The channel bit error rate is 0.00001, and each packet’s total length is 1024 bytes including all overheads. Assume there are
    12·2 answers
  • The _______ is the continuing development of the internet that allows everyday objects embedded with electronic devices to send
    11·1 answer
  • What expressions will initialize d with a random value such that all possible values for d are given by the inequality 1.5 ≤ d &
    8·1 answer
  • HELP! WILL GIVE BRAINLYEST!
    13·1 answer
  • How do u reverse image search on Android? ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!