1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
2 years ago
5

Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at

the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Who does Shane need to get permission from before he installs the VPN
Computers and Technology
1 answer:
Valentin [98]2 years ago
7 0

Answer:

CAB

Explanation:

A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.

Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.

In this scenario, Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Thus, Shane needs to get permission from the CAB before he installs the VPN.

CAB is an acronym for Change Advisory Board (CAB) and it comprises of a group of business and information technology (IT) professional members who are saddled with the responsibility of evaluating a change and the potential risks this change may pose to the business before advising the business whether or not to adopt the change.

Hence, the Change Advisory Board (CAB) are empowered to stop or give authorization for the use of a software application, machinery or methods of production haven determined that they are safe, stable and secure to use.

You might be interested in
How to write conclusion of hard disk​
sergeinik [125]

Answer:

el disco duro es un componte de almacenamiento de una pc, su uso es de guardar archivos también como el sistema operativo de ejemplo :linux, window ,mac etc

Explanation:

7 0
3 years ago
Florida convicted __________ people of DUI in a one-year period from 2009 to 2010.
natka813 [3]
In 2009 at least 48,516 people were convicted of DUI and in 2010 at least 43,568. Both of the years together adds up to 92,084.

Hope this helps!
3 0
3 years ago
In this project, you will add a (self-proclaimed) priority attribute to xv6 processes. The priority does not actually do anythin
kondor19780726 [428]

Answer:

Priority programming is a process programming method based on priority. In this technique, the developer chooses the tasks to work according to priority, which is different from other types of programming, for example, a simple round-robin.

On UNIX and many other systems, higher priority values represent lower priority processes. Some of the systems, such as Windows, use the opposite convention: a higher number means a higher priority

<h3>Explanation: </h3>

Priorities can be dynamic or static. Static priorities are assigned during creation, while dynamic priorities are assigned according to the behavior of the processes while they are in the system. To illustrate, the planner could favor intensive input / output (I / O) tasks, allowing expensive requests to be issued as soon as possible.

Priorities can be defined internally or externally. Internally defined priorities make use of a measurable amount to calculate the priority of a given process. On the contrary, external priorities are defined using criteria beyond the operating system (OS), which may include the importance of the process, the type and sum of the resources used for the use of the computer, user preferences , trade and other factors such as politics etc.

i hope this is right lol

6 0
3 years ago
When using the text command, what needs to be around the word or words you<br> want to appear?
AysviL [449]

Answer:

In most programming languages "" are required around text.

Explanation:

Python: print("text")

HTML: <p>text</p>

C++: int Main() {

cout << "text" << endl;

}

Lua: print("text")

8 0
3 years ago
Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa
gladu [14]

Answer:

Ransomware

Explanation:

Just as its name implies, you have to pay a 'ransom' to get a locked file that  belongs to you

4 0
2 years ago
Other questions:
  • ____ data exist in a format that does not lend itself to processing that yields information.
    8·1 answer
  • NEED HELP(10 POINTS) PLEASE HELP MATH
    8·2 answers
  • Im being timed please help!!
    7·2 answers
  • Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?
    15·1 answer
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • Hello everyone. I need help. C programming. Create at least two more functions except the main () function to collect them.
    5·1 answer
  • In rolling a die four times, what is the odds that at least one 5 would appear?
    6·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • From which type of data storage does the CPU load information for processing during normal operation?
    14·1 answer
  • . Write at least three benefits of using a network.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!