FUNDAMENTALS OF COMPUTER

APPLICATION SYSTEM SOFTWARE

DESKTOP PUBLISHING WORD PROCESSING SOFTWARE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following best describes an AUP (Acceptable Use Policy)?
A
Guidelines for using the internet
B
Identifies school rules
C
Identifies bullies in the classroom
D
Identifies inappropriate computer use
Explanation: 

Detailed explanation-1: -Which of the following statements best defines an acceptable use policy (AUP)? It defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and it specifies consequences for noncompliance.

Detailed explanation-2: -An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.

Detailed explanation-3: -An Access Policy or acceptable use policy is a set of rules applied by the owner/manager/user of a computer system that restrict the ways in which the system or network site may be used.

Detailed explanation-4: -Data backups are a technical control. Which type of access control type is an acceptable use policy (AUP) most likely considered? Explanation: The most popular directive control is an acceptable use policy (AUP) that lists proper (and often examples of improper) procedures and behaviors that personnel must follow.

Detailed explanation-5: -An acceptable use policy usually: Includes specific rules, such as no video pirating. Outlines consequences for breaking the rules, such as warnings or suspension of access. Details an organization’s philosophy for granting access (for example, internet use is a privilege that can be revoked, rather than a right)

There is 1 question to complete.