1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
3 years ago
6

To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for

which a computer or network may and may not be used.a. acceptable use policy (AUP)b. performance gaurantee policy (PGP)c. universal procedures standard (UPS)d. maintanence security dictum (MSD)
Computers and Technology
1 answer:
Maru [420]3 years ago
3 0

Answer:

a. acceptable use policy (AUP)

Explanation:

An acceptable use policy (AUP) is a document where everyone has to sight it before to receive access to a company's network.

Employees or students have to sight politics like:

- Never try to break the security system.

- Never posting commercial content.

- Never send spam.

- Report any suspicious behavior.

You might be interested in
Write 3 things that can't be done without technology.
bulgar [2K]

Answer:

Hacking Online Orders Math

Explanation:

4 0
3 years ago
Read 2 more answers
I'm trying to move the figure a little away from, the column line and every time I move it and click ok it goes back to being be
Luba_88 [7]

Answer:

Try to click the center button layout.

Explanation:

8 0
3 years ago
Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
kati45 [8]
Last one I am not sure they
4 0
3 years ago
A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
blagie [28]

Answer:

C. Symptoms of malware mutation

Explanation:

They are signs that could indicate that ones system is infected by virus.

Such signs includes:

1.Slow booting or startup.

2.Low space storage.

3.Blue screen of death.

4.Slow Internet performance.

5.Sending of spam messages.

6.Disabled security.

7.Browsing error.

8.Pop-up messages.

9.Renaming of files.

10.Loss of certain files, music, messages, etc.

3 0
3 years ago
Read 2 more answers
Which of the following best describes the protocols used on the Internet?
max2010maxim [7]

Answer:

D: The protocols of the Internet are open and used by all devices connected to the network

Explanation:

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

5 0
3 years ago
Other questions:
  • Tommy has hired a marketing company to create a billboard advertisement
    11·2 answers
  • What is the name used for the integrated program development environment that comes with a Python installation?
    5·1 answer
  • When you use the fill handle to copy a formula to adjacent cells, this creates what kind of cell reference?
    5·1 answer
  • /*
    8·1 answer
  • How do you respond to an email?
    6·1 answer
  • Melanie needs to ensure that readers are able to locate specific sections within a document easily. What should she include in
    8·1 answer
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
  • What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures ar
    14·1 answer
  • To verify a Windows system meets the minimum processor and memory requirements to install software, use the ________.
    8·1 answer
  • Which of the following could be a method for an object-oriented class called Student?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!