Differentiate between the terms Internet and Intranet. -Technology

1 Answer

Answer :

InternetAccess by any individual with dial-up access. Information on Internet could be general, public and advertisement.IntranetAccess by only authorised employees. Information on Intranet could be specific, corporate and proprietary.

Related questions

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : ) IoT stands for:- a) Internet of Technology b) Intranet of Things c) Internet of Things d) Information of Things

Last Answer : c) Internet of Things

Description : What is the difference between internet and intranet ? Want an explanation ?

Last Answer : : The Internet is a set of networks around the world . References: Wikipedia.

Description : What is different between Internet, intranet, and extranet?

Last Answer : Apologize for any grammar mistakes. Internet is a term used for global information network as a whole and is not really relevant to other two terms. To speak about specifics we have intranet ... one local network,. This is often connected by VPN and would include satellite offices and teleworkers.

Description : Explain the difference between Internet, Intranet and Extranet.

Last Answer : All three are terminologies of a how a network can be accessed. They define the access levels for each user which is present inside and outside the network.  Internet: In this, all ... then it is extranet. They are provided access to a limited application in the organization.

Description : IAHC stands for…………………………………… A. International Ad Hoc Committee B. Internet Ad Hoc Committee C. Intranet Ad Hoc Council D. Intranet Ad Hoc Committee

Last Answer : A. International Ad Hoc Committee

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services

Last Answer : b. to allow intranet users to securely use specified internet services 

Description : Firewall as part of a router program a. filters only packets coming from internet b. filters only packets going to internet c. filters packets travelling from and to the intranet from the internet d. ensures rapid traffic of packets for speedy e-Commerce

Last Answer : c. filters packets travelling from and to the intranet from the internet 

Description : A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user’s application programs

Last Answer : a. routers which connect intranet to internet 

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet

Last Answer : c. can be done on internet 

Description : The difference between an e-business enhanced organization and an e-business enabled organization is: (a) Only an e-business enhanced organization uses the Internet. (b) Only an e-business ... applications. (d) Only e-business enhanced organizations have e-business units within their organization.

Last Answer : (d) Only e-business enhanced organizations have e-business units within their organization. 

Description : Synonym of Internet is (1) Gopher (2) Intranet (3) Cyber Space (4) World Wide Web (WWW)

Last Answer :  Cyber Space

Description : Differentiate between E_mail and video conferencing. -Technology

Last Answer : E- mailVideo ConferencingE-mail refers to sending and receiving messages electronically.Video conferencing is similar to face-to-face communication between two or more people.It is not necessary for the senderand ... same time.It is necessary for sender and receiver to be online at the same time.

Description : Differentiate between long distance wireless media and short distance wireless media. -Technology

Last Answer : Differences between long distance and short distance wireless media are as follows:Long distance wireless mediaShort distance wireless mediaIt supports communication over a long distance, i.e. upto ... distance wireless media.Bluetooth, infrared, wi-fi, WiMAX are short distance wireless media.

Description : Differentiate LAN, MAN and WAN on the basis of following characteristic: 1. Geographical Area 2. Example 3. Distance 4. Cost 5. Ownership -Technology

Last Answer : Differences between LAN, MAN and WANBasisLANMANWANGeographicalAreaGenerally within a buildingWithin a cityAcross the continentsDistanceUpto 5 kmUpto 160 kmUnlimitedOwnershipPrivatePrivate Private or PublicShared ... than MANExampleNetwork within your schoolCable TV network within a cityInternet

Description : Differentiate between container and empty elements used in HTML. -Technology

Last Answer : Container elements HTML container elements require a starting as well as an ending tags.e-g , , .They affect the text appearing between their starting and ending tags.Empty elements HTML empty elements require just a ... and not an ending tag.e.g. , , .They just carry out the job assigned to them.

Description : Differentiate between data and information. -Technology

Last Answer : The raw facts are called as data while the data after processing is called as information.

Description : Differentiate between the types of multimedia with the help of an example. -Technology

Last Answer : Linear and non-linear multimedia are two different categories that are applicable to the world of multimedia. The main difference is that linear multimedia does not feature any sort of navigational abilities.Differences ... interactive.e.g. A movie, Documentary3. It is interactive.e.g. Game, E-Book.

Description : Differentiate between hard and soft real_time operating systems. -Technology

Last Answer : Difference between hard and soft real-time OS are as follows:Hard Real-Time OSSoft Real-Time OS1. A hard real-time system guarantees that critical tasks complete on time.1. A soft real-time ... .3. Usually, they are periodic tasks scheduled in background, during the idle time of the processor.

Description : Differentiate between CUI and GUI. -Technology

Last Answer : Differences between CUI and GUI are as follows:CUIGUICUI stands for Character User Interface.GUI stands for Graphical User Interface.In CUI, user interacts with applications by making use of commands.In GUI, user interacts with ... to be loaded such as icons, fonts etc. e.g. MS-DOS. e.g. Windows.

Description : Differentiate between cellspacing and cellpadding in HTML table. -Technology

Last Answer : Differences between cellpadding and cellspacing are as follows:CellpaddingCellspacingCellpadding is used for formatting purpose which specifies the space needed between the edges of the cells and also in the ... value of cellpadding attribute is 1.The default value of cellspacing attribute is 2.

Description : Differentiate between full backup and differential backup. -Technology

Last Answer : Differences between the full backup and differential backup are as follows:Full backupDifferential backupA complete backup of everythingthat you want to back up.The backup software looks at which fileshave changed ... since you onlyneed one set of backup data.Faster to create than a full backup.

Description : Differentiate between digital certificate and digital signature. -Technology

Last Answer : Differentiate between a digital certificate and digital signature are as follows:Digital certificateDigital signatureDigital certificates are typically used inWebsites to increase theirtrustworthiness to its users ... digital signatures, the receivercan verify that the information is not modified.

Description : Differentiate between hackers and crackers. -Technology

Last Answer : Differences between hackers and crackers are as follows:HackersCrackersA hacker is a person intensely interested inthe arcane and recondite working of anycomputer operating system.A cracker ... andnever intentionally damage data.Crackers can easily be identified because theiractions are malicious.

Description : Differentiate between a presentation and a slide. -Technology

Last Answer : A presentation is a set of slides that you present to people in a group while each page of a PowerPoint presentation is called a slide.

Description : Differentiate between Slide Transition and Custom Animation. -Technology

Last Answer : Differences between slide transition and custom animation are as follows:Slide TransitionCustom Animation1. Slide transitions are the looks that take you from one slide to the next.1. Custom Animations ... transitions apply to slides themselves.2. Custom Animations are applied to objects on a slide.

Description : Differentiate between Multicast and Unicast. -Technology

Last Answer : Multicast – Radio, TV and Satellite communication is referred to as Multicast, meaning one-way communication from single sending source to unlimited number of receivers.The internet transmission is 'Unicast‟, referring to two-way communication and being interactive.

Description : Differentiate between and tag with suitable example. -Technology

Last Answer : stands for Ordered List which can be either numerical or alphabetical while stands for Unordered List which can be either ... AND OUTPUTCODEHobbiesprogrammingDramaticsCODEHobbiesGamesProgrammingDramaticsOUTPUTHobbies1. Games2. Programming3. DramaticsOUTPUTHobbies1. Games2. Programming3. Dramatics

Description : Differentiate between Crackers & Hackers. -Technology

Last Answer : In computing, a hacker is any skilled computer expert who uses their technical knowledge to overcome a problem or otherwise gains remote access to a protected computer system mainly to get thrill ... , crackers destroy vital data, deny legitimate users service, or cause problems for their targets.

Description : Differentiate between Blur and Sharpen tool -Technology

Last Answer : Blur ToolSharpen ToolBlur mode causes each pixel affected by the brush to be blended with neighbouring pixels, thereby increasing the similarity of pixels inside the brushstroke areaSharpen mode causes each ... Sharpen mode, the tool works by increasing the contrast where the brush is applied.

Description : Differentiate between Web sites and Web pages with suitable example of each. -Technology

Last Answer : Thedifference between awebsiteand aweb pageis that awebsiteis a collection ofwebpages with information on a subject, and aweb pageis a smaller part of a largerwebsiteusually containing more specific information. If awebsitewere a book, then awebpagewould be a chapter in that book.

Description : Differentiate between Websites and Webpages with suitable example of each. -Technology

Last Answer : Using the same book analogy, while awebpageis apagefrom a book, awebsiteis the book itself. It is a collection of thepagesthat share a common thread. Similarly, all thewebpagesof yourwebsitecome together to form yourwebsite.

Description : Jellies over 40, (and under if you remember before the intranet age.) About correspondence.

Last Answer : Sincerely is what I use on my business and employment correspondence.

Description : Is ZFS compelling enough to introduce [Open]Solaris into our intranet at work?

Last Answer : Well I know very little about this matter but I guess I can point you to the ZFS wikipedia page, mainly the limitations section: http://en.wikipedia.org/wiki/ZFS#Limitations although the features may be nice ... etc. but sure you know this stuff if you're going to be under taking this task, right?

Description : How can the Word-Wide-Web be applied in an Intranet and Extranet?

Last Answer : The Word-Wide-Web can not be applied in an "Intranet" as that islocal to an organisation and not world wide. However the standardsthat are used to build the Word-Wide-Web can be used in anIntranet.

Description : Intranet means a) A network within a single company b) Between different groups c) Communication between customers and sellers d) Cannot say

Last Answer : a) A network within a single company

Description : A group of computers and other devices connected together is called ……………. A. Network B. Networking C. Intranet D. both b and c

Last Answer : A. Network

Description : A group of computers and other devices connected together is called ……………. a. Intranet b. Network c. None of these d. Networking

Last Answer : b. Network

Description : Which of the following can be identified as cloud? a) Web Applicationsb) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : What is true about SSO? A. SSO has multiple authentication server B. SSO managing single accesses to other systems C. In SSO, User sends the ticket to intranet server. D. All of the above

Last Answer : In SSO, User sends the ticket to intranet server.

Description : IDaaS stands for? A. ID-as-a-Service B. Identity-as-a-Service C. Intranet-as-a-service D. Interoperability-as-a-Service

Last Answer : Identity-as-a-Service

Description : Which of the following can be identified as cloud? a) Web Applications b) Intranet c) Hadoop d) All of the mentioned

Last Answer : Hadoop

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it