Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
Question
Book Icon
Chapter 2, Problem 2CTQ
Program Plan Intro

Acceptable use policy (AUP):

  • An acceptable use policy is a document explaining the practices that a user must agree to gain the access to internet or corporate network.
  • In almost every organization or educational institute it is necessary that the employees or students accept the policies before generating the network id for them.
  • This policies state that the internet is used only for the work related purpose.
  • The employees or students cannot use the Wi-Fi or internet for their personal interests like social media, playing games, visiting entertainment websites and so on.

Explanation of Solution

Comparison between AUPs:

AUPs of INFOSECAUPs of Akamai Networks and Services
INFOSEC is the local distributor of IT security solutions. They provide IT security ranging from personal user to small or large businesses.Akamai is the global leader in content delivery network (CDN) services, making the internet secure, reliable and fast for its customers.
This polies are created for the employees in the company.This policies are created for the users of Akamai Networks.
They have policies like, General Use and Ownership, Security and Proprietary information and Unacceptable use.Akamai specifies the policies like, General conduct, Responsibility conducts, inappropriate for content, inappropriate and illegal content, Email and spam and so on.
They specifies policies on unacceptable actions like, violations of rights of persons or companies.Akamai includes a policy like “security violations” to specify all the unacceptable actions from the user.
INFOSEC do not specifies what are their recommended actions from an employee.Akamai includes a policy like, “Akamai Rights and Remedies” to specify the expected actions from users.

AUP for employees of small business:

Acceptable Use Policy - Company X

This Acceptable usage policy covers the use of all information and IT equipment. It also covers the use of Wi-Fi, internet and mobile IT equipment. This is applicable to all employees (company X), agent’s, and contractors...

Explanation of Solution

Guidelines for internet Usage:

  • Individual should not use social media for their personal interests like, social media, playing games and visiting entertainment websites at the work area...

Blurred answer
Students have asked these similar questions
A3Q3.c - You are to write a C program that implements the following disk scheduling algorithms: a. FCFS [10 marks] b. SCAN [10 marks] c. C-SCAN [10 marks] d. SSTF [10 marks] e. LOOK [10 marks] f. C-LOOK [10 marks] • Your program will service a disk with 300 cylinders numbered 0 to 299. • • • • The program will service the requests (a list of 20 cylinder numbers) given in the file request.bin. This file contains (4 byte) integer values representing requests ranging from 0-299. Your program will take the initial position of the disk head as the first command line argument and the direction of the head as the second command line argument. It will then output the requests in the order in which they are serviced, and the total amount of head movements required by each algorithm. In particular, your program needs to do the following: Your program should take two command line arguments a) First command line argument - initial position of the disk head (an integer value) b) Second command line…
2. The memory management has contiguous memory allocation, dynamic partitions, and paging. Compare the internal fragmentation and external fragmentation for these three approaches. [2 marks] 3. Suppose we have Logical address space = 24 = 16 (m = 4), Page size=2² =4 (n = 2), Physical address space = 26 = 64 (r = 6). Answer the following questions: [4 marks] 1) Total # of pages ? 2) Total # of frames ? 3) Number of bits to represent logical address? 4) Number of bits to represent offset ? 5) Number of bits to represent physical address? 6) Number of bits to represent a page number? 7) Number of bits to represent a frame number / 4. What is translation look-aside buffers (TLBS)? Why we need them to implement the page table? [2 marks] 5. Why we need shared pages for multiple processes? Give one example to show the benefits. [2 marks] 6. How to implement the virtual memory by using page out and page in? Explain with an example. [2 marks] 7. We have a reference string of referenced page…
8. List three HDD scheduling algorithms. [2 marks] 9. True or False? The NVM has the same scheduling algorithms with HDD. Explain why? [2 marks] 10. Why the modern mouses use polling to detect movements instead of interrupts? [2 marks] 11. What is thrashing? How does it happen? [2 marks] 12. Given a reference string of page numbers 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 and 4 frames show how the page replacement algorithms work, and how many page faults? [6 marks], 1) FIFO algorithm? [2 marks] 2) Optimal algorithm? [2 marks] 3) LRU algorithm? [2 marks] 13. List at least three file systems that you know. [2 marks] 14. In C programming, how the seek to a specific position in the file by offset? [2 marks]

Chapter 2 Solutions

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Ch. 2 - Prob. 11SGCh. 2 - Prob. 12SGCh. 2 - Prob. 13SGCh. 2 - Prob. 14SGCh. 2 - Prob. 15SGCh. 2 - Prob. 16SGCh. 2 - Prob. 17SGCh. 2 - Prob. 18SGCh. 2 - Prob. 19SGCh. 2 - Prob. 20SGCh. 2 - Prob. 21SGCh. 2 - Prob. 22SGCh. 2 - Prob. 23SGCh. 2 - Prob. 24SGCh. 2 - Prob. 25SGCh. 2 - Prob. 26SGCh. 2 - Prob. 27SGCh. 2 - Prob. 28SGCh. 2 - Prob. 29SGCh. 2 - Prob. 30SGCh. 2 - Prob. 31SGCh. 2 - Prob. 32SGCh. 2 - Prob. 33SGCh. 2 - Prob. 34SGCh. 2 - Prob. 35SGCh. 2 - Prob. 36SGCh. 2 - Prob. 37SGCh. 2 - Prob. 38SGCh. 2 - Prob. 39SGCh. 2 - Prob. 40SGCh. 2 - Prob. 41SGCh. 2 - Prob. 42SGCh. 2 - Prob. 43SGCh. 2 - Prob. 44SGCh. 2 - Prob. 45SGCh. 2 - Prob. 46SGCh. 2 - Prob. 47SGCh. 2 - Prob. 48SGCh. 2 - Prob. 49SGCh. 2 - Prob. 1TFCh. 2 - Prob. 2TFCh. 2 - Prob. 3TFCh. 2 - Prob. 4TFCh. 2 - Prob. 5TFCh. 2 - Prob. 6TFCh. 2 - Prob. 7TFCh. 2 - Prob. 8TFCh. 2 - Prob. 9TFCh. 2 - Prob. 10TFCh. 2 - Prob. 11TFCh. 2 - Prob. 12TFCh. 2 - Prob. 1MCCh. 2 - Prob. 2MCCh. 2 - Prob. 3MCCh. 2 - Prob. 4MCCh. 2 - Prob. 5MCCh. 2 - Prob. 6MCCh. 2 - Prob. 7MCCh. 2 - Prob. 8MCCh. 2 - Prob. 1MCh. 2 - Prob. 2MCh. 2 - Prob. 3MCh. 2 - Prob. 4MCh. 2 - Prob. 5MCh. 2 - Prob. 6MCh. 2 - Prob. 7MCh. 2 - Prob. 8MCh. 2 - Prob. 9MCh. 2 - Prob. 10MCh. 2 - Prob. 2CTCh. 2 - Prob. 3CTCh. 2 - Prob. 4CTCh. 2 - Prob. 5CTCh. 2 - Prob. 6CTCh. 2 - Prob. 7CTCh. 2 - Prob. 8CTCh. 2 - Prob. 9CTCh. 2 - Prob. 10CTCh. 2 - Prob. 11CTCh. 2 - Prob. 12CTCh. 2 - Prob. 13CTCh. 2 - Prob. 14CTCh. 2 - Prob. 15CTCh. 2 - Prob. 16CTCh. 2 - Prob. 17CTCh. 2 - Prob. 18CTCh. 2 - Prob. 19CTCh. 2 - Prob. 20CTCh. 2 - Prob. 21CTCh. 2 - Prob. 22CTCh. 2 - Prob. 23CTCh. 2 - Prob. 24CTCh. 2 - Prob. 25CTCh. 2 - Prob. 26CTCh. 2 - Prob. 27CTCh. 2 - Prob. 1PSCh. 2 - Prob. 2PSCh. 2 - Prob. 3PSCh. 2 - Prob. 4PSCh. 2 - Prob. 5PSCh. 2 - Prob. 6PSCh. 2 - Prob. 7PSCh. 2 - Prob. 8PSCh. 2 - Prob. 9PSCh. 2 - Prob. 10PSCh. 2 - Prob. 11PSCh. 2 - Prob. 1.1ECh. 2 - Prob. 1.2ECh. 2 - Prob. 1.3ECh. 2 - Prob. 2.1ECh. 2 - Prob. 2.2ECh. 2 - Prob. 2.3ECh. 2 - Prob. 3.1ECh. 2 - Prob. 3.2ECh. 2 - Prob. 3.3ECh. 2 - Prob. 4.1ECh. 2 - Prob. 4.2ECh. 2 - Prob. 4.3ECh. 2 - Prob. 5.1ECh. 2 - Prob. 5.2ECh. 2 - Prob. 5.3ECh. 2 - Prob. 1IRCh. 2 - Prob. 2IRCh. 2 - Prob. 3IRCh. 2 - Prob. 4IRCh. 2 - Prob. 1CTQCh. 2 - Prob. 2CTQCh. 2 - Prob. 3CTQ
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning