What is an intranet that is restricted to an organization and certain outsiders, such as customers
and suppliers?
a. Client/server network
b. Intranet
c. Extranet
d. Thin client

1 Answer

Answer :

c. Extranet

Related questions

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet

Last Answer : c. can be done on internet 

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : An industry is less attractive for suppliers when the rivalry among existing competitors is: a. High b. Low c. More d. Less

Last Answer : a. High

Description : What is different between Internet, intranet, and extranet?

Last Answer : Apologize for any grammar mistakes. Internet is a term used for global information network as a whole and is not really relevant to other two terms. To speak about specifics we have intranet ... one local network,. This is often connected by VPN and would include satellite offices and teleworkers.

Description : How can the Word-Wide-Web be applied in an Intranet and Extranet?

Last Answer : The Word-Wide-Web can not be applied in an "Intranet" as that islocal to an organisation and not world wide. However the standardsthat are used to build the Word-Wide-Web can be used in anIntranet.

Description : Explain the difference between Internet, Intranet and Extranet.

Last Answer : All three are terminologies of a how a network can be accessed. They define the access levels for each user which is present inside and outside the network.  Internet: In this, all ... then it is extranet. They are provided access to a limited application in the organization.

Description : A continually evolving network of independent companies, suppliers, customers, even competitors, linked together to share skills, costs, and access to one another s markets is called a/an ... Virtual organization ; (b) Boundaryless organization ; (c) Modular organization (d) Integrated organization

Last Answer : (a) Virtual organization ;

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above

Last Answer : d. All the above

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : Which of the following refers to creating products tailored to individual customers? a. customization b. aggregation c. Direct materials d. Reverse auction

Last Answer : a. customization

Description : A business cannot be all things to all people. Instead, a business must: a. Identify target customers b. Identify the value of products/services as perceived by customers c. all of the above d. None of the above

Last Answer : c. all of the above

Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs

Last Answer : c. Entry barriers

Description : The threat of new entrants is high when it is: a. Hard for customers to enter the market b. Hard for competitors to enter the market c. Easy for competitors to enter the market d. Easy for customers to enter the market

Last Answer : c. Easy for competitors to enter the market

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing

Last Answer : d. Virtual marketing

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : Intranet means a) A network within a single company b) Between different groups c) Communication between customers and sellers d) Cannot say

Last Answer : a) A network within a single company

Description : Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit foranswer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets

Last Answer : Inter organizational networks

Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : b. Risk assessment

Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : d. Disaster recovery cost curve

Description : Location is extremely important to a retailer because: A)suppliers charge more to service stores in certain trading areas. B)a desirable location appeals to consumers' emotions and encourages them ... which the store must draw its customers. E)convenient location is an essential customer service.

Last Answer : D)location determines the trading area from which the store must draw its customers.

Description : Which item can a password be used to protect? a. Network b. File c. Folder d. All of the above

Last Answer : d. All of the above

Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above

Last Answer : d. All of the above

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : What determines the future IT infrastructure requirements for new equipment and additional network capacity? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : c. Capacity planning

Description : Changing the relationship with and services provided to customers in such a way that they will not think of changing suppliers is called …………. A) Lock in customers B) Lock out customers C) Lock in competitors D) Lock out competitors

Last Answer : A) Lock in customers

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : d. Biometrics

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... the assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... the assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client

Description : The network firms are required to be independent of the client a. For assurance engagements provided to an audit client. b. For assurance engagements provided to clients that are not audit clients, ... whenthe assurance report is expressly restricted for use by identified users. d. All of the above

Last Answer : For assurance engagements provided to an audit client.

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : The meaning of Extranet is a) Global information system b) Sharing devices update c) Windows for selling d) A private network system to securely share part of business information with their clients.

Last Answer : d) A private network system to securely share part of business information with their clients.

Description : What is true about SSO? A. SSO has multiple authentication server B. SSO managing single accesses to other systems C. In SSO, User sends the ticket to intranet server. D. All of the above

Last Answer : In SSO, User sends the ticket to intranet server.

Description : The difference between an e-business enhanced organization and an e-business enabled organization is: (a) Only an e-business enhanced organization uses the Internet. (b) Only an e-business ... applications. (d) Only e-business enhanced organizations have e-business units within their organization.

Last Answer : (d) Only e-business enhanced organizations have e-business units within their organization. 

Description : What are the features of client server network ?

Last Answer : Client Server Network Features The client-server network is easily expandable. This can be done for tens of thousands of users. Such networks have servers. Server computer hardware is generally advanced and these servers ... why the skills of network users are not so important.