1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
7

What tool do you use to secure remote access by users who utilize the internet??

Computers and Technology
1 answer:
madam [21]3 years ago
3 0
The tool that you use to secure remote access by users is VPN
You might be interested in
What is the answers please
Gre4nikov [31]
which question are u referring too
6 0
3 years ago
What should software firm design for the VR sample at Museum?
gladu [14]

The software firm design for the VR sample at Museum is a 360-degree video that shows a walk through of the virtual studio of a famous artist that is aided by a narration about the various piece of art that the user wants to focus on.

<h3>How is VR used in museums?</h3>

VR is known to be a technology that puts the user inside the experience they are viewing. It is known to be a kind of  interactive or it is one that take the shape of 360-degree video.

The use of VR is done so as to form or create museum tours, so that exhibits in the museum can be interactive, and to bring the different scenes to reality.

Learn more about museums from

brainly.com/question/95815

5 0
3 years ago
Establishing responsibilities, planning to best support the organization, acquiring validity, ensuring performance, conformity w
RUDIKE [14]

Answer: B. ISO 38500

Explanation:

ISO 38500 is an international Standard specifically developed by the International Organization for Standardization to oversee corporate governance of Information Technology. It lays down principles to guide directors and leaders of organizations on how to comply with regulatory requirements in the use of Information Technology within the firm.

The framework consists of six guiding principles in the use of I.T and they include; establishing responsibilities, planning or strategizing on how best to support the organization, acquisition of validity, ensuring performance, conformity with rules and respect of the human factor or behavior.

It was derived from the Australian Standard for Corporate Governance of Information and Communication Technology - AS 8015 - 200.

8 0
3 years ago
You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would
Bess [88]
To make my slide more effective, I would add two or three pale colors that would decorate it while not distracting viewers from the topic. I would also add visuals that would engage viewers and give them a better understanding of the material. Additionally, I would include more examples and details to give viewers a clearer picture of what I would be attempting to convey to them. The final thing I would do to the slide would be to organize it in a way that would present information well. In conclusion, in order to improve the effectiveness of a slide, I would make changes to its design and layout that would make it easier for viewers of the slide to understand.
4 0
2 years ago
The * key on the number keypad is used for _____.
12345 [234]

Answer:

multiply

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • A server-side extension ________________. provides its services to the web server in a way that is totally transparent to the cl
    13·1 answer
  • Which Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrato
    10·1 answer
  • Which technology uses regular phone lines and transmits at speeds up to 256 kbps?
    15·2 answers
  • A mobile base station (BS) in an urban environment has a power measurement of 15 µW at 175 m. If the propagation follows an inve
    9·1 answer
  • Based on your understanding of Moore’s Law, what do you predict will be the next trend in the evolution of computers?
    10·1 answer
  • Your classmate is frustrated because the code that was designed to add up her five quiz grades is not working properly.
    12·1 answer
  • Malware is a combination of which two words? A. malevolent and software B. malignant and software C. maladapted and software D.
    8·1 answer
  • Which command will provide us with a list of the available internal commands (commands that are part of Command Prompt, such as
    7·1 answer
  • You are about to repair and change the resistor (small components),but the components are too small to solder and hold,what tool
    12·1 answer
  • URGENT! Drag the tiles to the correct boxes to complete the pairs.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!