1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
5

Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at

the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Who does Shane need to get permission from before he installs the VPN
Computers and Technology
1 answer:
Valentin [98]3 years ago
7 0

Answer:

CAB

Explanation:

A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.

Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.

In this scenario, Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. Thus, Shane needs to get permission from the CAB before he installs the VPN.

CAB is an acronym for Change Advisory Board (CAB) and it comprises of a group of business and information technology (IT) professional members who are saddled with the responsibility of evaluating a change and the potential risks this change may pose to the business before advising the business whether or not to adopt the change.

Hence, the Change Advisory Board (CAB) are empowered to stop or give authorization for the use of a software application, machinery or methods of production haven determined that they are safe, stable and secure to use.

You might be interested in
The belief that the odds of two events occurring together are greater than the odds of either event occurring alone is the _____
iris [78.8K]
The answer is D.) conjunction fallacy
3 0
3 years ago
Read 2 more answers
Alex’s family members live in different parts of the world. They would like to discuss the wedding plans of one of their distant
goldenfox [79]
The answer would be b
8 0
4 years ago
Read 2 more answers
In which career field, would the Computing Technology Industry Association's CompTIA A+ certification be useful?
Anna [14]
It's geared towards system administration but would also be useful for devops.
5 0
4 years ago
Por qué el entorno gráfico de Windows es amigable con el hombre ?
elena-14-01-66 [18.8K]

Explanation:

Por que es un sistema diseñado para ayudar a las personas de forma amable

ESPERO Y TE AYUDE ;)

3 0
3 years ago
What are examples of macro events related to a form? Check all that apply.
Westkost [7]

Answer:

A form is closed

A form is resized.

A form is opened

A user presses a key

A user moves the mouse

Explanation:

There are different events in a form, and we can use them in different situations like:

  • We can use On Resize to resize our form.
  • If we On Load the form will be displayed.
  • On Clicked, If there was a click in an object
  • On Unload to close the form.
  • On Mouse Enter and On Mouse Leave, in this case, the mouse enters or leaves the object.

6 0
4 years ago
Other questions:
  • What type of scientists studies tree rings to determine the history of an area?
    9·2 answers
  • What are three situations when recursion is the only option available to address problems?
    10·1 answer
  • A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
    5·1 answer
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    15·2 answers
  • Which of the following is NOT a goal of a Material Requirements Plans (MRP)?
    12·1 answer
  • Style of music that originated in New Orleans in the early 1900s
    11·2 answers
  • Why are Quick Parts useful in an Outlook message?
    5·1 answer
  • Need answer ASAP
    14·1 answer
  • A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of
    6·1 answer
  • If you want to load the "my-data.csv" file to Dataframe so that you can explore find out the number of data items in the data se
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!