Author Question: List some methods used to restrict access to computers. What will be an ideal ... (Read 37 times)

s.tung

  • Hero Member
  • *****
  • Posts: 577
List some methods used to restrict access to computers.
 
  What will be an ideal response?

Question 2

__________________________ is a collection of 40 databases maintained by the National Library of Medicine. Some of the databases in the collection are MEDLINE and SDILINE.
 
  A. MEDCOM
  B. MEDLARS
  C. MED40
  D. MEDONLINE



tennis14576

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

Many organizations restrict access to their computers. This can be done by requiring authorized users to have personal identification numbers (PINs) or use passwords. Locking computer rooms and requiring employees to carry ID cards and keys are also used to restrict access. Biometric methods, including fingerprints, hand prints, retina or iris scans, lip prints, facial thermography, and body odor sensors, also help make sure only authorized people have access to computer systems. Biometric technology can use facial structure to identify individuals. Biometric keyboards can identify a typist by fingerprints.
None of these methods is foolproof. Even biometric methods, which for a time were seen as more reliable, are far from perfect. PINs and passwords can be forgotten or shared, and ID cards and keys can be lost or stolen.
Biometric methods also pose a threat to privacy, because anyone who can gain access to the database of physical characteristics gains access to other, possibly private information about you. Some biometric measures are inherently different than other security measures. In more traditional methods, such as fingerprinting, you are aware that your identity is being checked. However, iris and retina scans, facial thermographs, facial structure scans, and body odor sensors allow your identity to be checked without your knowledge, cooperation, or consent. This can be seen as an invasion of privacy. Now, there is the possibility of implanted radio frequency identification (RFID) tags as a security measure.

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Though methadone is often used to treat dependency on other opioids, the drug itself can be abused. Crushing or snorting methadone can achieve the opiate "rush" desired by addicts. Improper use such as these can lead to a dangerous dependency on methadone. This drug now accounts for nearly one-third of opioid-related deaths.

Did you know?

Signs and symptoms that may signify an eye tumor include general blurred vision, bulging eye(s), double vision, a sensation of a foreign body in the eye(s), iris defects, limited ability to move the eyelid(s), limited ability to move the eye(s), pain or discomfort in or around the eyes or eyelids, red or pink eyes, white or cloud spots on the eye(s), colored spots on the eyelid(s), swelling around the eyes, swollen eyelid(s), and general vision loss.

Did you know?

Serum cholesterol testing in adults is recommended every 1 to 5 years. People with diabetes and a family history of high cholesterol should be tested even more frequently.

Did you know?

Certain topical medications such as clotrimazole and betamethasone are not approved for use in children younger than 12 years of age. They must be used very cautiously, as directed by a doctor, to treat any child. Children have a much greater response to topical steroid medications.

Did you know?

The training of an anesthesiologist typically requires four years of college, 4 years of medical school, 1 year of internship, and 3 years of residency.

For a complete list of videos, visit our video library