EBK ENHANCED DISCOVERING COMPUTERS & MI
1st Edition
ISBN: 9780100606920
Author: Vermaat
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 2CTQ
Program Plan Intro
Acceptable use policy (AUP):
- An acceptable use policy is a document explaining the practices that a user must agree to gain the access to internet or corporate network.
- In almost every organization or educational institute it is necessary that the employees or students accept the policies before generating the network id for them.
- This policies state that the internet is used only for the work related purpose.
- The employees or students cannot use the Wi-Fi or internet for their personal interests like social media, playing games, visiting entertainment websites and so on.
Explanation of Solution
Comparison between AUPs:
AUPs of INFOSEC | AUPs of Akamai Networks and Services |
INFOSEC is the local distributor of IT security solutions. They provide IT security ranging from personal user to small or large businesses. | Akamai is the global leader in content delivery network (CDN) services, making the internet secure, reliable and fast for its customers. |
This polies are created for the employees in the company. | This policies are created for the users of Akamai Networks. |
They have policies like, General Use and Ownership, Security and Proprietary information and Unacceptable use. | Akamai specifies the policies like, General conduct, Responsibility conducts, inappropriate for content, inappropriate and illegal content, Email and spam and so on. |
They specifies policies on unacceptable actions like, violations of rights of persons or companies. | Akamai includes a policy like “security violations” to specify all the unacceptable actions from the user. |
INFOSEC do not specifies what are their recommended actions from an employee. | Akamai includes a policy like, “Akamai Rights and Remedies” to specify the expected actions from users. |
AUP for employees of small business:
Acceptable Use Policy - Company X
This Acceptable usage policy covers the use of all information and IT equipment. It also covers the use of Wi-Fi, internet and mobile IT equipment. This is applicable to all employees (company X), agent’s, and contractors...
Explanation of Solution
Guidelines for internet Usage:
- Individual should not use social media for their personal interests like, social media, playing games and visiting entertainment websites at the work area...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
2. Signed Integers
Unsigned binary numbers work for natural numbers, but many calculations use negative
numbers as well. To deal with this, a number of different methods have been used to represent
signed numbers, but we will focus on two's complement, as it is the standard solution for
representing signed integers.
2.1 Two's complement
• Most significant bit has a negative value, all others are positive. So, the value of an n-digit
-2
two's complement number can be written as: Σ2 2¹ di 2n-1 dn
• Otherwise exactly the same as unsigned integers.
i=0
-
• A neat trick for flipping the sign of a two's complement number: flip all the bits (0 becomes 1,
or 1 becomes 0) and then add 1 to the least significant bit.
• Addition is exactly the same as with an unsigned number.
2.2 Exercises
For questions 1-3, answer each one for the case of a two's complement number and an
unsigned number, indicating if it cannot be answered with a specific representation.
1. (15 pts) What is the largest integer…
can u solve this question
1. Unsigned Integers
If we have an n-digit unsigned numeral dn-1d n-2...do in radix (or base) r, then the value of that
numeral is
n−1
r² di
Σi=0
which is basically saying that instead of a 10's or 100's place we have an r's or
r²'s place. For binary, decimal, and hex r equals 2, 10, and 16, respectively.
Just a reminder that in order to write down a large number, we typically use the IEC or SI
prefixing system:
IEC: Ki = 210, Mi = 220, Gi = 230, Ti = 240, Pi = 250, Ei = 260, Zi = 270, Yi = 280;
SI: K=103, M = 106, G = 109, T = 10¹², P = 1015, E = 10¹8, Z = 1021, Y = 1024.
1.1 Conversions
a. (15 pts) Write the following using IEC prefixes: 213, 223, 251, 272, 226, 244
21323 Ki8 Ki
223 23 Mi 8 Mi
b. (15 pts) Write the following using SI prefixes: 107, 10¹7, 10¹¹, 1022, 1026, 1015
107 10¹ M = 10 M
=
1017102 P = 100 P
c. (10 pts) Write the following with powers of 10: 7 K, 100 E, 21 G
7 K = 7*10³
Chapter 2 Solutions
EBK ENHANCED DISCOVERING COMPUTERS & MI
Ch. 2 - Prob. 1SGCh. 2 - Prob. 2SGCh. 2 - Prob. 3SGCh. 2 - Prob. 4SGCh. 2 - Prob. 5SGCh. 2 - Prob. 6SGCh. 2 - Prob. 7SGCh. 2 - Prob. 8SGCh. 2 - Prob. 9SGCh. 2 - Prob. 10SG
Ch. 2 - Prob. 11SGCh. 2 - Prob. 12SGCh. 2 - Prob. 13SGCh. 2 - Prob. 14SGCh. 2 - Prob. 15SGCh. 2 - Prob. 16SGCh. 2 - Prob. 17SGCh. 2 - Prob. 18SGCh. 2 - Prob. 19SGCh. 2 - Prob. 20SGCh. 2 - Prob. 21SGCh. 2 - Prob. 22SGCh. 2 - Prob. 23SGCh. 2 - Prob. 24SGCh. 2 - Prob. 25SGCh. 2 - Prob. 26SGCh. 2 - Prob. 27SGCh. 2 - Prob. 28SGCh. 2 - Prob. 29SGCh. 2 - Prob. 30SGCh. 2 - Prob. 31SGCh. 2 - Prob. 32SGCh. 2 - Prob. 33SGCh. 2 - Prob. 34SGCh. 2 - Prob. 35SGCh. 2 - Prob. 36SGCh. 2 - Prob. 37SGCh. 2 - Prob. 38SGCh. 2 - Prob. 39SGCh. 2 - Prob. 40SGCh. 2 - Prob. 41SGCh. 2 - Prob. 42SGCh. 2 - Prob. 43SGCh. 2 - Prob. 44SGCh. 2 - Prob. 45SGCh. 2 - Prob. 46SGCh. 2 - Prob. 47SGCh. 2 - Prob. 48SGCh. 2 - Prob. 49SGCh. 2 - Prob. 1TFCh. 2 - Prob. 2TFCh. 2 - Prob. 3TFCh. 2 - Prob. 4TFCh. 2 - Prob. 5TFCh. 2 - Prob. 6TFCh. 2 - Prob. 7TFCh. 2 - Prob. 8TFCh. 2 - Prob. 9TFCh. 2 - Prob. 10TFCh. 2 - Prob. 11TFCh. 2 - Prob. 12TFCh. 2 - Prob. 1MCCh. 2 - Prob. 2MCCh. 2 - Prob. 3MCCh. 2 - Prob. 4MCCh. 2 - Prob. 5MCCh. 2 - Prob. 6MCCh. 2 - Prob. 7MCCh. 2 - Prob. 8MCCh. 2 - Prob. 1MCh. 2 - Prob. 2MCh. 2 - Prob. 3MCh. 2 - Prob. 4MCh. 2 - Prob. 5MCh. 2 - Prob. 6MCh. 2 - Prob. 7MCh. 2 - Prob. 8MCh. 2 - Prob. 9MCh. 2 - Prob. 10MCh. 2 - Prob. 2CTCh. 2 - Prob. 3CTCh. 2 - Prob. 4CTCh. 2 - Prob. 5CTCh. 2 - Prob. 6CTCh. 2 - Prob. 7CTCh. 2 - Prob. 8CTCh. 2 - Prob. 9CTCh. 2 - Prob. 10CTCh. 2 - Prob. 11CTCh. 2 - Prob. 12CTCh. 2 - Prob. 13CTCh. 2 - Prob. 14CTCh. 2 - Prob. 15CTCh. 2 - Prob. 16CTCh. 2 - Prob. 17CTCh. 2 - Prob. 18CTCh. 2 - Prob. 19CTCh. 2 - Prob. 20CTCh. 2 - Prob. 21CTCh. 2 - Prob. 22CTCh. 2 - Prob. 23CTCh. 2 - Prob. 24CTCh. 2 - Prob. 25CTCh. 2 - Prob. 26CTCh. 2 - Prob. 27CTCh. 2 - Prob. 1PSCh. 2 - Prob. 2PSCh. 2 - Prob. 3PSCh. 2 - Prob. 4PSCh. 2 - Prob. 5PSCh. 2 - Prob. 6PSCh. 2 - Prob. 7PSCh. 2 - Prob. 8PSCh. 2 - Prob. 9PSCh. 2 - Prob. 10PSCh. 2 - Prob. 11PSCh. 2 - Prob. 1.1ECh. 2 - Prob. 1.2ECh. 2 - Prob. 1.3ECh. 2 - Prob. 2.1ECh. 2 - Prob. 2.2ECh. 2 - Prob. 2.3ECh. 2 - Prob. 3.1ECh. 2 - Prob. 3.2ECh. 2 - Prob. 3.3ECh. 2 - Prob. 4.1ECh. 2 - Prob. 4.2ECh. 2 - Prob. 4.3ECh. 2 - Prob. 5.1ECh. 2 - Prob. 5.2ECh. 2 - Prob. 5.3ECh. 2 - Prob. 1IRCh. 2 - Prob. 2IRCh. 2 - Prob. 3IRCh. 2 - Prob. 4IRCh. 2 - Prob. 1CTQCh. 2 - Prob. 2CTQCh. 2 - Prob. 3CTQ
Knowledge Booster
Similar questions
- answer shoul avoid using AI and should be basic and please explainarrow_forwardNode A is connected to node B by a 2000km fiber link having a bandwidth of 100Mbps. What is the total latency time (transmit + propagation) required to transmit a 4000 byte file using packets that include 1000 Bytes of data plus 40 Bytes of header.arrow_forwardanswer should avoid using AI and should be basic and explain pleasearrow_forward
- answer should avoid using AI (such as ChatGPT), do not any answer directly copied from AI would and explain codearrow_forwardanswer should avoid using AI (such as ChatGPT), do not any answer directly copied from AI would and explain codearrow_forwardWrite a c++ program that will count from 1 to 10 by 1. The default output should be: 1, 2, 3, 4, 5, 6 , 7, 8, 9, 10 There should be only a newline after the last number. Each number except the last should be followed by a comma and a space. To make your program more functional, you should parse command line arguments and change behavior based on their values. Argument Parameter Action -f, --first yes, an integer Change place you start counting -l, --last yes, an integer Change place you end counting -s, --skip optional, an integer, 1 if not specified Change the amount you add to the counter each iteration -h, —help none Print a help message including these instructions. -j, --joke none Tell a number based joke. So, if your program is called counter, counter -f 10 --last 4 --skip 2 should produce 10, 8, 6, 4 Please use the last supplied argument. If your code is called counter, counter -f 4 -f 5 -f 6 should count from 6. You should…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning