Answer:
1.a local or restricted communications network, especially a private network created using World Wide Web software.
2.Enhanced employee engagement.
Increased productivity.
Better connection and collaboration of distributed employees.
Streamlined communication of change management.
Establishing and reinforcing a strong company culture.
Efficient time management.
3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.
Complexity and heavy admin burden.
Poor user experience.
Low user adoption.
Time-consuming information search.
Internal use only.
Lack of employee advocacy.
Hard to measure success and effectiveness.
4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.
Documents are safe and secure.
Project management is easy.
Setup and training require little to no IT involvement.
Professional branding makes a great impression.
6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.
Maintenance. Both extranet implementation and maintenance is made expensive within an organization.
Dependency.
System Protection.
Communication Delay.
User Friendliness.
Explanation:
Which options are available in the Conditional Formatting dialog box?
Answer:
all but b are correct.
Explanation:
Preset headers and footers cannot have additional information add to the areas.
Group of answer choices
True
False
the answer to the question is true
pasagot po pls
tle-6
what is the difference between internal and external css?
Answer:
Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file.
External CSS is that we can write in a separate file than the HTML code i.e the HTML file is separate like(index.html) the CSS file is separate like(style.css).
Explanation:
whenever I try to make an account it says it can't sign me up at this time or something- can you help?-
Answer:
You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.
where is the scroll bar located inside a web browser?
The Scroll Bar is the narrow space in your browser window just to the right of the content area.
A document used to convince a panel of potential funders to help a product, programor service become reality.
Answer:
Concept paper
Explanation:
which are types of gradients to choose from when working in photoshop
Answer:
can anyone help me in computer
There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).
How might colour blindness be utilised in Photoshop?Click See Proof Setup Color Blindness Protanopia-type/Color Blindness Deuteranopia-type to use it. Now, you can toggle it on and off simply using the Ctrl+Y key on a PC or the +Y key on a Mac.
To help with design, there are certain tools that imitate colour blindness. Change the document's colour mode to RGB (this mode provides the most accurate proofs for colour blindness) Select either Protanopia-type or Deuteranopia-type under View > Proof Setting > Color Blindness.
Therefore, There are regulations in many nations requiring CUD-compliant graphics in public areas or colour vision deficit. Photoshop has two blindness settings: Protanopia-type (red-blindness) and Deuteranopia-type (green-blindness).
To know more about Photoshop visit:-
brainly.com/question/30808560
#SPJ2
Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?
Answer:
Left-click each message, and move it to the Trash folder.
Right-click the Deleted Items folder, and click Empty Folder.
Click the Folder tab, and click the Empty Folder in Clean Up group.
Right-click the Deleted Items folder, and click Mark All as Read.
Hey is anyone else getting this? Don't mind the answer.
Answer:
Getting what? I don't get what you mean.
unable to find valid certification path to requested target
Answer:
Explanation:
This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.
Order the steps to creating a new rule to handle meeting request responses in Outlook
Answer:
posting this. your photo order is correct.
Explanation:
What component uses thermal paste to attach the heat sink?
Answer:
Thermal compound is the answer
one Q what will be the answer?
Answer: a computer system that has one function within a large system
Explanation:
the key word here is EMBEDDED which means WITHIN SOMETHING ELSE
Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.
what is the name of the method of problem solving that breaks a problem imto smaller problems
Answer:
The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps
Explanation:
what does it mean to clear a setting in a dialog box?
Answer:
to delete it
Explanation:
What is word in computer?
Answer:
In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.
This the answer you wanted? (brainliest?)
Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)
Answer:
can you explain more please I didn't understand
what is the problem here
Answer:
I think ...............
how can an attacker execute malware through a script?
Answer:
An attacker can attach a script to a program that you download which then infects your computer.
You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet.
Required:
What could have been the reason for that?
Answer:
The network address can be the reason. You need to modify it so you can have access.
what is output if the user types 13 click all that apply ABCD
Answer:
AD?
Explanation:
Answer:
A C D
Explanation:
youre welcome :)
what information most likely presents a security risk on your personal
An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.
A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.
Some of the social characteristics and details of an individual that are shared on social media websites include the following:
Date of birth.Occupation.Religion.Gender (sex).Location.Friends.However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.
In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.
Read more: https://brainly.com/question/21765376
3.5.7: Rectangle, Part 2 its python coding
The program which calculates the area of a rectangle written in python 3 is given thus :
def calc_area_rectangle(length, width):
#initialize a function named calc_area_rectangle which takes in two arguments
area= length * width
#the products of the arguments which are the length and width of value of the rectangle is assigned to the variable named area
return round(area, 2)
#the function returns the value of area rounded to 2 decimal places.
print(calc_area_rectangle(10, 20))
#sample run of the program
Learn more :https://brainly.com/question/25162828
1. Define the term M.A.N.
is a technique for breaking a problem down into smaller, less complex parts.
A- Pattern recognition
B- Decomposition
Answer:
B) decomposition
Explanation:
I got it right on the test
how to get into someones phone without knowing the password iphone
Answer:
you should not do that unless you have a good reason to.
You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do
Answer:
You can go to the windows group policy settings and turn the security mode to thw highest or just installing a AV system that has a good reputation.
Hope this help please give the brainliest award would be much appreciated.
What is the maximum number of guesses it will take to find a number
between 1 and 64?
Answer:
10?
Explanation: