1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
3 years ago
6

To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for

which a computer or network may and may not be used.a. acceptable use policy (AUP)b. performance gaurantee policy (PGP)c. universal procedures standard (UPS)d. maintanence security dictum (MSD)
Computers and Technology
1 answer:
Maru [420]3 years ago
3 0

Answer:

a. acceptable use policy (AUP)

Explanation:

An acceptable use policy (AUP) is a document where everyone has to sight it before to receive access to a company's network.

Employees or students have to sight politics like:

- Never try to break the security system.

- Never posting commercial content.

- Never send spam.

- Report any suspicious behavior.

You might be interested in
For the function below, which variables have the same scope?
steposvetlana [31]

Answer:

numB and power

Explanation:

Correct answer edge 2020

5 0
3 years ago
Read 2 more answers
Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.
Leya [2.2K]

Answer:

The answer is d. Data

Explanation:

information gathered from observing a plant grow 3 cm over a two-week period results in Data

data is facts and statistics collected together for reference or analysis.

Data is any information that has been collected, observed, generated or created to validate original research findings

6 0
3 years ago
Which of the following not a hardware componet​
erma4kov [3.2K]

Answer:

antivirus.......hope this answers your question

3 0
3 years ago
An algorithm requires numbers.<br> O True<br> O<br> False
Naya [18.7K]
True hope this helps
6 0
2 years ago
Read 2 more answers
In JAVA, answer the following:
erica [24]

Answer:

The JAVA program is as follows.

import java.util.Scanner;

public class Program

{

   static int n;

public static void main(String[] args) {

    //scanner object

    Scanner stdin = new Scanner(System.in);

    //loop executes till number entered is in the range of 1 to 10

    do

    {

        System.out.print("Enter any number: ");

        n = stdin.nextInt();

    }while(n<1 || n>10);

    System.out.println("Number is valid. Exiting...");

}

}

OUTPUT

Enter any number: 0

Enter any number: 23

Enter any number: 10

Number is valid. Exiting...

Explanation:

The program is explained.

1. The integer variable, n, is declared static since the variable should be accessible inside main() which is static.

2. An object of Scanner, stdin, is created inside main().

3. Inside do-while loop, the user is asked input any value for n.

4. The loop continues till user inputs a number which is not in the given range, beginning from 1 to 10.

5. The loop will not be terminated till the user enters a valid input.

6. Once a valid input is entered, the message is displayed to the console and the program ends.

7. The variable, n, is declared at the class level and is a class variable. Class variables are declared inside the class but outside all the methods in that class.

8. Since JAVA is a purely object-oriented language, all the code is written inside class.

9. The object of class is not created since only one class is included in the program. If more than one class is included, then the object of the class which does not has the main() method will be created inside main().

10. User input for integer is taken via scanner object and using nextInt() method.

11. The methods, print() and println() display the messages to the console. The only difference is that println() inserts a new line after displaying the message.

12. The name of the class having main() and the name of the program should be the same.

7 0
2 years ago
Other questions:
  • Consider the following classes:
    8·1 answer
  • Directions Use your imagination and a word processor to write a business letter with two to three paragraphs. Your business lett
    5·1 answer
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • What error, if any, is in the following code?
    11·1 answer
  • Help !!!!!
    9·1 answer
  • Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
    9·1 answer
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • (main.c File)
    7·1 answer
  • Which of the following statements are true of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!