1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
3 years ago
6

To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for

which a computer or network may and may not be used.a. acceptable use policy (AUP)b. performance gaurantee policy (PGP)c. universal procedures standard (UPS)d. maintanence security dictum (MSD)
Computers and Technology
1 answer:
Maru [420]3 years ago
3 0

Answer:

a. acceptable use policy (AUP)

Explanation:

An acceptable use policy (AUP) is a document where everyone has to sight it before to receive access to a company's network.

Employees or students have to sight politics like:

- Never try to break the security system.

- Never posting commercial content.

- Never send spam.

- Report any suspicious behavior.

You might be interested in
Solve the following equations and check your result 1) 3x=2x+18​
Tamiku [17]

Answer:

x = 18

Explanation:

3x = 2x+18

3x-2x = 18

x=18

5 0
3 years ago
Read 2 more answers
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
jeka57 [31]
Well think of it like this lets say this wasn't and security system and it was a video game console and remote.
 Now the console or keypad or the main components the power on or shut off the devices and the remote or sensors are the secondary parts but they are needed to help the console or keypad figure out what they are doing.
5 0
3 years ago
Plato :
ddd [48]

Answer:

filler content

Explanation:

Isabel must use some sort of filler content while creating a wireframe that she is up with. For the banner, she can make use of the placeholder, and for the text, she can make use of the lorem ipsum. Also, if the wireframe is low fidelity then only she can use above. And if the wireframe is high fidelity then she should use the original banner and text.

3 0
3 years ago
Read 2 more answers
Which type of connection is needed to synchronize data with a cloud service?
Svetllana [295]

Answer:

Internet

Explanation:

The "Cloud" is an Online service this means it works on the Internet and without the Internet you can't have access to it.

7 0
3 years ago
What is the most flexible way to modify a report?
Vesna [10]

Answer: Use the Design view

Explanation: Using a Design view to modify a report is the most flexible way to modify a report as opposed to a layout view which is another way to modify a report .  The design view  is flexible in the sense that it provides a more outlined structured view of your report that you can see the header and footer for the report. it also affords you the ability to control your  report in terms of changing many properties, adjusting images, labels  and editing  text box, etc.

8 0
2 years ago
Other questions:
  • What's is the contribution of technology to the country?
    15·1 answer
  • Kiaan wants to give people who attend his presentation a printed copy of the slides. Instead of printing one slide on each piece
    11·1 answer
  • After you post a video of yourself defacing school property You can likely expect that
    11·2 answers
  • Most smartphones use operating systems developed by ________. Select one: A. Symbian and Apple B. Apple and Microsoft C. Microso
    13·1 answer
  • Advantages of heading attributes
    5·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • To combine concepts or ideas into a whole is called
    11·2 answers
  • Hey guys, I don’t have a problem for you but If anyone knows do you still pass your grade level if you failed 1 class in the las
    11·2 answers
  • Frrrrrrrrrrreeeeeeeeee brainliest for u
    13·2 answers
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!