100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

C@CM Final Exam Questions And Answers100% Accuratelly Answered Graded A+.

Puntuación
-
Vendido
-
Páginas
13
Grado
A+
Subido en
09-03-2025
Escrito en
2024/2025

What is the main focus of the Computing Policy? a. Responsible behavior b. Secure computing c. Legal issues - correct answer a. Responsible behavior Do the standards established in the Computing Policy limit just to campus? - correct answer No, they extend off campus and govern one's behavior online What is acceptable behavior? - correct answer As a general rule, the university expects one to behave as a responsible, mature, and ethical person. Being respectful of fellow users and aware of the effect of one's usage of resources on others. Is it allowed to provide Web hosting on CMU's network? - correct answer No, this is prohibited behavior. One cannot resell services based on the university network. What is the penalty for multiple bandwidth overage violations? - correct answer 45-day network suspension What is the penalty for physically damaging a computer in one of the public labs? - correct answer Referral to campus police What is the penalty for exploiting a security vulnerability to access private student information? - correct answer Account suspension and referral to Student Affairs (causing intentional harm to the network or trying to exploit it to gain personal information would qualify for this severity of a penalty) Quota - correct answer A share or allotment that is assigned to a group or an individual How is your network quota measured? How much is a user alotted per day? - correct answer Daily bandwidth usage - 10 GB of bandwidth per day is alotted Bandwidth - correct answer The amount of data that can pass along a communications path in a given period of time 1st, 2nd, and 3rd Violation of Network Bandwidth Guidelines - correct answer Email notification from Computing Services, 72 hours to conform to guidelines, and daily monitoring (72 hours for each additional violation) 4th Violation of Network Bandwidth Guidelines - correct answer Machine suspended for 45 days, bandwidth usage permanently monitored daily What is access to university's computing resources contingent upon? - correct answer Mature, responsible behavior Is sending/receiving email an impact- or quota-based system? - correct answer Impact-based Is hosting a personal website from the Andrew Web server an impact- or quota-based system? - correct answer Impact-based Is using public computer labs an impact- or quota-based system? - correct answer Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible behavior) Is using scanners in public computer labs an impact- or quota-based system? - correct answer Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible behavior) Compromise - correct answer A breach in the security of a specific resource (potentially a computer, an account, a file, or another resource) 3 distinct aspects of protecting one's information - correct answer Confidentiality, integrity, and availability Confidentiality - correct answer Refers to who is able to read or access a resource (ensuring that only authorized users have access) Which information protection aspect does password sharing put at risk? - correct answer Confidentiality Fill in the blank: "A loss of __________ is an unauthorized disclosure of information" - correct answer Confidentiality Integrity - correct answer Ensuring that the data has not been changed inappropriately (whether these changes are accidental and innocent or are intentional and malicious) Fill in the blank: "A loss of __________ is the unauthorized modification or destruction of information" - correct answer Integrity Availability - correct answer How timely and reliable is the access to that resource (authorized users should be able to reliably get to the specific machine or information when needed) Which information protection aspect can be threatened by a network problem preventing access or a manual change of password? - correct answer Availability Fill in the blank: "A loss of _________ is the disruption of access to or use of information or an information system" - correct answer Availability To which information protection aspect does a virus which begins to log a student's key strokes and captures the password to his/her bank website relate? - correct answer Confidentiality (only unauthorized disclosure of information has occurred) Copyright - correct answer A series of rights that are granted to the author of an original work - focus on the reproduction and distribution of the work What cannot be copyrighted? - correct answer Facts, ideas, systems, or methods of operation Can a computer program be copyrighted? - correct answer Yes, because software is considered a literary work Digital Millennium Copyright Act (DMCA) - correct answer Sets expectations and safe harbors for online service providers (OSPs) encouraging them to provide and improve online services Up to what amount of money can you be liable for if you are caught with copyrighted material on your computer? - correct answer $150,00 per violation What does a student receive if he/she is caught distributing copyright material on campus? - correct answer DMCA Takedown Notice What are you required to do if you receive a DMCA Takedown Notice? - correct answer Stop the infringing behavior and contact Student Life Office within 72 hours (if not, all computers registered to you will be suspended from the network) Fair Use - correct answer The ability of students and educators to make use of copyrighted material for legitimate educational purposes Are all of the teaching and learning spaces available 24 hours a day, seven days a week during the academic year? - correct answer No, although most academic spaces are open 24 hours each day, there are a few exceptions (hours of operation, etc.) Teaching Computer Labs - correct answer Commonly used for academic courses where technology plays an integral role in the students' learning When can you use teaching computer labs? - correct answer Anytime that classes aren't in session Can learning computer labs be reserved for classes? - correct answer No What can you access from a Web Station? - correct answer Email, Canvas/SIO, Library Catalog, and printing files What is the time usage limit on a Web Station? - correct answer 15 minutes What does Virtual Andrew allow you to do? - correct answer Access a Windows computer lab computer remotely from your PC/mobile device via VMware View Can you print to the Andrew Printing public printers without having to install the printing software? - correct answer Yes LinkedIn Learning Service - correct answer Massive library of educational resources covering a wide range of software and technologies one will use throughout his/her academic career What kind of equipment can be provided by the University Libraries Technology Lending? - correct answer Microphones/ recorders, digital cameras/webcams, projectors, and assorted cables/adapters How can you access Sandbox/Local Home? a. personal computer

Mostrar más Leer menos
Institución
CMY
Grado
CMY









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CMY
Grado
CMY

Información del documento

Subido en
9 de marzo de 2025
Número de páginas
13
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

C@CM Final Exam

What is the main focus of the Computing Policy?



a. Responsible behavior

b. Secure computing

c. Legal issues - correct answer a. Responsible behavior



Do the standards established in the Computing Policy limit just to campus? - correct answer
No, they extend off campus and govern one's behavior online



What is acceptable behavior? - correct answer As a general rule, the university
expects one to behave as a responsible, mature, and ethical person. Being respectful of fellow users and
aware of the effect of one's usage of resources on others.



Is it allowed to provide Web hosting on CMU's network? - correct answer No, this is
prohibited behavior. One cannot resell services based on the university network.



What is the penalty for multiple bandwidth overage violations? - correct answer 45-
day network suspension



What is the penalty for physically damaging a computer in one of the public labs? - correct answer
Referral to campus police



What is the penalty for exploiting a security vulnerability to access private student information? - correct
answer Account suspension and referral to Student Affairs (causing intentional harm
to the network or trying to exploit it to gain personal information would qualify for this severity of a
penalty)



Quota - correct answer A share or allotment that is assigned to a group or an
individual

, How is your network quota measured? How much is a user alotted per day? - correct answer
Daily bandwidth usage - 10 GB of bandwidth per day is alotted



Bandwidth - correct answer The amount of data that can pass along a
communications path in a given period of time



1st, 2nd, and 3rd Violation of Network Bandwidth Guidelines - correct answer Email
notification from Computing Services, 72 hours to conform to guidelines, and daily monitoring (72 hours
for each additional violation)



4th Violation of Network Bandwidth Guidelines - correct answer Machine suspended
for 45 days, bandwidth usage permanently monitored daily



What is access to university's computing resources contingent upon? - correct answer
Mature, responsible behavior



Is sending/receiving email an impact- or quota-based system? - correct answer
Impact-based



Is hosting a personal website from the Andrew Web server an impact- or quota-based system? - correct
answer Impact-based



Is using public computer labs an impact- or quota-based system? - correct answer
Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible
behavior)



Is using scanners in public computer labs an impact- or quota-based system? - correct answer
Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible
behavior)



Compromise - correct answer A breach in the security of a specific resource
(potentially a computer, an account, a file, or another resource)
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
RealGrades Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
170
Miembro desde
2 año
Número de seguidores
52
Documentos
11665
Última venta
3 semanas hace

4.0

26 reseñas

5
12
4
5
3
7
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes