Computer Science > EXAM > C@CM (Computing @ Carnegie Mellon) Exam Latest Updated Graded A+ (All)

C@CM (Computing @ Carnegie Mellon) Exam Latest Updated Graded A+

Document Content and Description Below

Which of the following is NOT a responsibility established by the Computing Policy? A.Behave in ways that are respectful of others' property and privacy rights. B.Communicate in proper and legal w... ays. C.Use computing resources only for academic coursework. D.Share resources in a responsible way. E.Maintain the security and confidentiality of your account. - ANSWER C (Use computing resources only for academic coursework) Which of the following options is NOT a possible penalty for violating the university's Computing Policy? A.Fines B.Confiscation of personal computing equipment C.Academic suspension D.Community service - ANSWER B (Confiscation of personal computing equipment) Which of the following best summarizes the Computing Policy? A.The Computing Policy explicitly defines all prohibited computing behaviors as required by the DMCA. B.The Computing Policy is a community standard that establishes your responsibility to behave as a mature, reasonable and ethical person. C. The Computing Policy establishes specific student responsibilities for behaving in compliance with state and federal law. - ANSWER B (The Computing Policy is a community standard that establishes your responsibility to behave as a mature, reasonable and ethical person.) Devon visits his neighbor's room to get help on a homework assignment. While there, he logs into his Andrew account and forgets to log out before he leaves. His neighbor notices that the account is still logged in and adds a course to Devon's academic schedule. Which of the following has been violated? A.Confidentiality B. Integrity C.Availability D. None of the above - ANSWER B ______ addresses the question of how certain you can be about the accuracy of your resources and information. - ANSWER Integrity The ______ of a resource refers to how timely and reliable access to that resource is. - ANSWER Availability Maintaining the _______ of a resource means that authorized users are able to reliably get to the specific machine or information when needed. - ANSWER Availability Maintaining the ______ of information means ensuring that the data has not been changed inappropriately, whether these changes are accidental and innocent or are intentional and malicious. - ANSWER Integrity After dating for a year, Guadalupe and Harley share everything, including their Andrew passwords. Guadalupe begins reading Harley's mail and discovers that Harley's been seeing other people. In a rage, Guadalupe deletes mail and changes the password. Guadalupe has compromised the _______ of Harley's account. - ANSWER Availability _______ is about ensuring that only authorized users have access and that unauthorized users are excluded. - ANSWER Confidentiality What is the immediate consequence imposed by the university on targets of DMCA Takedown Notices? A.Civil lawsuit B. 72 hours for the student to resolve the issue with Student Life Office or face a general network suspension C. Failing course grade D. Criminal charges - ANSWER B (72 hours for the student to resolve the issue with Student Life Office or face a general network suspension) Which of the following statements best describes the anonymity of P2P usage? A. Only users that upload files are identifiable in a P2P environment; downloading is anonymous. B. Only users that download files are identifiable in a P2P environment; uploading is anonymous. C. Users of P2P applications are completely anonymous. D. Users of P2P applications are not anonymous, whether uploading or downloading. - ANSWER D (Users of P2P applications are not anonymous, whether uploading or downloading.) Under the provisions of the DMCA, Carnegie Mellon is obligated to: A. Block ports commonly accessed by P2P applications from being used on its network. B. Ensure that all software that is used by computers on the university network is appropriately licensed. C. Actively monitor its network for copyright violations. D. Respond to any complaints of copyright infringement by stopping the alleged violation from continuing. - ANSWER D (Respond to any complaints of copyright infringement by stopping the alleged violation from continuing.) The Digital Millennium Copyright Act: A. Criminalizes the use of P2P applications for any use whatsoever. [Show More]

Last updated: 1 year ago

Preview 1 out of 8 pages

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
45
0

Document information


Connected school, study & course


About the document


Uploaded On

Nov 22, 2022

Number of pages

8

Written in

Seller


seller-icon
MARKALLAN

Member since 1 year

55 Documents Sold


Additional information

This document has been written for:

Uploaded

Nov 22, 2022

Downloads

 0

Views

 45

Document Keyword Tags

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·