Discuss Basics of Computer Science ”; Previous Next Computer Science is one of the disciplines of modern science under which, we study about the various aspects of computer technologies, their development, and their applications in the present world. Likewise, Computer Science includes a wide range of topics such as the development of Computer Technology (hardware and software), application of Computer technology in today’s life, information technology, computer threat, computer security, etc. However, we have segregated this tutorial into different chapters for easy understanding. Print Page Previous Next Advertisements ”;
Category: basics Of Computer Science
Computer Threat
Basics of Computer Science – Threat ”; Previous Next Threat in a computer system is a possible danger that might put your data security on stake. The damage is at times irreparable. Definition As defined by the National Information Assurance Glossary − “Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.” A computer threat can be “intentional” such as hacking or “accidental” such as malfunctioning of or physical damage. Types of Threat Following are the most common types of computer threats − Physical damage − It includes fire, water, pollution, etc. Natural events − It includes climatic, earthquake, volcanic activity, etc. Loss of services − It includes electrical power, air conditioning, telecommunication, etc. Technical failures − It includes problems in equipment, software, capacity saturation, etc. Deliberate type − It includes spying, illegal processing of data, etc. Some other threats include error in use, abuse of rights, denial of actions, eavesdropping, theft of media, retrieval of discarded materials, etc. Sources of Threat The possible sources of a computer threat may be − Internal − It includes employees, partners, contractors (and vendors). External − It includes cyber-criminals (professional hackers), spies, non-professional hackers, activists, malware (virus/worm/etc.), etc. Common Terms Following are the common terms frequently used to define computer threat − Virus Threats A computer virus is a program designed to disrupt the normal functioning of the computer without the permission of the user. Spyware Threats Spyware is a computer program that monitors user’s online activities or installs programs without user’s consent for profit or theft of personal information. Hackers Hackers are programmers who put others on threats for their personal gain by breaking into computer systems with the purpose to steal, change or destroy information. Phishing Threats It is an illegal activity through which phishers attempt to steal sensitive financial or personal data by means of fraudulent email or instant messages. How to Secure Your Computer System from Threats? Following are the significant tips through which you can protect your system from different types of threat − Install, use, and keep updated Anti-Virus in your system. Install, use, and keep updated a Firewall Program. Always take backups of your important Files and Folders. Use Strong and Typical Passwords. Take precaution especially when Downloading and Installing Programs. Install, use, and keep updated a File Encryption Program. Take precaution especially when Reading Email with Attachments. Keep your Children aware of Internet threats and safe browsing. Print Page Previous Next Advertisements ”;
Quick Guide
Basics of Computer Science – Quick Guide ”; Previous Next Fundamental Concept A computer is basically a programmable machine capable to perform arithmetic and logical operations automatically and sequentially. It is also known as a data processor, as it can store, process, and retrieve data as per the wish of the user. Data processing involves the following three activities − Input of data Manipulation/processing of data Giving output (i.e. management of output result) In computer system, data is arranged orderly and systematically. The term “computer” is derived from a Latin term “compute,” which means ‘to calculate.’ Initially, the computer system had been designed to calculate; it was intended to be a computing device. However, over a period of time, this device technically advanced; at present, it can perform a wide range of desirable works apart from data processing. Major Functions of Computer System Following are the core functions of a computer system − A computer accepts the command and/or data as input given by the user. A computer follows the instructions and stores the data given by the user. A computer processes the data as per the instructions given by the user. A computer gives the desirable results in the form of output. Salient Features of Computer System Following are the salient features of a Computer System − Automation − The operating system of a computer system is automatic, as no human intervention is required; simply you need to give the command and then it will do the work automatically. Speed − Depending upon the power of the computer, it can perform, it can take Millions of instructions per second. Storage − A computer system can store enormous quantity of data in different format. The storage capacity of a computer system is normally expressed in terms of Kilobytes (KB), Megabytes (MB), Gigabytes (GB), or Terabytes (TB). Accuracy − The accuracy of a computer system is very high. Versatility − A computer system is capable of performing a wide range of tasks. Diligence − A computer neither get tired nor lose concentration. Reliability − As a computer system always gives accurate result; therefore, its reliability is very high. Vast memory − A computer system can have a wide range of memory which can recall the desired data at any point of time. Evolution of Computer System The present Computer System has evolved after centuries of efforts from different intellectuals who contributed their works during different periods of time. Abacus is (most likely) considered as the earlier counting device. Let us now read about the innovators who contributed immensely in the development of a computer system. John Napier Napier was a Scottish mathematician who invented logarithms. Further, Napier also invented a computing device, which consisted of sticks with numbers imprinted on them. Napier named sticks ‘bones,’ as they were made up of bones. Blaise Pascal Pascal was a French mathematician who invented a machine based on gear wheels, which helped greatly in calculation. Charles Babbage Babbage was an English Polymath, Mathematician, Mechanical Engineer, Philosopher, and Inventor. In 1822, he developed a machine capable to calculate the successive difference of expression and prepared a table which helped him in his calculations. Lady Ada Lovelace Lovelace was an English mathematician, who researched on Babbage’s work. She has given the concept that ‘computers can be programmed’. Her work helped a great deal in the advancement of computer system. John Atanstoff With the assistance of Berry, John Atanstoff developed the Atanstoff Berry Computer (more popular as ABC) in 1937. It marked the beginning of the development of electronic digital computer. John Mauchly and Eckart In 1947, John Mauchly and Eckart developed the first large scale Electronic Digital Computer. It was called the Electronic Numerical Integrator and Calculator (ENIAC). Maurice V. Wilkes In 1949, Wilkes (at Cambridge University) designed Electronic Delay Storage Automatic Calculator (EDSAC). It was the first computer that started its operating system on the stored program concept. Role of Computer in Today’s World In today’s world, for almost every activity whether personal (for example, operating personal savings bank account) or business-related (for example, selling any product or services); in some or the other way, we rely on the computer system. Due to the growing dependency on computers, every small and big organizations and other business companies have started offering computer-based service. Furthermore, the advancement of communications, electronic service networks, and multimedia have opened a new door for corporates by providing an effective way of business processing, payment transfer, and service delivery. Advantages of Computers in Business Following are the major advantages of introducing computer system in business − Independency As computers help in making the business automated, the businesses are becoming more and more independent. No more, there is the need to put man-power for every work, as with the help of computer most of the works can be automated. Starting from ticket booking to a luxury car manufacturing, everything is automated. Cost Cutting A number of business are based online in recent times; therefore, there is no need to open business branch in every city, rather having one centralized inventory can make the business easier. There is no need to employ many man-power. Marketing With the use of computer system with Internet facility, it is very simple to make a business global in a given period of time. Website, email, social media websites, online advertisements, etc. are the important tools of online marketing. Huge Transaction Capacity A number of tasks are being done by computer including ticket booking to money transactions; this increases the transaction capacity. Huge Storage Capacity Normally,
Online Quiz
Basics of Computer Science Online Quiz ”; Previous Next Following quiz provides Multiple Choice Questions (MCQs) related to Basics of Computer Science. You will have to read all the given answers and click over the correct answer. If you are not sure about the answer then you can check the answer using Show Answer button. You can use Next Quiz button to check new set of questions in the quiz. Q 1 – Consider the following statements: 1. In 1985, Microsoft launched the revolutionary operating systems and named it ‘Window.’ 2. Window programs employ a Graphical User Interface (GUI). Choose the correct answer from the codes given below: A – Only 1 B – Only 2 C – Both D – Neither 1 nor 2 Answer : C Explanation GUI facilitates its users to give command only on clicking on-screen symbols. It also facilitates users to perform multiple task simultaneously. Show Answer Q 2 – The malware that fetches the personal data such as bank details, credit/card details, password, etc. from remotely located computers is known as … A – Virus B – Worms C – Trojans D – Spyware Answer : C Explanation Through spyware, hacker records all the activities done on other targeted computers. Spyware records and transmits the data entered by using keyboards. Show Answer Q 3 – In reference to data encryption, consider the following statements: 1. Keys of encryption are characteristically stored in the computer files itself and they are also encrypted. 2. Keys can be assessed only with a passphrase. Choose the correct answer from the codes given below: A – Only 1 B – Only 2 C – Both D – Neither 1 nor 2 Answer : C Explanation Keys are similar to passwords, but they are much longer. Show Answer Q 4 – Consider the following statements: 1. The term DOS stands for Disk Operating System. 2. Loading operating files into the main memory of computer is known as booting up. Choose the correct answer from the codes given below: A – Only 1 B – Only 2 C – Both D – Neither 1 nor 2 Answer : C Explanation Only after booting up computer is ready to use. Show Answer Q 5 – If you restart your computer by selecting the restart button, it is known as … A – Soft boot B – Cold boot C – Warm boot D – A & C Answer : D Explanation One can also restart a computer by pressing Ctrl + Alt + Del keys simultaneously. Show Answer Q 6 – The Fifth Generation Computer works on … A – Transistors B – Integrated circuit C – Artificial Intelligence D – Microprocessor Answer : C Explanation Fifth generation computer was an initiative by Japan”s Ministry of International Trade and Industry. Show Answer Q 7 – Who among the following is popular as the father of computer? A – Charles Babbage B – Scott Aaronson C – Charles Bachman D – David A. Bader Answer : A Explanation N/A Show Answer Q 8 – Who among the following has designed the PHP programing language? A – Rasmus Lerdorf B – Guido van Rossum C – Brendan Eich D – James Gosling Answer : A Explanation Rasmus designed PHP in 1995. Show Answer Q 9 – Who among the following has created the ‘twitter?’ A – Jack Dorsey B – Butler Lampson C – Ronald Rider D – Greg Chesson Answer : A Explanation Twitter was created in 2006. Show Answer Q 10 – Who among the following is popular as ‘Mother of Internet?’ A – Radia Perlman B – Ada Lovelace C – Grace Hopper D – Anita Borg Answer : A Explanation Perlman has invented spanning tree protocol in 1985. Show Answer Q 11 – Which among the following correctly defines the working of a computer? A – Calculate and process all sorts of data useful for human beings B – Store data C – Store data and delete data D – Play movie and video games Answer : A Explanation Computer is a machine, which has the ability to follow a sequence of operations, known as programs and make human works flexible and useful. Show Answer Q 12 – Magnetic disks are coated with … A – Magnesium oxide B – Iron oxide C – Sulphur dioxide D – Nitric oxide Answer : B Explanation Magnetic disk or simply disk is an information storage device. Show Answer Q 13 – Which among the following is known as ‘point-and-draw’ device? A – Keyboard B – Scanner C – Mouse D – CPU Answer : C Explanation N/A Show Answer Q 14 – Consider the following statements: 1. Algorithm is a set
Computer Science: Abbreviations ”; Previous Next In this chapter, we will discuss the different abbreviations in Computer Science. The following table lists down those abbreviations − Abbreviation Full-name A/D Analog-to-Digital ABC Atanasoff Berry Computer ACM Association for Computing Machinery AI Artificial Intelligence ALGOL Algorithic Language ALU Arithmetic Logic Unit AMD Advanced Micro Devices ARPANET Advanced Research Project Agency Network ASCII American Standard Code for Information Interchange BASIC Beginners All-purpose Symbolic Instruction Code BCD Binary Coded Decimal BIOS Basic Inpute Output System BIPS Billions of Instructions Per Second BPI Bytes Per Inch CAD Computer Aided Design CAE Computer Aided Engineering CAN Campus Area Network CASE Computer Aided Software Engineering CD Compact Disk CDC Control Data Corporation CD-R CD-Recordable CD-ROM Compact Disk Read Only Memory CD-RW CD Read/Write CL Command Language CLI Command Line Interface COBOL Common Business Oriented CODASYL Conference On Data Systems CPU Central Processing Unit CRT Cathode Ray Tube D/A Digital-to-Analog DAT Digital Audio Tape DBMS Data Base Management System DBS Demand Based Switching DDL Data Definition Language DDS Digital Data Storage DEC Digital Equipment Corporation DMA Direct Memory Access DNA Digital Network Architecture DPI Dots Per Inch DRAM Dynamic RAM DSN Distributed Systems Network DTS Digital Theater System DVD Digital Video/Versatile Disk EBCDIC Extended Binary Coded Decimal Interchange Code EDSAC Electronic Delay Storage Automatic Calculator EDVAC Electronic Discrete Variable Automatic Calculator EFM Eight-to-Fourteen Modulation ENIAC Electronic Numerical Integrator And Calculator EPG Electronic Programming Guide EPIC Explicitly Parallel Instruction Computing EPROM Erasable Programmable Read-Only Memory FAT File Allocation Table FDM Frequency Division Multiplexing FEP Front End Processor FLOPS Floating Point Operations Per Second FM Frequency Modulation FMS File Management System FORTRAN FORmula TRANslation FSK Frequency Shift Keying FTP File Transfer Protocol GB Giga Bytes GFLOPS Giga FLOPS GHz Giga Hertz GNU Gnu Not Unix GPRS General Packet Radio Service GSM Global System for Mobile communication GUI Graphical User Interface HP Hewlett Packard HSS Hierarchical Storage System HTML HyperText Markup Language HTTP HyperText Transport Protocol IBM International Business Machine IC Integrated Circuit IDN Integrated Digital Networks IP Internet Protocol IrDA Infrared Data Association ISDN Integrated Services Digital Network ISP Internet Service Provider JPEG Joint Photographic Experts Group JRE Java Runtime Engine JSP Java Server Pages KB Kilo Bytes KHz Kilo Hertz LAN Local Area Network LCD Liquid Crystal Display LED Light Emitting Diode LPM Line Per Minute LSI Large Scael Integration MAN Metropolitan Area Network MAR Memory Address Register MB Mega Bytes MBR Memory Buffer Register MHz Mega Hertz MIDI Musical Instrument Digital Interface MIPS Millions of Instructions Per Second MNP Microcom Network Protocol MPEG Moving Pictures Experts Group MS-DOS MicroSoft Disk Operating System MVT Multiprogramming with Variable Tasks NIC Network Interface Card NICNET National Informatics Center NETwork NOS Network Operating System OCR Optical Character Recognition OMR Optical Mark Reader OS Operating System OSI Open System Interconnection OSS Open Source Software PAN Personal Area Network PC Personal Computer PDF Portable Document Format PDL Program Design Language PDP Program Data Processor PIP Peripheral Interchange Program PROM Programmable Read-Only Memory QoS Quality of Service RAM Random Access Memory ROM Read Only Memory SDLC Software Development Life Cycle
Useful Resources
Basics of Computer Science – Useful Resources ”; Previous Next The following resources contain additional information on Basics of Computer Science. Please use them to get more in-depth knowledge on this. Useful Video Courses Computer Networks Online Course 107 Lectures 8 hours Tutorialspoint More Detail Computer Fundamentals Online Training 47 Lectures 2.5 hours Tutorialspoint More Detail Computer Networks Security from Scratch to Advanced Best Seller 52 Lectures 8 hours Mohammad Adly More Detail Computer Network Basics 20 Lectures 2 hours TELCOMA Global More Detail Computer Hardware, Operating System and Networking Best Seller 43 Lectures 20 hours ILANCHEZHIAN K More Detail Computer Hardware, Operating System and Networking (Tamil) – தமிழில் 45 Lectures 20 hours ILANCHEZHIAN K More Detail Print Page Previous Next Advertisements ”;
Short-cut Keys
Short-cut Keys ”; Previous Next The following table shows the different short-cut keys frequently used while working on the computer system − Function Short-cut keys Commonly Used Short-cut Keys F1 Universal help (for any sort of program). Alt + F File menu options in current program. Alt + E Edits options in current program. Ctrl + A Selects all text. Ctrl + X Cuts the selected item. Ctrl + C Copies the selected item. Ctrl + V Pastes copied item. Home Takes the user to the beginning of the current line. End Takes the user to the end of the current line. Ctrl + Home Takes the user to the beginning of the document. Ctrl + End Takes the user to the end of the document. Shift + Home Highlights from the current place to the beginning of line. Shift + End Highlights from the current place to the end of line. Microsoft Windows Shortcut Keys Ctrl + F4 Closes window in program. Alt + F4 Closes current open program. F2 Renames the selected icon. F3 Start find from desktop. F4 Opens the drive selection when browsing. F5 Refreshes contents. Alt + Tab Switches from one open application to another open application. Alt + Shift + Tab Switches backwards between open applications. Alt + Print Screen Creates screen shot for current program. Ctrl + Alt + Del. Opens windows task manager/reboot. Ctrl + Esc Brings up start menu. Alt + Esc Switches between applications on taskbar. Ctrl + Plus (+) Key Automatically adjusts widths of all columns in Windows Explorer. Alt + Enter Opens properties window of selected icon or program. Shift + F10 Simulates right-click on selected item. Shift + Del Deletes selected programs/files permanently. Holding Shift During Boot-up Enables boot safe mode or bypass system files. Ctrl + N Starts a new note. Ctrl + O Opens a recently used note. Ctrl + S Saves changes to a note. Ctrl + P Prints a note. Alt + F4 Closes a note and its Journal window. Ctrl + Z Helps Undo a change. Ctrl + Y Helps Redo a change. Ctrl + A Selects all items on a page. Ctrl + X Cuts a selection. Ctrl + C Copies a selection to the Clipboard. Ctrl + V Pastes a selection from the Clipboard. Esc Cancels a selection. Ctrl + F Start a search tool. Ctrl + Shift + C Display a shortcut menu for column headings in a note list. Microsoft Word Shortcut Keys Ctrl + N Creates a new document. Ctrl + O Opens an existing document. Ctrl + S Saves changes to a document. F12 Saves the document as a new file. Ctrl + P Prints a document. Ctrl + Z Helps Undo a change. Ctrl + Y Helps Redo a change. Ctrl + A Selects the whole document. Ctrl + X Helps cut a selection Ctrl + C Copies a selection to the Clipboard. Ctrl + V Pastes a selection from the Clipboard. Ctrl + B Makes selected text bold. Ctrl + I Italicizes selected text. Ctrl + U Underlines selected texts. Ctrl + L Aligns text left. Ctrl + R Aligns text right. Ctrl + E Aligns text center. Ctrl + J Helps justify text. Ctrl + 1 Sets single line spacing. Ctrl + 2 Sets double line spacing. Ctrl + 5 Sets line spacing to 1.5. Ctrl + Shift + A Changes characters to all capitals. Ctrl + D Inserts a Microsoft Paint drawing. Ctrl + F Finds text Ctrl + Home Moves to the beginning of the document. Ctrl + End Moves to the end of the document. Print Page Previous Next Advertisements ”;
Computer Multimedia
Basics of Computer Science – Multimedia ”; Previous Next In this chapter, we will discuss how the Computer Multimedia works. If a system presents, some information through more than two media, it is known as multimedia. For example, TV presents audio and video; book presents text, image, and graphs, computer, etc. The information presented through multimedia has better quality and capability, as it can be understood easily. The advanced computer system is a great example of modern multimedia. Literal Meaning of Multimedia In this section, we will understand the literal meaning of multimedia. Multi − it means more than one Medium − it is singular and it means intermediary or mean Media − it is plural and it means conveying the information Likewise, Multimedia is the field of Computer Science that integrates different forms of information and represents in the form of audio, video, and animation along with the traditional media, i.e., text, graphics/drawings, images, etc. Multimedia Computer System Multimedia computer system has high capacity to integrate different media including text, image, graphics, audio, and video. The multimedia computer system stores, represents, processes, manipulates, and makes available to users. Significant Features of Multimedia Computer System Following are the major features multimedia computer system − Its Central Processing Unit (CPU) is very fast, as it needs to process large amount of data. It has huge storage capacity. It has huge memory power that helps in running heavy data programs. It has high capacity graphic card that helps in displaying graphics, animation, video, etc. The sound system makes it easy to listen to audio. With all these features (discussed above), a computer system is known as high end multimedia computer system. However, all the features listed above are not essentially required for every multimedia computer system, but rather the features of a multimedia computer system are configured as per the need of respective user. Multimedia Components Following are the major components of a multimedia computer system − Text It contains alphanumeric and some other special characters. Keyboard is usually used for input of text; however, there are some internal (inbuilt) features to include such text. Graphics It is technology to generate, represent, process, manipulate, and display pictures. It is one of the most important components of multimedia application. The development of graphics is supported by a different software. Animation Computer animation is a modern technology, which helps in creating, developing, sequencing, and displaying a set of images (technically known as ‘frames’). Animation gives visual effects or motion very similar to that of a video file (see image given below). Audio This technology records, synthesizes, and plays audio (sound). There are many learning courses and different instructions that can be delivered through this medium appropriately. Video This technology records, synthesizes, and displays images (known as frames) in such sequences (at a fixed speed) that makes the creation appear as moving; this is how we see a completely developed video. In order to watch a video without any interruption, video device must display 25 to 30 frames/second. Multimedia Application Let us now see the different fields where multimedia is applied. The fields are described in brief below − Presentation With the help of multimedia, presentation can be made effective. E-books Today, books are digitized and easily available on the Internet. Digital Library The need to be physically present at a library is no more necessary. Libraries can be accessed from the Internet also. Digitization has helped libraries to come to this level of development. E-learning Today, most of the institutions (public as well as private both) are using such technology to education people. Movie making Most of the special effects that we see in any movie, is only because of multimedia technology. Video games Video games are one of the most interesting creations of multimedia technology. Video games fascinate not only the children but adults too. Animated films Along with video games, animated film is another great source of entertainment for children. Multimedia conferencing People can arrange personal as well as business meetings online with the help of multimedia conferencing technology. E-shopping Multimedia technology has created a virtual arena for the e-commerce. Print Page Previous Next Advertisements ”;
Computer Security
Basics of Computer Science – Security ”; Previous Next Advancement of computer technology has radically changed the world; resultantly, most of the works whether it is matter of nation’s security system or buying a shoe online everything depends on computer. Such increased dependency also raises the issue of security, as most of the data is now stored in the computer system. Your computer systems store various sorts of data and hence if it is not secured, then you might be in for a big trouble. Why Do We Computer Security? Let us now see why do we need Computer security. It is required for the following major reasons − To prevent damage of the hardware. To prevent theft or damage of the installed software. To prevent theft or damage of stored data and information. To prevent the disruption of service. Likewise, security system keeps the computer system safe by protecting the installed software and the stored data (information). Protection of Data and Information Following are the important steps to protect data − Make backup of all your important files. Keep your system virus by using anti-virus software. Keep updating your computer system. Run disk defragmenter and disk cleanup on certain interval of time. Use a firewall. Use anti-spyware software. Further, if you use internet, then you need to take greater precaution. Consider the following points to understand the precautions that need to be taken − Do not click on any link that you don’t know (as it may be dangerous for your computer – virus attack). Do not open unauthorized an unlawful website (it may damage your computer system). Do not download unsolicited data from unknown website. What is Defragmentation? Frequent saving and deleting of file (data) from the hard disk creates problems in performance and also reduce the space; therefore, defragmentation again clean-up the drive and restore the system to run smoothly. Following are the simple steps of defragmentation − Disk Cleanup While browsing websites (on internet), many of the files get stored in the hard disk automatically (actually these stored files later help to reopen the website faster); besides some other cookies also get stored in the hard disk. All these stored files create problem along with eating space. So, disk cleanup process cleans all these files and releases the space occupied by these unwanted files. Following are the simple steps of disk cleanup − Print Page Previous Next Advertisements ”;
Extranet
Basics of Computer Science – Extranet ”; Previous Next An extranet is a sort of personalized service, which is controlled and regulated by private network. This personalized and controlled technology provides access only to partners, vendors, and suppliers; sometimes, not essentially, but also to some specific customers. An extranet is a private network organization, which is actually the part of respective company’s intranet and its services are extended to users outside the company. Sometimes, it is also considered as a specialized technique to practice business with other companies and selling products to the customers. In order to do business with other business partners, extranet technology facilitates the intranet from one location to other and also provides security to data flow. An extranet service requires firewall server management in order to provide security and privacy. Features of Extranet Services Following are the significant features of extranet services − Extranet is an extended Internet service to the private business network. The services extend outside the corporate firewall. Sometimes, it can be referred to an Intranet, as it can be (partially) accessible to some outsiders (with permission). The technique of extranet links two (or more) business organizations who share common business goals. Application of Extranet Extranet can be applied for the following services − It facilitates collaborative business between two (or more) companies By using this technology, a joint training program (with other company) is conducted By using electronic data interchange, large volumes of data are shared swiftly It is used to share product catalogs especially with wholesalers Extranet service is also used in providing customer support It is used to share business news with partner companies Advantages of Extranet The advantages of Extranet services are as follows − It makes business (services) swift and faster. It helps greatly in improving the business communication. It helps in reducing the cost (especially in terms of stationery stuff). It helps in improving the efficiency and confidence of the employees. It reduces some big physical barriers (especially the geographical distance). Major Fields Using Extranet Following are some of the major fields that are using Extranet service on a large scale − Corporate houses Government offices Education centers Intranet is more localized, as only internal employees have the accessibility. In contrast, Extranet covers a wider area, as outsiders (such as partner, vendor, or even customer) have the authorized accessibility. Print Page Previous Next Advertisements ”;