SlideShare a Scribd company logo
1 of 6
Download to read offline
Week13 Web Presentation

Using an Intranet Within a Company
              Group B



 s1160152   Masatoshi Nakahashi
 s1160153   Takuya Nakahara
 s1160154   Kosuke Nakamura
 s1160155   Hiroki Nakamura
Summary of Paragraph 1 and 2

●   An intranet is aparted from the rest of the
    Internet by a firewall.
●   The firewall enables employees to use the
    Internet.
●   A main component of an intranet is an email
    system.
●   The email system resembles Internet email.
Summary of Paragraph 3 and 4

●   Corporate databases with important information
    can be made available over the intranet via
    Webbased HTML documents and serch tools.

●   An intranet enables people to collaborate on
    their work electronically using groupware.
Summary of Paragraph 5 and 6

●   The corporation can link among business
    locations with video conferences that used an
    intranet. Because an intranet is faster than
    wider Internet.

●   Also using an intranet can contact with
    subcontractors on secure Web link.
Paragraph 7 and Conclusion
     Paragraph 7               Conclusion


Customers can browse     The Intranet is the local
   through catalogs,            network of
    order goods and        corporations or any
  submit the payment       organizations and it
  on the Corporation's      can use the email
   website using the       system, groupware
        intranet.          and public website.
Word List
●   Intranet
    Intranet is the network using Internet
    technology for a company and a university.

●   Firewall
    Firewall protects the local network and the
    computer from the Internet and keep the local
    network to secure.

More Related Content

What's hot

La3 Intranet
La3 IntranetLa3 Intranet
La3 IntranetCma Mohd
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network securityBev Robb
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofingijtsrd
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a Companys1120037
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslecscottdp3
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
English Week13
English Week13English Week13
English Week13s1160202
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using OutlookMichael Lew
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of ITMichael Lew
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeBrijesh Joshi
 
Fortinet in Pakistan
Fortinet in Pakistan Fortinet in Pakistan
Fortinet in Pakistan lukeschlim
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..Paulo Sambo
 

What's hot (18)

La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
 
Public wifi
Public wifiPublic wifi
Public wifi
 
w13presen
w13presenw13presen
w13presen
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Chp7 intranet
Chp7 intranetChp7 intranet
Chp7 intranet
 
Using an Intranet Within a Company
Using an Intranet Within a CompanyUsing an Intranet Within a Company
Using an Intranet Within a Company
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
End end-security
End end-securityEnd end-security
End end-security
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
English Week13
English Week13English Week13
English Week13
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Intranet and extranet
Intranet and extranet Intranet and extranet
Intranet and extranet
 
Fortinet in Pakistan
Fortinet in Pakistan Fortinet in Pakistan
Fortinet in Pakistan
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Internetintranetandextranet..
Internetintranetandextranet..Internetintranetandextranet..
Internetintranetandextranet..
 

Similar to Week13_Web_Presentation

Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaaDhani Ahmad
 
SW3 Presentation13
SW3 Presentation13SW3 Presentation13
SW3 Presentation13guest21076f
 
Week13 Presentation
Week13 PresentationWeek13 Presentation
Week13 Presentations1160247
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nineShaheen Khan
 
Week13
Week13Week13
Week13kaeg
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...ijcsit
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPNIRJET Journal
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 

Similar to Week13_Web_Presentation (20)

Week13 F
Week13 FWeek13 F
Week13 F
 
Week13
Week13Week13
Week13
 
eng_hw
eng_hweng_hw
eng_hw
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Internet
InternetInternet
Internet
 
Week13pre
Week13preWeek13pre
Week13pre
 
SW3 Presentation13
SW3 Presentation13SW3 Presentation13
SW3 Presentation13
 
Week13 Presentation
Week13 PresentationWeek13 Presentation
Week13 Presentation
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nine
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
SAFELY SCALING VIRTUAL PRIVATE NETWORK FOR A MAJOR TELECOM COMPANY DURING A P...
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPN
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Week13_Web_Presentation

  • 1. Week13 Web Presentation Using an Intranet Within a Company Group B s1160152 Masatoshi Nakahashi s1160153 Takuya Nakahara s1160154 Kosuke Nakamura s1160155 Hiroki Nakamura
  • 2. Summary of Paragraph 1 and 2 ● An intranet is aparted from the rest of the Internet by a firewall. ● The firewall enables employees to use the Internet. ● A main component of an intranet is an email system. ● The email system resembles Internet email.
  • 3. Summary of Paragraph 3 and 4 ● Corporate databases with important information can be made available over the intranet via Webbased HTML documents and serch tools. ● An intranet enables people to collaborate on their work electronically using groupware.
  • 4. Summary of Paragraph 5 and 6 ● The corporation can link among business locations with video conferences that used an intranet. Because an intranet is faster than wider Internet. ● Also using an intranet can contact with subcontractors on secure Web link.
  • 5. Paragraph 7 and Conclusion Paragraph 7 Conclusion Customers can browse The Intranet is the local through catalogs, network of order goods and corporations or any submit the payment organizations and it on the Corporation's can use the email website using the system, groupware intranet. and public website.
  • 6. Word List ● Intranet Intranet is the network using Internet technology for a company and a university. ● Firewall Firewall protects the local network and the computer from the Internet and keep the local network to secure.