1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
2 years ago
7

In your own words, describe what an acceptable use

Computers and Technology
1 answer:
astraxan [27]2 years ago
6 0

The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

The items are:

  • Social media page .
  • Internet address, applications.
  • Accessing private or confidential information.

<h3>What is an acceptable use policy?</h3>

An acceptable use policy (AUP) is known to be document that is said to tell about the  constraints as well as the practices that a user need to agree to be able to  access a  given corporate network or the Internet.

Therefore, The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

Learn more about acceptable use policy from

brainly.com/question/2625500

#SPJ1

You might be interested in
How do the companies gather data to determine common passwords?
dsp73
What companies<span> are referring to? was under the impression that when people generate list of </span>common passwords<span> it's based on the results of people cracking leaked encrypted password lists (or using dictionaries created from previously cracked lists). I </span>could<span> be wrong, but that's what I always assumed.</span>
4 0
4 years ago
i have a at&amp;t router and a 1000mbs Ethernet cable connecting from that to my net gear r7000 that can push +1000mbs. the cabl
Lady_Fox [76]
DSL ranges from 128Kbps to 3Mbps, so this would be your bottleneck.
7 0
3 years ago
1 2
sweet [91]

Answer:

Both modules can generate random numbers.

Explanation:

Both the random and secrete modules are builtin programming modules used for generating random number variables. The random module consists of a number of methods in its module for random. number generation such as seed() ; getstate() ; random() ; choice() ; randrange() ; randint() and so on. Random methids are best for generating random numbers which are to be adopted for simulation or modeling. The secrete modules does the same however, numbers generated are stronger and less predictable than the random number modules. Secrete modules are usually adopted in the generation of authentication token and security pins.

6 0
3 years ago
Read 2 more answers
The function below takes two numeric parameters. The first parameter specifies the number of hours a person worked and the secon
Triss [41]

Answer:

def calculate_pay(total_worked_hours, rate_per_hour):

   if total_worked_hours > 40:

       return (40 * rate_per_hour) + ((total_worked_hours - 40) * 2 * rate_per_hour)

   else:

       return total_worked_hours * rate_per_hour

Explanation:

  • Create the calculate_pay function that takes 2 parameters.
  • Inside the function check whether the total_worked_hours is greater than 40 and then return the pay by calculating with the help of formula for work over 40 hours.
  • Otherwise return the pay by multiplying the total_worked_hours with rate_per_hour.
6 0
4 years ago
PLSSSSSS HELP ASAP<br><br> What story does the game Senet tell?
kkurt [141]

Answer:

In the New Kingdom, the game senet, which means "passing," became associated with the journey to the afterlife. Some of the squares of the game corresponded to the hazards a person might meet on their journey to the afterlife, while other squares helped the players.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which is an example of a local government enforcing a national law?
    5·2 answers
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • 1. Please write the following code in Python 3.2. Please also show all outputs.Create a dictionary named letter_counts that cont
    14·1 answer
  • If a database was being used to track sales, a customer who buys a lot of items would be a good example of how two tables could
    14·1 answer
  • For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden
    6·1 answer
  • 1) Discuss when it is best to use indexes. ​
    6·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code.
    7·2 answers
  • You plays pokemon go
    14·2 answers
  • Service provided by multiple servers acting in parallel is referred to as: a. Multiple-phase queuing system b. Multiple-channel
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!