100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

C@CM Final Exam Questions And Answers100% Accuratelly Answered Graded A+.

Beoordeling
-
Verkocht
-
Pagina's
13
Cijfer
A+
Geüpload op
09-03-2025
Geschreven in
2024/2025

What is the main focus of the Computing Policy? a. Responsible behavior b. Secure computing c. Legal issues - correct answer a. Responsible behavior Do the standards established in the Computing Policy limit just to campus? - correct answer No, they extend off campus and govern one's behavior online What is acceptable behavior? - correct answer As a general rule, the university expects one to behave as a responsible, mature, and ethical person. Being respectful of fellow users and aware of the effect of one's usage of resources on others. Is it allowed to provide Web hosting on CMU's network? - correct answer No, this is prohibited behavior. One cannot resell services based on the university network. What is the penalty for multiple bandwidth overage violations? - correct answer 45-day network suspension What is the penalty for physically damaging a computer in one of the public labs? - correct answer Referral to campus police What is the penalty for exploiting a security vulnerability to access private student information? - correct answer Account suspension and referral to Student Affairs (causing intentional harm to the network or trying to exploit it to gain personal information would qualify for this severity of a penalty) Quota - correct answer A share or allotment that is assigned to a group or an individual How is your network quota measured? How much is a user alotted per day? - correct answer Daily bandwidth usage - 10 GB of bandwidth per day is alotted Bandwidth - correct answer The amount of data that can pass along a communications path in a given period of time 1st, 2nd, and 3rd Violation of Network Bandwidth Guidelines - correct answer Email notification from Computing Services, 72 hours to conform to guidelines, and daily monitoring (72 hours for each additional violation) 4th Violation of Network Bandwidth Guidelines - correct answer Machine suspended for 45 days, bandwidth usage permanently monitored daily What is access to university's computing resources contingent upon? - correct answer Mature, responsible behavior Is sending/receiving email an impact- or quota-based system? - correct answer Impact-based Is hosting a personal website from the Andrew Web server an impact- or quota-based system? - correct answer Impact-based Is using public computer labs an impact- or quota-based system? - correct answer Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible behavior) Is using scanners in public computer labs an impact- or quota-based system? - correct answer Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible behavior) Compromise - correct answer A breach in the security of a specific resource (potentially a computer, an account, a file, or another resource) 3 distinct aspects of protecting one's information - correct answer Confidentiality, integrity, and availability Confidentiality - correct answer Refers to who is able to read or access a resource (ensuring that only authorized users have access) Which information protection aspect does password sharing put at risk? - correct answer Confidentiality Fill in the blank: "A loss of __________ is an unauthorized disclosure of information" - correct answer Confidentiality Integrity - correct answer Ensuring that the data has not been changed inappropriately (whether these changes are accidental and innocent or are intentional and malicious) Fill in the blank: "A loss of __________ is the unauthorized modification or destruction of information" - correct answer Integrity Availability - correct answer How timely and reliable is the access to that resource (authorized users should be able to reliably get to the specific machine or information when needed) Which information protection aspect can be threatened by a network problem preventing access or a manual change of password? - correct answer Availability Fill in the blank: "A loss of _________ is the disruption of access to or use of information or an information system" - correct answer Availability To which information protection aspect does a virus which begins to log a student's key strokes and captures the password to his/her bank website relate? - correct answer Confidentiality (only unauthorized disclosure of information has occurred) Copyright - correct answer A series of rights that are granted to the author of an original work - focus on the reproduction and distribution of the work What cannot be copyrighted? - correct answer Facts, ideas, systems, or methods of operation Can a computer program be copyrighted? - correct answer Yes, because software is considered a literary work Digital Millennium Copyright Act (DMCA) - correct answer Sets expectations and safe harbors for online service providers (OSPs) encouraging them to provide and improve online services Up to what amount of money can you be liable for if you are caught with copyrighted material on your computer? - correct answer $150,00 per violation What does a student receive if he/she is caught distributing copyright material on campus? - correct answer DMCA Takedown Notice What are you required to do if you receive a DMCA Takedown Notice? - correct answer Stop the infringing behavior and contact Student Life Office within 72 hours (if not, all computers registered to you will be suspended from the network) Fair Use - correct answer The ability of students and educators to make use of copyrighted material for legitimate educational purposes Are all of the teaching and learning spaces available 24 hours a day, seven days a week during the academic year? - correct answer No, although most academic spaces are open 24 hours each day, there are a few exceptions (hours of operation, etc.) Teaching Computer Labs - correct answer Commonly used for academic courses where technology plays an integral role in the students' learning When can you use teaching computer labs? - correct answer Anytime that classes aren't in session Can learning computer labs be reserved for classes? - correct answer No What can you access from a Web Station? - correct answer Email, Canvas/SIO, Library Catalog, and printing files What is the time usage limit on a Web Station? - correct answer 15 minutes What does Virtual Andrew allow you to do? - correct answer Access a Windows computer lab computer remotely from your PC/mobile device via VMware View Can you print to the Andrew Printing public printers without having to install the printing software? - correct answer Yes LinkedIn Learning Service - correct answer Massive library of educational resources covering a wide range of software and technologies one will use throughout his/her academic career What kind of equipment can be provided by the University Libraries Technology Lending? - correct answer Microphones/ recorders, digital cameras/webcams, projectors, and assorted cables/adapters How can you access Sandbox/Local Home? a. personal computer

Meer zien Lees minder
Instelling
CMY
Vak
CMY









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CMY
Vak
CMY

Documentinformatie

Geüpload op
9 maart 2025
Aantal pagina's
13
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

C@CM Final Exam

What is the main focus of the Computing Policy?



a. Responsible behavior

b. Secure computing

c. Legal issues - correct answer a. Responsible behavior



Do the standards established in the Computing Policy limit just to campus? - correct answer
No, they extend off campus and govern one's behavior online



What is acceptable behavior? - correct answer As a general rule, the university
expects one to behave as a responsible, mature, and ethical person. Being respectful of fellow users and
aware of the effect of one's usage of resources on others.



Is it allowed to provide Web hosting on CMU's network? - correct answer No, this is
prohibited behavior. One cannot resell services based on the university network.



What is the penalty for multiple bandwidth overage violations? - correct answer 45-
day network suspension



What is the penalty for physically damaging a computer in one of the public labs? - correct answer
Referral to campus police



What is the penalty for exploiting a security vulnerability to access private student information? - correct
answer Account suspension and referral to Student Affairs (causing intentional harm
to the network or trying to exploit it to gain personal information would qualify for this severity of a
penalty)



Quota - correct answer A share or allotment that is assigned to a group or an
individual

, How is your network quota measured? How much is a user alotted per day? - correct answer
Daily bandwidth usage - 10 GB of bandwidth per day is alotted



Bandwidth - correct answer The amount of data that can pass along a
communications path in a given period of time



1st, 2nd, and 3rd Violation of Network Bandwidth Guidelines - correct answer Email
notification from Computing Services, 72 hours to conform to guidelines, and daily monitoring (72 hours
for each additional violation)



4th Violation of Network Bandwidth Guidelines - correct answer Machine suspended
for 45 days, bandwidth usage permanently monitored daily



What is access to university's computing resources contingent upon? - correct answer
Mature, responsible behavior



Is sending/receiving email an impact- or quota-based system? - correct answer
Impact-based



Is hosting a personal website from the Andrew Web server an impact- or quota-based system? - correct
answer Impact-based



Is using public computer labs an impact- or quota-based system? - correct answer
Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible
behavior)



Is using scanners in public computer labs an impact- or quota-based system? - correct answer
Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible
behavior)



Compromise - correct answer A breach in the security of a specific resource
(potentially a computer, an account, a file, or another resource)

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
RealGrades Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
170
Lid sinds
2 jaar
Aantal volgers
52
Documenten
11665
Laatst verkocht
3 weken geleden

4.0

26 beoordelingen

5
12
4
5
3
7
2
1
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen