1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
15

A school has an intranet for the staff and students to use. Some of the files stored on the intranet are confidential. Give two

reasons why a school may have an intranet.
Computers and Technology
1 answer:
lapo4ka [179]3 years ago
5 0

Answer:

explanation below

Explanation:

An intranet could be defined as a computer network that is used for sharing information, operational systems, collaboration tools and other computing tasks within a company or organization such as schools. It is usually structured to exclude excess by those outside of the organization.  

Intranet provides a lot of benefits to organization where it is been used and they are as seen below :

1. Users can effectively update and view their documents with ease – scheduling meetings, managing of classroom curriculum and preparing of projects can be done with less stress.

2. It can be used to keep accurate staff records – employees can have their details rightly stored using the intranet and a photograph can also be used.  

You might be interested in
Choose 2 statements that correctly describe the time complexity of data structures with N data.
Softa [21]

The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

<h3>What is time complexity of data structures?</h3>

Time Complexity of an algorithm is known to be the depiction of the amount of time needed by the algorithm to carry out to completion.

Note that The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

Learn more about data from

brainly.com/question/17350816

#SPJ1

6 0
1 year ago
What is the best programming language
pashok25 [27]

Answer:

Ther are 8 best programming language :

• Javascript

• Swift

• Scala

• Go

• Python

• Elm

• Ruby

• C#

4 0
3 years ago
A set of programs that enable the hardware to process data is _____.
Mnenie [13.5K]
The most appropriate answer is C !! software os used for using hardware !!
4 0
3 years ago
An asymmetric encryption system utilizes how many keys?
ivanzaharov [21]
Two. One for encryption, and one for decryption. RSA is an example of an asymmetric encryption algorithm.
7 0
3 years ago
How many panes can Pablo view in a spreadsheet if he chooses the split worksheet option?
ddd [48]
Pablo can be a minimum of two pains and a maximum of four panes in a split screen worksheet.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes
    5·1 answer
  • The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
    5·1 answer
  • create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python
    11·1 answer
  • Suppose that f() is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointe
    15·1 answer
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • On Edge; this assignment has been overdue for like three weeks because I DO NOT understand what to do, if you could help me that
    12·2 answers
  • Which is the correct notation to specify the following inheritance?
    8·1 answer
  • Yo, how can I bypass the securely filter on a chromebook?
    15·1 answer
  • Please help me with coding!
    7·2 answers
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!