1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mice21 [21]
3 years ago
8

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions

publish guidelines for behavior, often called ____.
Computers and Technology
2 answers:
Kazeer [188]3 years ago
7 0

Answer:

Code of conduct.

Explanation:

Code of conduct is a documented set of rules that govern the activities in an organization based on the needed ethics and culture of all the departments in the organization.

It shows the dos and don'ts of the company. It could also outline the acceptable Computer system use and behaviors of it's members.

aksik [14]3 years ago
4 0

Answer:

Codes of conduct

Explanation:

Codes of conduct are a set of rules or norms established by an organization for all employees, students or users, to ensure individual responsibilities and proper practices. The code of conduct can cover overall behaviour of individuals in an organization, but a specific code of conduct can be developed for proper computer use in order to establish what is appropriate and available to use in the organization´s computers, and also to restrict or avoid non related content.

You might be interested in
Give 3 ways you can get creative and personal while creating a PowerPoint.
kondor19780726 [428]

Answer:

People come to listen to you – your thoughts, interpretations and insights. Fancy transitions, clips, and tons of text steal from your content and delivery.

Remember: every time you hit that clicker the audience leaves you and goes to the screen.

Explanation:

7 0
4 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
An information- and communication-based electronic exchange environment mostly occupied by sophisticated computer and telecommun
OleMash [197]

Answer: Market-space

Explanation:

Market-space  is defined as marketing concept that states electronic information exchange mechanism. Physical constraints do not interrupt selling and buying mechanism in this environment.This space is constructed through online facility of technology.

Market space provides the service to customer as well as seller to display their requirements and accordingly interact for exchanging the product with payment. Both the parties agree on time location and transaction method for buying and selling.

3 0
3 years ago
Charging current being returned to the battery is always measured in DC Amps. true or false
Rom4ik [11]

Answer:Charging current being returned to the battery is always measured in DC Amps. Electrical energy will always flow from an area of low potential to an area of high potential. ... One volt is the pressure required to force one amp of current through a circuit that has 1 Ohm of resistance.

Explanation:

5 0
3 years ago
Chester is programming a new game that is large and complex, so he divided the project into modules and sub-modules before begin
ElenaW [278]

Answer:

top down programming

Explanation:

he is going from the top (a complex game)to the bottom (sub modules)

p.s. i did the quiz its correct

7 0
3 years ago
Read 2 more answers
Other questions:
  • Different between ocular and compound miscroscope
    13·1 answer
  • Where does the VLookup function find its lookup values?
    14·1 answer
  • The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
    11·1 answer
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • Nonverbal messages from the movie it​
    5·2 answers
  • Consider the following two code segments. In both, assume that n is an integer variable that has been declared and initialized.
    10·1 answer
  • Open the same text file that you have created in Exercise-Four ( in the sample output, I have created the file name personal). W
    7·1 answer
  • Level Access Test - Please Ignore
    14·1 answer
  • The conversion rate is the percentage of what? A. Customers who received cold calls B. Sales leads who reached the interest stag
    13·1 answer
  • The formula for calculating the amount of interest charged on a loan is:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!