1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
5

Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at

the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Who does Shane need to get permission from before he installs the VPN
Computers and Technology
1 answer:
Valentin [98]3 years ago
7 0

Answer:

CAB

Explanation:

A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.

Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.

In this scenario, Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Thus, Shane needs to get permission from the CAB before he installs the VPN.

CAB is an acronym for Change Advisory Board (CAB) and it comprises of a group of business and information technology (IT) professional members who are saddled with the responsibility of evaluating a change and the potential risks this change may pose to the business before advising the business whether or not to adopt the change.

Hence, the Change Advisory Board (CAB) are empowered to stop or give authorization for the use of a software application, machinery or methods of production haven determined that they are safe, stable and secure to use.

You might be interested in
Use a search engine and spot the sponsored results for safer internet day.
snow_tiger [21]
What’s the question?
4 0
3 years ago
​ The _____ attribute tells a browser to parse the HTML and JavaScript code together, only pausing to process the script before
slava [35]

Answer:

"async" attribute

Explanation:

the async attribute is used on the html script tag, it is a Boolean attribute indicating that the browser should, if possible, load the script asynchronously and then parse it as soon as it’s downloaded.

7 0
4 years ago
Question # 7 Dropdown Select the correct word to complete the sentence. The original ARPANET had four nodes and connected groups
attashe74 [19]

Answer:

Facility

Explanation:

This is the answer because you can spell it out with Horizon.

4 0
3 years ago
Read 2 more answers
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Please someone help!!!!
Montano1993 [528]

Answer:

do what the directions say and you should be able to figure out the answer if not contact me through brainly

Explanation:

3 0
3 years ago
Other questions:
  • You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has d
    15·1 answer
  • 3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
    13·2 answers
  • The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100
    13·1 answer
  • The following processes are being scheduled using a preemptive, round-robin scheduling algorithm. Each process is assigned a num
    6·1 answer
  • Assume that we have an application with a total of 500,000 instructions where 20% of them are the load/store instructions with a
    14·1 answer
  • Should I Buy a 2070 super or 2060 super
    6·1 answer
  • In a sport like baseball, which of the following could be considered a “rule”?
    12·1 answer
  • Working with do-while loop
    9·1 answer
  • Which format has the largest file size?
    10·1 answer
  • Who is the traitor of UA?<br><br>1 Karishma<br><br>2 Yuga Aoyama<br><br>3 Denki <br><br>4 Mineta
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!