1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
1 year ago
7

In your own words, describe what an acceptable use

Computers and Technology
1 answer:
astraxan [27]1 year ago
6 0

The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

The items are:

  • Social media page .
  • Internet address, applications.
  • Accessing private or confidential information.

<h3>What is an acceptable use policy?</h3>

An acceptable use policy (AUP) is known to be document that is said to tell about the  constraints as well as the practices that a user need to agree to be able to  access a  given corporate network or the Internet.

Therefore, The acceptable use policy is known to be a policy that is made up of  practices that all its users need to agree to in order to be able to make use of such network or other resource.

Learn more about acceptable use policy from

brainly.com/question/2625500

#SPJ1

You might be interested in
An example of what you can post that shows kindness to other
harina [27]

Answer:

everybody is awesome

Explanation:

5 0
3 years ago
Translate the following MIPS code to C. Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3
Romashka [77]

Answer:

f = 2 * (&A[0])

See explaination for the details.

Explanation:

The registers $s0, $s1, $s2, $s3, and $s4 have values of the variables f, g, h, i, and j respectively. The register $s6 stores the base address of the array A and the register $s7 stores the base address of the array B. The given MIPS code can be converted into the C code as follows:

The first instruction addi $t0, $s6, 4 adding 4 to the base address of the array A and stores it into the register $t0.

Explanation:

If 4 is added to the base address of the array A, then it becomes the address of the second element of the array A i.e., &A[1] and address of A[1] is stored into the register $t0.

C statement:

$t0 = $s6 + 4

$t0 = &A[1]

The second instruction add $t1, $s6, $0 adding the value of the register $0 i.e., 32 0’s to the base address of the array A and stores the result into the register $t1.

Explanation:

Adding 32 0’s into the base address of the array A does not change the base address. The base address of the array i.e., &A[0] is stored into the register $t1.

C statement:

$t1 = $s6 + $0

$t1 = $s6

$t1 = &A[0]

The third instruction sw $t1, 0($t0) stores the value of the register $t1 into the memory address (0 + $t0).

Explanation:

The register $t0 has the address of the second element of the array A (A[1]) and adding 0 to this address will make it to point to the second element of the array i.e., A[1].

C statement:

($t0 + 0) = A[1]

A[1] = $t1

A[1] = &A[0]

The fourth instruction lw $t0, 0($t0) load the value at the address ($t0 + 0) into the register $t0.

Explanation:

The memory address ($t0 + 0) has the value stored at the address of the second element of the array i.e., A[1] and it is loaded into the register $t0.

C statement:

$t0 = ($t0 + 0)

$t0 = A[1]

$t0 = &A[0]

The fifth instruction add $s0, $t1, $t0 adds the value of the registers $t1 and $t0 and stores the result into the register $s0.

Explanation:

The register $s0 has the value of the variable f. The addition of the values stored in the regsters $t0 and $t1 will be assigned to the variable f.

C statement:

$s0 = $t1 + $t0

$s0 = &A[0] + &A[0]

f = 2 * (&A[0])

The final C code corresponding to the MIPS code will be f = 2 * (&A[0]) or f = 2 * A where A is the base address of the array.

3 0
2 years ago
Give an example of a file suffix for the files created by each of the following: 1) a word processing program 2) a spread sheet
gayaneshka [121]
1) .docx
2) .xlsx
3) .pptx
4) .zip
7 0
2 years ago
During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful inf
labwork [276]

Answer: processing

Explanation:

During the processing steps of the information processing cycle, data is manipulated, calculated, or organized to create useful information.

At this stage, the data that has been gotten will have to be worked on by manipulating it, making necessary calculations in order to get a useful information out of it.

6 0
3 years ago
What refers to the use of technology to create product styles and designs?
torisob [31]
The answer is graphic design
8 0
3 years ago
Other questions:
  • If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someon
    12·1 answer
  • What is the differnces between dark and middle ages of computer?​
    9·1 answer
  • Every application program has a _______________ segment
    6·1 answer
  • What is <br> central vision
    12·2 answers
  • The invention of the transistor was important to the development of computers because
    14·1 answer
  • Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can mov
    6·1 answer
  • How much time per day does the average U.S. youth spend watching television, playing video games, or using a computer?
    8·1 answer
  • How do users log into Windows 8?
    7·1 answer
  • Please respond not with answer but with comment.
    12·1 answer
  • Explain the term creating in word processing​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!