A(n) ____ is a private network that uses Internet technologies to connect a business with its suppliers and business partners.
A. VAN
B. supply chain
C. intranet
D. extranet
Answer: D
You might also like to view...
In order to set a string to reference Nothing you must use:
a) string1 = Nothing b) string1 = "" c) string1 = '' d) Either a. or b.
Which of the following statements about asymmetric key cryptography is true?
A. Asymmetric key cryptography uses one shared key. B. Asymmetric key cryptography is also called private key cryptography. C. Asymmetric key cryptography uses two keys called public keys. D. Asymmetric key cryptography is also called public key cryptography.
A(n) ____ is someone who breaks into computer systems, launches Internet worms and viruses, or perpetrates other dubious computer-related vandalism.
A. encryption B. PGP C. utilitarian D. hacker
The height of binary trees can be mathematically predicted.
Answer the following statement true (T) or false (F)