A company wide network,closed to public access,which uses internet type technology is called
a)Intranet b) Internet c) Extranet d)none of these

1 Answer

Answer :

a)Intranet

Related questions

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet

Last Answer : c. can be done on internet 

Description : How can the Word-Wide-Web be applied in an Intranet and Extranet?

Last Answer : The Word-Wide-Web can not be applied in an "Intranet" as that islocal to an organisation and not world wide. However the standardsthat are used to build the Word-Wide-Web can be used in anIntranet.

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : What is different between Internet, intranet, and extranet?

Last Answer : Apologize for any grammar mistakes. Internet is a term used for global information network as a whole and is not really relevant to other two terms. To speak about specifics we have intranet ... one local network,. This is often connected by VPN and would include satellite offices and teleworkers.

Description : Explain the difference between Internet, Intranet and Extranet.

Last Answer : All three are terminologies of a how a network can be accessed. They define the access levels for each user which is present inside and outside the network.  Internet: In this, all ... then it is extranet. They are provided access to a limited application in the organization.

Description : Intranet means a) A network within a single company b) Between different groups c) Communication between customers and sellers d) Cannot say

Last Answer : a) A network within a single company

Description : The meaning of Extranet is a) Global information system b) Sharing devices update c) Windows for selling d) A private network system to securely share part of business information with their clients.

Last Answer : d) A private network system to securely share part of business information with their clients.

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : Synonym of Internet is (1) Gopher (2) Intranet (3) Cyber Space (4) World Wide Web (WWW)

Last Answer :  Cyber Space

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : The difference between an e-business enhanced organization and an e-business enabled organization is: (a) Only an e-business enhanced organization uses the Internet. (b) Only an e-business ... applications. (d) Only e-business enhanced organizations have e-business units within their organization.

Last Answer : (d) Only e-business enhanced organizations have e-business units within their organization. 

Description : What is the full form of SWIFT? A) Society for Worldwide Internet Financial Telecommunications. B) Secret Wide Interbank Financial Telecommunications C) Society for Worldwide Interbank Financial Telecommunications D) None of the Above

Last Answer : C) Society for Worldwide Interbank Financial Telecommunications

Description : Software program used to view web pages is a. Web Technology b. Web Browser c. World wide web d. HTML

Last Answer : b. Web Browser

Description : Software program used to view web pages is a. Web Technology b. Web Browser c. World wide web d. HTML

Last Answer : b. Web Browser

Description : ...............................is a type of online advertising where you only pay when somebody clicks on company ads. a) Pay per click b) Use per visit c) Give per login d) Payment per access

Last Answer : a) Pay per click

Description : Differentiate between the terms Internet and Intranet. -Technology

Last Answer : InternetAccess by any individual with dial-up access. Information on Internet could be general, public and advertisement.IntranetAccess by only authorised employees. Information on Intranet could be specific, corporate and proprietary.

Description : ) IoT stands for:- a) Internet of Technology b) Intranet of Things c) Internet of Things d) Information of Things

Last Answer : c) Internet of Things

Description : A ………….. is a temporary connection that uses the Public Switched Telephone Network (PSTN) to connect to the Internet. -Technology

Last Answer : dial-up connection

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : A group of computers and other devices connected together is called ……………. A. Network B. Networking C. Intranet D. both b and c

Last Answer : A. Network

Description : A group of computers and other devices connected together is called ……………. a. Intranet b. Network c. None of these d. Networking

Last Answer : b. Network

Description : Uses of Information & Communication Technology in Millitary area. GPS Technology b. Wireless Technology c. Satellite system d. All of these

Last Answer : d. All of these

Description : Uses of Information & Communication Technology in Millitary are a. GPS Technology b. Wireless Technology c. Satellite system d. All of these

Last Answer : d. All of these

Description : During a merger and acquisition transaction, the ability to find and use good comparable data for a valuation is relatively ____________. a) easy because each successful company within an industry ... depth, product diversity and access to lines of credit seldom match the company being valued

Last Answer : d) difficult because size differential, management depth, product diversity and access to lines of credit seldom match the company being valued

Description : World Wide Web is being standard by a) Worldwide corporation b) W3C c) World Wide Consortium d) World Wide Web Standard

Last Answer : b) W3C

Description : What type of commerce is enable by technology a. Path-to-profitability b. E-commerce c. EBuy d. Internet

Last Answer : b. E-commerce

Description : What type of commerce is enable by technology a. Path-to-profitability b. E-commerce c. EBuy d. Internet

Last Answer : b. E-commerce

Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network

Last Answer : Answer : B

Description : WAN stands for: a) WAP Access Network b) Wireless Area Network c) Wide Area Network d) None of These

Last Answer : c) Wide Area Network

Description : What is the full form of WLAN? a) Wide Local Area Network b) Wireless Local Area Network c) Wireless Land Access Network d) Wireless Local Area Node

Last Answer : b) Wireless Local Area Network

Description : Line access and avoidance of collision are the main functions of: (A) the CPU (B) the monitor (C) network protocols (D) wide area networks 

Last Answer : (C) network protocols

Description : The most dynamic change in business technology in recent year is a)The speed of the Printers b)The move away from mainframe computers toward network system c)The cost of computers d)none of the above

Last Answer : b)The move away from mainframe computers toward network system

Description : Which of the following is an Internet-based company that makes it easy for one person to pay another over the Internet? a. electronic cheque b. electronic bill payment c. Conversion rates d. Financial cybermediary

Last Answer : d. Financial cybermediary

Description : What is the difference between internet and intranet ? Want an explanation ?

Last Answer : : The Internet is a set of networks around the world . References: Wikipedia.

Description : IAHC stands for…………………………………… A. International Ad Hoc Committee B. Internet Ad Hoc Committee C. Intranet Ad Hoc Council D. Intranet Ad Hoc Committee

Last Answer : A. International Ad Hoc Committee

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services

Last Answer : b. to allow intranet users to securely use specified internet services 

Description : Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-Commerce

Last Answer : c. filters packets travelling from and to the intranet from the internet 

Description : A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user’s application programs

Last Answer : a. routers which connect intranet to internet 

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : One advantage of dial-up-internet access is ___ 1) It utilises broadband technology 2) It utilizes existing telephone service 3) It uses a router for security 4) Modem speeds are very fast 5) None of these

Last Answer : Answer :2

Description : What is Extranet ?

Last Answer : Answer : Extranet is a part of the network that gives consumers and providers access to specific parts of the enterprise's intranet. It replaces or complements the existing Electronic Data Interchange (EDI) system.

Description : Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key: Using ‘Z’ as bogus character. (A) TAXERTZENZ (B) EXTRANETZZ (C) EZXZTRZANZET (D) EXTZRANZETZ

Last Answer : (A) TAXERTZENZ 

Description : What does the following definition refer to? "Achieving marketing objectives through the use of any electronic communications technology" a. e-business b. e-commerce c. e-marketing d. internet marketing

Last Answer : c. e-marketing

Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these

Last Answer : b. Computer Law