1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
15

How does an extranet work?

Computers and Technology
1 answer:
nordsb [41]3 years ago
7 0
It works by a controlled private in network allowing third-party Partners to gain information about a specific company or institution without granting access to an organizations entire network.
You might be interested in
What are all the possible 4-digit codes you can make with the numbers 7, 0, 9, and 3?
Arte-miy333 [17]
0,7,0,0
9,9,0,0
7,7,7,7
3,9,0,7

Hope this helps
4 0
3 years ago
Read 2 more answers
The answer for this question?
Damm [24]
I'm pretty sure it's the last
4 0
4 years ago
A network administrator is examining a RIPv2 routing table and notices that several subnets are advertised in individual entries
Aleonysh [2.5K]

Answer:

B. Use the auto-summary command.

Explanation:

With the implementation of dynamic routing protocols, RIP summarizes networks at classful boundaries by default. To configure a router to automatically summarize networks, the auto-summary command would be used.

5 0
4 years ago
Using Task Manager, you discover an unwanted program that is launched at startup. Of the following items, which ones might lead
Harrizon [31]

Answer: Option (a) ,(c) and (e) can become a solution for the problem.

               Option(b) and (d) are not exactly a solution to the issue rather can    be considered on temporary basis

 

Explanation: Windows Task Manager is used for processing task taking place in the system and monitors the performance of that task or program that is running.To stop the unnecessary program execution on the system. methods like searching the source of the program from Task scheduler, startup files or registry key that initiated the execution that unwanted task.

Methods like disabling the program by using Msconfig and Task manager will only deactivate them but they are not eliminated from the source .Thus the appropriate answers would be option(a), (c) and (e).

7 0
3 years ago
What does software such as Bendix ACom allow the technician to perform on an ABS circuit?
denis-greek [22]
It allows the technician to modify it
5 0
4 years ago
Other questions:
  • Plzzzzzzz help good answers only and best answer gets brainly
    5·1 answer
  • A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
    12·1 answer
  • for which is a chart legend used? a.all of the time b.whenever you are comparing data that is the same c.whenever you are compar
    9·2 answers
  • A program in which students learn a specific skill for a particular job is called a
    8·2 answers
  • If you are trying to photograph a house that is on sale how are you most likely to photograph it?
    12·1 answer
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks.
    7·1 answer
  • Which of the following statements are true about the code shown below in the class named Quiz? (Select all that apply.)
    7·1 answer
  • Question #5<br> How does the computer decide which path to follow in a selection control structure?
    12·1 answer
  • Make a presentation on ms word
    6·2 answers
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!