Which of the following is an example of an inappropriate use of the company network?

a. Checking competitors' websites to see what products they offer
b. Using the web to search for a new job
c. Booking a business trip
d. Doing a research for a business related project

ANS: B

Computer Science & Information Technology

You might also like to view...

An Auto-Scaling group spans 3 AZs and currently has 4 running EC2 instances. When Auto Scaling needs to terminate an EC2 instance by default, AutoScaling will:

A. Allow at least five minutes for Windows/Linux shutdown scripts to complete, before terminating the instance. B. Terminate the instance with the least active network connections. If multiple instances meet this criterion, one will be randomly selected. C. Send an SNS notification, if configured to do so. D. Terminate an instance in the AZ which currently has 2 running EC2 instances. E. Randomly select one of the 3 AZs, and then terminate an instance in that AZ.

Computer Science & Information Technology

Hamming code can

a. detect and correct all errors at the receiving end b. detect all errors and request retransmission c. detect and correct all single bit errors at the receiving end d. none of the above

Computer Science & Information Technology