List five items that you might find in an organization's acceptable use policy (AUP).

What will be an ideal response?


(1) Outlawing the use of computing resources to commit crimes, such as hacking and piracy. (2) Restricting particular services, such as file-sharing, on their networks. (3) Banning inappropriate and unethical behavior, and guidelines for the organization's netiquette. (4) Stressing the importance of security, especially the creation of a strong password. (5) Explaining the ownership and privacy of email, storage, and other resources that you have access to. Typically, companies reserve to right to monitor your email, Web activity, and files stored on company equipment.

Computer Science & Information Technology

You might also like to view...

The terminal stream operation ________________ performs processing on every element in a stream.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A dichroic mirror is used for which of the following tasks in a projector?

a. Combines red, green, and blue light. b. Used as part of the DLP chip c. Separates red, green, and blue light. d. Reflects heat away from the projection lamp.

Computer Science & Information Technology

Integrated IS-IS is a routing protocol based on the TCP routing protocol.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Mesh points can be added to a mesh object, but they can't be deleted; apply a None fill to a mesh point if you want it to be invisible.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology