1. Define the term Intranet.
2. List three advantages of the intranet.
3. List three disadvantages of the intranet.
4. Briefly define the term extranet. 2marks
5. List three advantages of the extranet.
6. List two disadvantages of the extranet.

Answers

Answer 1

Answer:

1.a local or restricted communications network, especially a private network created using World Wide Web software.

2.Enhanced employee engagement.

Increased productivity.

Better connection and collaboration of distributed employees.

Streamlined communication of change management.

Establishing and reinforcing a strong company culture.

Efficient time management.

3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.

Complexity and heavy admin burden.  

Poor user experience.  

Low user adoption.  

Time-consuming information search.  

Internal use only.  

Lack of employee advocacy.  

Hard to measure success and effectiveness.

4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.

5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.  

Documents are safe and secure.  

Project management is easy.  

Setup and training require little to no IT involvement.  

Professional branding makes a great impression.

6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.  

Maintenance. Both extranet implementation and maintenance is made expensive within an organization.  

Dependency.  

System Protection.  

Communication Delay.  

User Friendliness.

Explanation:


Related Questions

which of the following is the most reliable storage device:
floppy disk
hard disk
USB
RAM

Answers

Answer:

RAM is the most reliable storage device.

A_______VPN connection is a private network that uses a public
network to operate.

A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site

Answers

Answer:

letter c. point to site po sagot diyan

30 points!!! Due Tomorrow. ICT test on memory, CPU, motherboard and dedicated/embedded systems and general purpose systems. Any tips?​

Answers

Answer:

Just get it right and don't get stressed

Explanation:

An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system.[1][2] It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints. Embedded systems control many devices in common use today.[3] In 2009 it was estimated that ninety-eight percent of all microprocessors manufactured were used in embedded systems.[4]

describe accessibility in Windows 7 ​

Answers

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.

which type of malware typically displays, automatically plays, or downloads advertisements to your computer?

Answers

Answer:

Adware

Explanation: Adware displays pop-up advertisements when you are online.

based on mla guidelines, what is the correct line spacing?

Answers

Answer:

Double spaced lines are correct.

Explanation:

And for works cited use double indent

A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.

Answers

It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.

Hope this help please give the brainliest award

a _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.

Answers

Answer:

(WAN) a wide area network

Why would you put money into a savings account? *
To make frequent withdrawals at ATM’s
To access the money from this account with personal checks
To easily access money from this account with a debit card
To earn interest on your money

Answers

Answer:

Most probably option 4, it has nice to earn interest from the bank.

Draw a flow chart showing the conversion of temperature from farenheit to degree celsius

Answers

I hope this answers help you

what is the set of events that occurs between the moment you turn on the computer and the moment you can begin to use the computer

Answers

Answer:

Booting

Explanation:

Booting is the process that occurs when you press the power button to turn your computer on. During this process (which may take a minute or two), the computer does several things: It runs tests to make sure everything is working correctly. It checks for new hardware.

what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage

Answers

Answer:

could have used a browser  but ok

Explanation:

The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.

Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)

Answers

Answer:

can you explain more please I didn't understand

Select the correct answer.

Which statement is true with respect to Java?

Answers

Answer:

where are the options ..... to select

which are types of gradients to choose from when working in photoshop

Answers

Answer:

can anyone help me in computer

There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).

How might colour blindness be utilised in Photoshop?

Click See Proof Setup Color Blindness Protanopia-type/Color Blindness Deuteranopia-type to use it. Now, you can toggle it on and off simply using the Ctrl+Y key on a PC or the +Y key on a Mac.

To help with design, there are certain tools that imitate colour blindness. Change the document's colour mode to RGB (this mode provides the most accurate proofs for colour blindness) Select either Protanopia-type or Deuteranopia-type under View > Proof Setting > Color Blindness.

Therefore, There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).

To know more about Photoshop visit:-

brainly.com/question/30808560

#SPJ2

jessica has pinned her favorite applications as icons on her desktop .she always clicks on these icons to work them .which user interface is she using here?

Answers

Answer:

Graphical User Interface

Explanation:

what is the answer ??​

Answers

Answer:

2nd answer is braille printer1st one is MICR .80percent sure 20 percent not

[tex]▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ { \huge \mathfrak{Answer}}▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ ▪ [/tex]

1. Correct choice - MICR

MICR characters are written using oxide of Iron.

2. Correct choice - Braille printer

Braille printer is the device used to give output which can be read by visually impaired people.

how to get into someones phone without knowing the password iphone

Answers

Answer:

you should not do that unless you have a good reason to.

Prereading strategies involve ООО introducing a text. previewing a text. summarizing a text. interpreting a text. ​

Answers

Answer:

A.

Explanation:

Mark Brainliest if correct!

Answer: Previewing a text. (C)


Explanation: Just got it right.

which of the following has the highest priority?
1) Browser Default
2)External style sheet
3)an inline style (inside a specific HTML element)
4)An internal style sheet (in the head section)

Answers

Answer:

External style sheet

Explanation:

External style sheet

what is the general term for programs used to operate a computer

Answers

Answer:

Software

Explanation:

ez

Answer: A Software System

You have a computer that has four DDR2 memory slots. Currently, there are two 512 MB memory modules installed. You check the motherboard documentation and find that the system has a 4 GB memory limitation. You want to add more memory to this system. By adding new memory modules, and without replacing the existing memory modules, what is the maximum total amount of usable RAM you can have in this system

Answers

Answer:

2048 MB / 2 GB.

Explanation:

Without removing the other modules you can add two more 512 MB modules for a total of 2048 MB.

rocks created from compaction and cementation of sediments are called:

Answers

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

Answer:

A  sedimentary

Explanation:

hope this helps please mark as brainliest

Which is considered both an input and output device?

Keyboard
Microphone
Speaker
Touchscreen monitor

Answers

Answer: touchscreen monitor

Explanation:

devices are the pieces of hardware used by a human (or other system) to communicate with a computer. For instance, a keyboard or computer mouse is an input device for a computer, while monitors and printers are output deviceshope this help.

Answer:

Touchscreen monitor

Explanation:

You touch it to input commands since it's a touchscreen and it is also a visual output device that interprets data into a picture.

Hope this helps :)

how much did netflix pay dave chappelle for the closer

Answers

$24.1 million dollars


What is the best most effective way to add your savings account?

Answers

Explanation:

to put money in your savings account for college and Car a house and a.bunch of important stuff in life

Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.

Answers

Snhahshshshshshhshshshsshhshshshshhs

what is bitcoin??????​

Answers

Answer:

a digital or virtual currency created in 2009 that uses peer-to-peer technology to facilitate instant payments.

Explanation:

what is the url of the website that would allow you to change your password, adjust quotas, and check a list of known computer problems on campus?

Answers

Answer:

Go to your schools website and look for the change password, ETC area I would guess it would be a "Help" tab

Explanation:

You did not explain what Campus your on however you can find this yourself pretty easy.

what version of vsftpd contained the smiley face backdoor?

Answers

Answer:

Chris Evans, author of vsftpd announced that the master site for vsftpd was compromised and that the latest version of vsftpd (vsftpd-2.3.4.tar.gz) was backdoored. The backdoor payload is interesting. In response to a smiley face in the FTP username, a TCP callback shell is attempted. There is no obfuscation.

Explanation:

The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor, according to vsftpd programmer Chris Evans. The payload on the backdoor is intriguing. A TCP callback shell is tried in response to a smiley in the FTP username. There is no concealment.

What version of vsftpd had smiley face backdoor?

Vsftpd version 2.3. 4 that could be downloaded from the main site was found to have been compromised in July 2011. A ":)" smileyface can be used as the username when entering into a compromised vsftpd-2.3. 4 server, giving users access to a command shell on port 6200.

The idea behind the attack against VSFTPD 2.3. 4 is to send a specific sequence of bytes on port 21 to start the malicious vsf sysutil extra() function, which, if executed successfully, opens the system's backdoor on port 6200.

causes the backdoor to be opened, which causes a shell to start listening on TCP port 6200. After a client connects to it and disconnects from it, the shell stops listening. This might be used by a remote, unauthenticated attacker to execute arbitrary code as root.

Thus, The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor.

For more information about vsftpd had smiley face backdoor, click here:

https://brainly.com/question/535743

#SPJ6

Other Questions
Can somebody help me please _d'ss4) Why does this article mention both the Egyptian and Roman glassartifacts before it describes the glass factory?A)in order for the reader to have backgroundinformation on what makes glass specialB)in order to demonstrate why Kerry Morelli is sofascinated by the creation of glass0in order for the reader to realize that glass does notreally have an interesting historyD)in order to demonstrate that the technology to makeglass hasn't really changed over time5) The opening three paragraphs of the essay make the point thatA) glass is important because it is often overlooked.B)glass is important because people can see rightthrough it.0glass is important because without it life would beless fun. What are the terms in the expression 2d + 7 + 5f?2, 7, and 5d and f2 and 52d, 7, and 5f How can distributive property be used to solve 7 x 391 What is the factored form of this expression?-9x3 - 12x2 -4xOA. x(3x + 2)2O B. x(3x 2)(3x + 2)OC. x(3x- 2)(3x+ 2)OD. x(3x-2)2 Will give BRAINLIEST and points :)) What is a SYNONYM and ANTONYM for the term MASS convert using metric and U.S. conversion factor. Convert 0.672 ft to mm Who said it?:"I can veto your legislation!!"O LegislativeO TRICK QUESITON: not a check nor balanceO JudicialO Executive please help me answer this question Is this statement true or false?The Bill of Rights specifies certain powers that are forbidden to both the federal government and the states.truefalse plz help i need to pass this to bring my grade up. it has all the pages for the passage in it PLZ HELP . If God calls you to be His servant in this time of pandemic, what would be your respond to His call? Will you say yes or no to His call? If so, what will you do? If not, why? Help me pls pls pls pls pls pls ReadWhat recurring feature of the Indian Wars does the Red River War show?O A European-Americans did not abide by the terms of a treaty that ended a conflict, leading to more conflict.B. Native Americans were relocated far from their ancestral homelands, and many died during the journeyC. Conflicts often ended with a large battle during which one side sustained massive casualties.D. The building of the Transcontinental Railroad heightened conflict over land in Indian Territory. Good nutrition enhances your quality of life and helps prevent disease. True or false 4. f(x) = 2x4 - 3x2 + 5. Find f(-1).What is the answer 1. Pick a real terrestrial world other than the Earth.2. Pick 3 specific environmental conditions on that world that are different from the Earth.3. Invent a lifeform (an imaginary alien) that has adaptations to survive each of the 3 environmental conditions. Remember there are many forms of life on Earth that are not animals! You can satisfy the requirements of this assignment by writing about this lifeform, or by drawing a picture of it and labeling the adaptations and environmental conditions, or come up with another creative way to describe your alien to me. why should teenagers, in particular, look for no fee savings accounts? Solve the inequality: x+10>2x/5. * M is the midpoint of PQ. MQ=5x+8 and PQ = 6x+56, find PM