AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.

connecting to unauthorized devices through the network

going onto unauthorized sites or downloading certain content

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Answers

Answer 1

AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.

What is AUP?

AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.

How does an AUP regulates users?

Most AUPs imply:

Users can only access certain sites and dowloading specific content is forbidden.The access to the internet or network cannot be used for criminal purposes.Only authorized users can connect to the corporate network.

Learn more about AUP in: https://brainly.com/question/9509517

#SPJ1

Answer 2

Answer:

not sending spam or junk emails to anyone

not using the service to violate any law

reporting any attempt to break into one’s account

Explanation:


Related Questions

What will be printed to the screen when the following program is run?

Answers

Answer:

The answer is 20

Explanation:

Hope this helps!

Answer:

40

Explanation:

Indexes for arrays in Python start at 0, which means the first item of an array is at index 0, the second item is at index 1, the third item is at index 2, and the fourth item is at index 3.

Therefore when my_list[3] is put inside the print function, the fourth item, 40, is printed to the screen.

Hope this helps!

.....................................................

Answers

Answer:

i think its, a. sequence

Explanation:

i could be wrong, if i am, i am sorry

Allan is a candidate for the position of Mayor in his town. He is worried about using email for the fear that it may be intercepted by the government and used by his opponent. What law protects his email from being intercepted by the government?
The
and its proposed update strengthen the online privacy of users by increasing requirements for governmental access to the stored data.

Answer: Electronic Communications Privacy Act

Answers

Answer:

This is correct.

Explanation:

I took the test and got it right.

Which method can be used for making a robot perform a different set of functions?

a. changing a robot's sensors
b. dismantling a robot
c. creating a new robot
d. rewriting software

Answers

Answer:

D. Because rewriting it can make it preform new functions.

Explanation:

What will be printed to the screen when the following program is run?

Answers

Answer:

false

Explanation:

the parenthesis contains 2 true statements (5 is greater than 4 and 10 is greater than or equal to 10)

outside the parenthesis is the not, so the true parenthesis is negated to false

this means the value of a is false

Choose the correct term to complete the sentence.

For most operating systems, the _______ function returns the number of seconds after January 1, 1970, 0:00 UTC.


O localtime()

O time()

O epoch()

Answers

Answer:

time() or time.time()

Explanation:

The time() method from the time module gives the amount of seconds after epoch, or Jan 1, 1970. Running this in the Python shell would return a number like this:

>>> time.time()

1652747529.0429285

For most operating systems, the time() function returns the number of seconds after January 1, 1970, 0:00 UTC. Thus, the correct option is B,

What is the time() function?

In python, the time() function is the function which returns the number of seconds that have been passed since an epoch. It is the point where time actually begins. For the Unix system, the time such as January 1, 1970, 00:00:00 at UTC is an epoch.

The time() method from the time module is used widely to give the amount of seconds which have been passed after the time period of an  epoch, or Jan 1, 1970. Running this in the Python shell would return a number like the one listed in the question.

Therefore, the correct option is B.

Learn more about time() function here:

https://brainly.com/question/12174888

#SPJ2

when does computer store data permanently?​

Answers

when the device is unpowered.

can i get help with computer language​

Answers

Answer:

yes

Explanation:

because you can choose you own language

Question # 9
Fill in the Blank
Complete the statement using the correct term.
The aerospace industry uses______________ simulators to train astronauts and design spacecraft.

Answers

Answer:

flight stimulators are used to train astronaut and design simple air craft

In this area, you want to focus on which hardware, application, personnel, or department(s) will be impacted by the security policy. For instance, what type of personal devices are allowed on the network and when? Must the personnel receive formal approval before using such devices on the network? What kind of activity is allowed on a personal device? Who is responsible for granting the permission to use a device on the network?

Answers

The type of personal devices that are allowed on the network are:

LaptopsSmartphones tablets

What devices do BYOD have?

BYOD is known to be Personal devices such as smartphones that organizations often gives permission for employees that are working from home so as to be able to have a flexible schedule and others.

Therefore, The type of personal devices that are allowed on the network are:

LaptopsSmartphones tablets

Learn more about personal device from

https://brainly.com/question/4457705

#SPJ1

DUE IN AN HOUR PLS HELP
Random answers for points will be reported


Which one of these is an example of an output device digital pen headset keyboard mouse

Answers

Answer:headset

Explanation:because sound comes out of them

Answer:

Headset

Explanation:

It would be a headset because headsets "output sounds"

Digital pens, keyboards, and mice don't output anything.

what are the four main components of programming languages and why is each one needed?

Answers

Answer:

input, output, arithmetic and conditional and looping

I need help including my other one I posted

Answers

Answer:

2. I like the form of it, I like the porportion of it.

3. I dont know what a purpose of this maybe it a person wearing a tuexdo stepping out of his house or something.

4. Another thing that would work well is texture.

Explain the stages of the evolution of the idea of IDS and its importance of security, military and examine the importance of intrusion detection systems and categories classifications, and where can put IDS to reduce the risk to the network.

Answers

Intrusion detection systems (IDS) is a software type that is used to check for violations of policy or any other malicious activity. IDS detects and prevents unauthorized activities.

What is IDS?

Intrusion detection systems (IDS) is the technological system that is built to check for any suspicious and unauthorized activities. They detect the network system and the system logs.

The unauthorized and suspicious things are scanned and made an alert. It is very crucial in many fields as many documented and private items are needed to be protected.

Therefore, IDS can be of various types like host, network, perimeter, and VM.

Learn more about IDS here:

https://brainly.com/question/20709626

#SPJ1


Explain three of the the features of the word processing to document. ​

Answers

Word processing software may be used to create, edit, save, and print documents, among other things. Text within a document may be copied, pasted, moved, and deleted. Text formatting includes font selection, bolding, underlining, and italicizing.

I’m so sorry to say I have a lot to say I don’t

How to powerwash chromebook

Answers

Answer:

you only need to select restart after you sign out of your account also I would make sure everything you need is backed up because otherwise everything you have will get deleted I accidentally had that happen to me last week or the week before, I didn’t realize it was going to need to be reset so I didn’t save the majority of my answers. So now I have barely anything done and I’m behind.

Explanation:

I hope it helps you though.

What are the common operations performed on character strings?

Answers

Answer(:

•concatenation

• scanning

• substringing

• translation

• verification

if you want to remember means csstv;-)

Which of the following types of promotion includes a two-way conversation?

Answers

It would be C. Personal selling. Hope it helps!
where are the answer choices?


Which type of device would be used on a laptop to verify
the identity of a user

Answers

Answer:

A biometric identification device

Explanation:

As biometric identification devices, laptops commonly use a fingerprint scanner or, for facial recognition, a camera.

What will be the output of the following code snippet?

Answers

Answer:

D

Explanation:

Its gonna be of the class integer.

what is the input for air cooler computer science​

Answers

Answer:

cooling

Explanation:

Air cooling is a process of lowering air temperature by dissipating heat. It provides increased air flow and reduced temperatures with the use of cooling fins, fans or finned coils that move the heat out of a casing such as a computer …

Question 2 of 25
How could a video's file size be reduced so that it will take up less space on a
computer's hard drive?
A. By shooting it at a lower resolution
B. By shooting it at a higher resolution
C. By shooting it at a higher frame rate
D. By sampling the sound at the maximum rate

Answers

A, as a lower resolution will store less data per frame, reducing file size.

The groups within a tab are collectively
known as?

Answers

Answer:

the ribbon

Explanation:

Commands are organized in logical groups, which are collected together under tabs. Each tab relates to a type of activity, such as formatting or laying out a page. To reduce clutter, some tabs are shown only when needed.

Which is an example of a foley effect?

Answers

Answer:

Foley artists reproduce everyday sounds like footsteps, doors opening and closing, wind blowing, glass breaking, and other ambient noise.

I need the answer with c++
The question : Implement the class "Rectangle" with sides parallel to the coordinate axes. 1.Provide for the possibility of moving rectangles on the plane. 2.Provide for the possibility of changing sizes. 3.Provide for the possibility of constructing the smallest rectangle containing two given rectangles. 4.Provide for the possibility of constructing the rectangle that is a common part (intersection) of two rectangles. 5.Provide for the possibility of calculating the length of half the diagonal of a rectangle.

Answers

Using the knowledge of computational language in C++ code we found that this code can be written as:

The code can be found in the attached image.

How to writte the C++ code ?

So from the c++ code you can write the geometric figure as

#include <bits/stdc++.h>

struct Point {

   int x, y;

};

bool doOverlap(Point l1, Point r1, Point l2, Point r2)

{

   if (l1.x > r2.x || l2.x > r1.x)

       return false;

   if (r1.y > l2.y || r2.y > l1.y)

       return false;

    return true;

}

/* Driver program to test above function */

int main()

{

   Point l1 = { 0, 10 }, r1 = { 10, 0 };

   Point l2 = { 5, 5 }, r2 = { 15, 0 };

   if (doOverlap(l1, r1, l2, r2))

       printf("Rectangles Overlap");

   else

       printf("Rectangles Don't Overlap");

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

In java language I want the code

Answers

Answer:

code was too long to paste here, attached below

Do anyone know how to code like I need someone do a code for me?

Answers

Answer:

yeah i can depends on what exactly it is but probably

A message in your code that explains what is going on in your program (Known by seeing // before the message)

Answers

Answer:

comment

Explanation:

Comments just comment on the code.

Comments could be helpful when someone else has to read your code.

Comments just comment on the code. Comments could be helpful when someone else has to read your code.

What is Comments?

An explanation or annotation in a computer program's source code that can be viewed by programmers is known as a remark.

Compilers and interpreters typically ignore them because they were introduced to make the source code simpler for humans to understand. The syntax of comments differs significantly among programming languages.

Sometimes, comments are also handled in a variety of ways by documentation generators to provide documentation separate from the source code itself, or they are used to integrate with source code management systems and other types of external programming tools.

Therefore, Comments just comment on the code. Comments could be helpful when someone else has to read your code.

To learn more about comments, refer to the link:

https://brainly.com/question/30318947

#SPJ3

The name for the instructions you write to a computer in a program

Answers

Answer:

Code

Explanation:

The code is instructions that you can write yourself or download from online

Answer:

Code

Explanation:

Code

The name for the instructions you write to a computer in a program

Design a flowchart or pseudocode for a program that accepts two numbers from a user and displays one of the following messages: First is larger, Second is larger, Numbers are equal?

Answers

The pseudocode of the program will ask of two numbers form the user, compare the numbers and print out statements depending on the result of the comparison.

What is a pseudocode?

Pseudocode is an informal way of programming description that does not require any strict programming language syntax. The pseudocode describes how the code will be written and structured.

Therefore, the pseudocode follows the structure below

Ask the user for two numbersUse the greater than and equals to operator to check if any number is greater than the other or they are the sameFinally, we print the statements: First is larger, second is larger or numbers are equal depending on your result in comparison of the numbers.

learn more on pseudocode here: https://brainly.com/question/14101532

#SPJ1

Other Questions
The charge for electricity consumption E is partly constant and partly varies as the number N of units used. The charge for 82 units is N 3,655 while the charge for 42 units is N 2055: a) calculate the charge per unit of electricity b) obtain a formula for E in terms of N * Given the following expressions:I. [tex] - \frac{5 }{8} + \frac{3}{5} [/tex]||.[tex] \frac{1}{2} + \sqrt{2} [/tex]|||. [tex]( \sqrt{5} ) \times ( \sqrt{5} )[/tex]IV. [tex]3 \times ( \sqrt{49} )[/tex] What is the name of the piece above? A few friends went skating on the frozen lake in their hometown. At one point you can hear the ice cracking. What advice can you give them so that the ice does not break and the skaters on the lake are not endangered? Who is the author of Station Eleven? Mettez les verbes au temps convenable:1. Demain, il (tre) la maison2. La semaine prochaine, nous avoir) notre diplme.3. Le mois prochain, ils (visiter) Paris et ils (se promener) auxChamps-Elyses4. L'anne prochaine, elle (pouvoir) conduire sa voiture.5. Aprs-demain, Marc (venir) me voir chez moi.6. Julie (ne pas sortir) sans ses amies.7. 11 (ne pas se coucher) tard demain soir If an aquarium holds 80 l of water and contains 170 guppies, what is the approximate density of the guppy population? Which of these is an example of similar terms Neglecting air resistance, the distance s(t) in feet traveled by a freely falling object is given by the function s(t) = 16t^2 where is time in seconds. The height of a certain tower is 878 feet. How long would it take an object to fall to the ground from the top of the building? Help with functions!! Thank you!! The system has ___________ solution(s). y = 2x + 6 4y = 8x + 24 The data below represents the weight, in kilograms, of 15 containers shipped from a factory in one week.Match the letter with the correct term that would be necessary to complete the box and whisker plot. (100 POINTS PLS HELP) The New Colossus by Emma LazarusNote: This poem was carved on the base of the Statue of Liberty National Monument in NY Harbor in 1903A mighty woman with a torch, whose flame Is the imprisoned lightning, and her nameMother of Exiles. From her beacon-handGlows world-wide welcome....Keep, ancient lands, your storied pomp! cries sheWith silent lips.Give me your tired, your poor,Your huddled masses yearning to breathe free,The wretched refuse of your teeming shore.Send these, the homeless, tempest tossed, to me.I lift my lamp beside the golden door. Source: Emma Lazarus, "The New Colossus," (1883). Emma Lazaruss poem was most likely carved onto the base of New Yorks Harbors Statue of Liberty because aThe U.S. wanted all to know that the U.S. is unwilling to accept immigrants and refugees in its national border. bThe U.S. wanted to send a message of welcome to migrants fleeing poverty, war and oppression. cThe New York Harbor needed a lighthouse to protect its shoreline from intruders. dEvery American citizen supported open immigration policies to the United States. Write the equation of the conic section shown below. Each of the sentences below accurately describes the practices of the standard oil company during the gilded age witch two also fit the definition of a monopoly PLEASE HELP WILL GIVE BRAINLIEST Select the correct text in the passage.Which sentence in this excerpt from Edgar Allan Poes The Tell-Tale Heart is an example of foreshadowing? A random drawing will determine which 3 people in a group of 9 will win concert tickets. what is the probability that you and your 2 friends will win the tickets? express your answer as a fraction in simplified form. Please help me solve for X What would it take to get Mom to see I was responsible enough for a dog? I already watered the plants and folded the laundry each week. I helped David with his homework. I finished my own homework on time. I even helped out with Lisa, the baby. I thought about it for a long time. Then, it came to me, and I was waiting on the front steps when Mom came home from work."Mom," I said. "I know how to prove I can take care of a dog. Let me take care of Lisa for a week. I'll feed her. I'll change her diaper. I'll even wake up with her when she gets up in the middle of the night. Then you'll see that taking care of a dog would be easy for me!"QuestionFrom what point of view is this story told?Answer options with 4 options1.first person2.second person3.third person limited4.third person omniscient Simplify 22-2(12/4+2*3)/3+7