What is the main focus of the Computing Policy?
a. Responsible behavior
b. Secure computing
c. Legal issues - correct answer a. Responsible behavior
Do the standards established in the Computing Policy limit just to campus? - correct answer
No, they extend off campus and govern one's behavior online
What is acceptable behavior? - correct answer As a general rule, the university
expects one to behave as a responsible, mature, and ethical person. Being respectful of fellow users and
aware of the effect of one's usage of resources on others.
Is it allowed to provide Web hosting on CMU's network? - correct answer No, this is
prohibited behavior. One cannot resell services based on the university network.
What is the penalty for multiple bandwidth overage violations? - correct answer 45-
day network suspension
What is the penalty for physically damaging a computer in one of the public labs? - correct answer
Referral to campus police
What is the penalty for exploiting a security vulnerability to access private student information? - correct
answer Account suspension and referral to Student Affairs (causing intentional harm
to the network or trying to exploit it to gain personal information would qualify for this severity of a
penalty)
Quota - correct answer A share or allotment that is assigned to a group or an
individual
, How is your network quota measured? How much is a user alotted per day? - correct answer
Daily bandwidth usage - 10 GB of bandwidth per day is alotted
Bandwidth - correct answer The amount of data that can pass along a
communications path in a given period of time
1st, 2nd, and 3rd Violation of Network Bandwidth Guidelines - correct answer Email
notification from Computing Services, 72 hours to conform to guidelines, and daily monitoring (72 hours
for each additional violation)
4th Violation of Network Bandwidth Guidelines - correct answer Machine suspended
for 45 days, bandwidth usage permanently monitored daily
What is access to university's computing resources contingent upon? - correct answer
Mature, responsible behavior
Is sending/receiving email an impact- or quota-based system? - correct answer
Impact-based
Is hosting a personal website from the Andrew Web server an impact- or quota-based system? - correct
answer Impact-based
Is using public computer labs an impact- or quota-based system? - correct answer
Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible
behavior)
Is using scanners in public computer labs an impact- or quota-based system? - correct answer
Impact-based (no time limit, but acknowledging others' needs for the resource is considered responsible
behavior)
Compromise - correct answer A breach in the security of a specific resource
(potentially a computer, an account, a file, or another resource)