List of many potential users of the intranet, Computer Networking

Assignment Help:

List of many potential users of the Intranet

List of many potential users of the Intranet, both commonly used and not so commonly used.

  • Company Documents

o   Manuals

o   Building Maps

o   Airport Directions to other Company locations

o   Approved Vendors list

o   Company Newsletters

o   Procedures Library

o   Product Manuals

o   Daily Bulletins

o   History Graphs

o   Knowledge Base

o   Competition products, news and web sites

  • Customer related

o   Controlled Responses

o   Feedback Forum

o   Company Bulletin Boards

o   Company Store

o   News Flashes

o   Supplies Ordering

o   Database Queries

  • General Administration and Management

o   Departmental Budgets

o   Departmental FAQs (Frequently Asked Questions)

o   Employee Attendance

o   Intercom any Chatting

o   Internal Postings

o   Employee Orientation

o   Online Collaboration Projects

o   Organisational Charts

o   Security Policies

o   Trend Graphs

o   Equipment Checkouts

  • Training

o   Employee Proficiency Training

o   Training Materials

o   Video Training

  • Coordination and Control

o   Form Routing

o   Forms Library

o   Help Desk submission forms

  • Meetings related

o   Meeting Minutes

o   Meeting Schedules

o   Online Meetings

o   Meeting Room Schedules.

 


Related Discussions:- List of many potential users of the intranet

Show the network criteria, Network Criteria - Performance - It is able...

Network Criteria - Performance - It is able to be measured by transit time and response time. Affected by type of medium, number of users and connected HW/SW - Reliability

What are instance variables, What are instance variables? Instance vari...

What are instance variables? Instance variables are those which are explained at the class level. Instance variables require not be initialized before using them as they are au

What is piggybacked ack, What is piggybacked ACK The protocol will be i...

What is piggybacked ACK The protocol will be incorrect. Suppose that 3-bit sequence numbers we are using. Consider following situation: A just send frame 7. B gets frame

Error control in TCP, Q. Show the Error control in TCP? Error control ...

Q. Show the Error control in TCP? Error control in TCP Detect lost segments, out-of-order segments, corrupted segments and duplicated segments Three tools: chec

Prepare the network of spanning tree protocol -ccna, Prepare the Network  ...

Prepare the Network  Step 1: Disable all ports by using the shutdown command. Ensure that the initial switch port states are inactive with the shutdown command. Use the inter

Diffuse reflection in the basic illumination model, Question: (a) By ma...

Question: (a) By making use of an example, explain the Cohen-Sutherland line clipping algorithm. (b) Compare and contrast between the CMY and RGB colour models. (c) Expla

Network access technologies, Question 1 Explain the following with respect...

Question 1 Explain the following with respect to Data Encoding                     Digital Signaling of Digital Data                     Digital Signal Encoding Techniques Questi

Odd-even transposition algorithem, Algorithm:  Odd-Even Transposition //...

Algorithm:  Odd-Even Transposition //Input: N numbers that are in the unsorted form //Assume that element bi is assigned to pi for I=1 to N { If (I%2 != 0) //i.e Odd

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd