Author Question: List some methods used to restrict access to computers. What will be an ideal ... (Read 42 times)

s.tung

  • Hero Member
  • *****
  • Posts: 577
List some methods used to restrict access to computers.
 
  What will be an ideal response?

Question 2

__________________________ is a collection of 40 databases maintained by the National Library of Medicine. Some of the databases in the collection are MEDLINE and SDILINE.
 
  A. MEDCOM
  B. MEDLARS
  C. MED40
  D. MEDONLINE



tennis14576

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

Many organizations restrict access to their computers. This can be done by requiring authorized users to have personal identification numbers (PINs) or use passwords. Locking computer rooms and requiring employees to carry ID cards and keys are also used to restrict access. Biometric methods, including fingerprints, hand prints, retina or iris scans, lip prints, facial thermography, and body odor sensors, also help make sure only authorized people have access to computer systems. Biometric technology can use facial structure to identify individuals. Biometric keyboards can identify a typist by fingerprints.
None of these methods is foolproof. Even biometric methods, which for a time were seen as more reliable, are far from perfect. PINs and passwords can be forgotten or shared, and ID cards and keys can be lost or stolen.
Biometric methods also pose a threat to privacy, because anyone who can gain access to the database of physical characteristics gains access to other, possibly private information about you. Some biometric measures are inherently different than other security measures. In more traditional methods, such as fingerprinting, you are aware that your identity is being checked. However, iris and retina scans, facial thermographs, facial structure scans, and body odor sensors allow your identity to be checked without your knowledge, cooperation, or consent. This can be seen as an invasion of privacy. Now, there is the possibility of implanted radio frequency identification (RFID) tags as a security measure.

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Colchicine is a highly poisonous alkaloid originally extracted from a type of saffron plant that is used mainly to treat gout.

Did you know?

Your skin wrinkles if you stay in the bathtub a long time because the outermost layer of skin (which consists of dead keratin) swells when it absorbs water. It is tightly attached to the skin below it, so it compensates for the increased area by wrinkling. This happens to the hands and feet because they have the thickest layer of dead keratin cells.

Did you know?

The lipid bilayer is made of phospholipids. They are arranged in a double layer because one of their ends is attracted to water while the other is repelled by water.

Did you know?

The Food and Drug Administration has approved Risperdal, an adult antipsychotic drug, for the symptomatic treatment of irritability in children and adolescents with autism. The approval is the first for the use of a drug to treat behaviors associated with autism in children. These behaviors are included under the general heading of irritability and include aggression, deliberate self-injury, and temper tantrums.

Did you know?

In 2010, opiate painkllers, such as morphine, OxyContin®, and Vicodin®, were tied to almost 60% of drug overdose deaths.

For a complete list of videos, visit our video library