1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
2 years ago
15

A school has an intranet for the staff and students to use. Some of the files stored on the intranet are confidential. Give two

reasons why a school may have an intranet.
Computers and Technology
1 answer:
lapo4ka [179]2 years ago
5 0

Answer:

explanation below

Explanation:

An intranet could be defined as a computer network that is used for sharing information, operational systems, collaboration tools and other computing tasks within a company or organization such as schools. It is usually structured to exclude excess by those outside of the organization.  

Intranet provides a lot of benefits to organization where it is been used and they are as seen below :

1. Users can effectively update and view their documents with ease – scheduling meetings, managing of classroom curriculum and preparing of projects can be done with less stress.

2. It can be used to keep accurate staff records – employees can have their details rightly stored using the intranet and a photograph can also be used.  

You might be interested in
2. Write a simple program in C++ to investigate the safety of its enumeration types. Include at least 10 different operations on
erastovalidia [21]

Answer:

Check the explanation

Explanation:

To solve the question above, we will be doing some arithmetic and bit wise operations on enum values. in addition to that, we are asserting the array with INTCOUNT  and also printing the size of array i.e 12 and we are adding BIG_COUNT enum value to 5 and the result is 25.

#include<stdio.h>

enum EnumBits

{

ONE = 1,

TWO = 2,

FOUR = 4,

EIGHT = 8

};

enum Randoms

{

BIG_COUNT = 20,

INTCOUNT = 3

};

int main()

{

// Basic Mathimatical operations

printf("%d\n",(ONE + TWO)); //addition

printf("%d\n",(FOUR - TWO)); //subtraction

printf("%d\n",(TWO * EIGHT)); //multiplication

printf("%d\n",(EIGHT / TWO)); //division

// Some bitwise operations

printf("%d\n",(ONE | TWO)); //bitwise OR

printf("%d\n",(TWO & FOUR)); //bitwise AND

printf("%d\n",(TWO ^ EIGHT)); //bitwise XOR

printf("%d\n",(EIGHT << 1)); //left shift operator

printf("%d\n",(EIGHT >> 1)); //right shift operator

// Initialize an array based upon an enum value

int intArray[INTCOUNT]; // declaring array

// Have a value initialized be initialized to a static value plus

int someVal = 5 + BIG_COUNT; //adding constant and BIG_COUNT variable

printf("%d\n",someVal); //value will be 25

printf("%d",sizeof(intArray)); //value will be 12

return 0;

}

Kindly check the attached image below for the Code and Output Screenshots:

6 0
2 years ago
Those that work in the Printing Technology pathway are typically self-employed, and work indoors. self-employed, and work outdoo
Reika [66]
A.) Those that work in the Printing Technology pathway are typically "<span>self-employed, and work indoors"

Hope this helps!</span>
3 0
3 years ago
Read 2 more answers
What kind of Encryption is this:
VMariaS [17]

The Encryption of a website

4 0
3 years ago
Drag the correct type of update to its definition.
Deffense [45]

Answer:

Base band : A list of radio frequencies

PRI : The chip that controls the radio frequency waves within a device

PRL: The connection between a mobile device and radio tower

Explanation:

Base-band is the range or band of frequencies. It contains a number of between upper and lower limit of the frequency. For example if the range of transmission of the signal is 2khz to 3khz. The frequencies between this range are called base band.

PRI is the chip that is used to control the different frequencies received at the device. This chip control the radio frequencies that are allowed to the devices. It is the short form of primary rate interface.

PRL is the list named as Preferred Roaming List. It has stored the information of the mobile devices that are connected to the mobile phone. This list is used while communicating between mobile device and tower.

8 0
3 years ago
Shang chi Critique (6-8 sentences)
melisa1 [442]

Explanation:

.......................

5 0
2 years ago
Other questions:
  • This device operates at layer 2 but functions at the higher layers.
    11·1 answer
  • Windows domain policy to disable windows 10 update
    7·1 answer
  • Write an if else statement that assigns 0 to the variable b and assigns 1 to the variable c if the variable a is less than 10. O
    5·1 answer
  • How will using ascending order on a field that contains dates sort a list?
    12·2 answers
  • Complete the following statement: Sustainability is: Choose all that apply.This task contains the radio buttons and checkboxes f
    10·1 answer
  • Suppose that a is a one-dimensional array of ints with a length of at least 2. Which of the following code fragments successfull
    8·1 answer
  • Pseudo code for rolling a dice
    11·1 answer
  • WRITE A JAVA PROGRAM TO PRINT THE PATTERN<br> 13579<br> 2468<br> 357<br> 46<br> 5
    12·1 answer
  • Whats important about the points?
    10·2 answers
  • The options on the Ribbon will____:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!