answersLogoWhite

0

Usually people like: partners, vendors, and suppliers of a company that has extranet.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What must you have to access an extranet?

The correct URL A valid username A password


What allows customers or suppliers to access part of a companys intranet?

extranet


What is the difference between an internet and extranet?

Internet : the global communication access via web. Extranet : Share the content by groups through cross enterprise boundary.


An allows authorized users to access internal corporate resources over a remote access connection?

Extranet


Which type of network provides customer's limited access to corperate data?

extranet


Which type of network provides customers with limited access to corporate data such?

Extranet


How can the world wide web be applied in an extranet?

The world wide web can be applied in an internet and extranet environment by allowing users of your site access to the internet. Employees and other


Explain how the world-wide-web can be applied in an intranet and extranet?

The world wide web can be applied in an internet and extranet environment by allowing users of your site access to the internet. Employees and other


Is extranet lan or wan?

Extranet is wan


Which type of nwtwork provides customers limited access to data such as inventory parts lists and orders?

Extranet


How the world wide web can be applied in an intranet?

The world wide web can be applied in an internet and extranet environment by allowing users of your site access to the internet. Employees and other


When was the extranet created?

The concept of the extranet emerged in the late 1990s, as businesses began utilizing the internet to share information with external partners, suppliers, and customers. While there isn't a specific date for the creation of the extranet, it evolved from the development of intranets and the broader adoption of internet technologies. This shift allowed organizations to extend their internal networks beyond their firewalls while maintaining control over access and security.