1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
2 years ago
5

Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at

the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Who does Shane need to get permission from before he installs the VPN
Computers and Technology
1 answer:
Valentin [98]2 years ago
7 0

Answer:

CAB

Explanation:

A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.

Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.

In this scenario, Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Thus, Shane needs to get permission from the CAB before he installs the VPN.

CAB is an acronym for Change Advisory Board (CAB) and it comprises of a group of business and information technology (IT) professional members who are saddled with the responsibility of evaluating a change and the potential risks this change may pose to the business before advising the business whether or not to adopt the change.

Hence, the Change Advisory Board (CAB) are empowered to stop or give authorization for the use of a software application, machinery or methods of production haven determined that they are safe, stable and secure to use.

You might be interested in
Which of the following is most accurate?
Sphinxa [80]
D. Because its not the only measurement which says in a. Its not B because waist measurement is also important. and its not C since D is the perfect method
4 0
3 years ago
Sal Kan earned $3,000.00, But he is only getting $1,585.00 on his pay check to
svetlana [45]

Answer:

Usually, it's because of taxes and insurance.

3 0
3 years ago
Consider the following instructions for a game element: Move Forward If not at end, move forward Else stop This is an example of
xz_007 [3.2K]

Answer:

C.

Explanation:

8 0
2 years ago
1. Answer the following questions: a. What are the different types of number system? Name them.​
BigorU [14]

Answer:

binary,decimal, hexadecimal and octal number system

5 0
2 years ago
can any one tell me the difference between the things showed in the circle i will mark brainiest to the first one
Shalnov [3]

Answer:

The different brainly websites are different because they are associated with different countries. Each country has their own network and internet rules, and Brainly has to comply with each countries rules. Each country gets their own Brainly site. So, Brainly.com is for the US, Brainly.pl is for Poland, etc.

Explanation:

3 0
3 years ago
Other questions:
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • Ian is working as a sales manager. He has to generate sales reports using mathematical data that his team has collected. Which c
    15·1 answer
  • Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable
    10·1 answer
  • Who can help me with 50 varables on codeskulptor​
    8·1 answer
  • The national highway system improved economic activity in Georgia by
    6·2 answers
  • The blank provides access to the internet May also be internal ??
    14·1 answer
  • Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
    8·2 answers
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • 10010 - 1011 binary subtraction​
    5·1 answer
  • Explain the term software dependability. Give at least two real-world examples which further elaborates
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!