Author Question: List some methods used to restrict access to computers. What will be an ideal ... (Read 38 times)

s.tung

  • Hero Member
  • *****
  • Posts: 577
List some methods used to restrict access to computers.
 
  What will be an ideal response?

Question 2

__________________________ is a collection of 40 databases maintained by the National Library of Medicine. Some of the databases in the collection are MEDLINE and SDILINE.
 
  A. MEDCOM
  B. MEDLARS
  C. MED40
  D. MEDONLINE



tennis14576

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

Many organizations restrict access to their computers. This can be done by requiring authorized users to have personal identification numbers (PINs) or use passwords. Locking computer rooms and requiring employees to carry ID cards and keys are also used to restrict access. Biometric methods, including fingerprints, hand prints, retina or iris scans, lip prints, facial thermography, and body odor sensors, also help make sure only authorized people have access to computer systems. Biometric technology can use facial structure to identify individuals. Biometric keyboards can identify a typist by fingerprints.
None of these methods is foolproof. Even biometric methods, which for a time were seen as more reliable, are far from perfect. PINs and passwords can be forgotten or shared, and ID cards and keys can be lost or stolen.
Biometric methods also pose a threat to privacy, because anyone who can gain access to the database of physical characteristics gains access to other, possibly private information about you. Some biometric measures are inherently different than other security measures. In more traditional methods, such as fingerprinting, you are aware that your identity is being checked. However, iris and retina scans, facial thermographs, facial structure scans, and body odor sensors allow your identity to be checked without your knowledge, cooperation, or consent. This can be seen as an invasion of privacy. Now, there is the possibility of implanted radio frequency identification (RFID) tags as a security measure.

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In 1844, Charles Goodyear obtained the first patent for a rubber condom.

Did you know?

In the United States, an estimated 50 million unnecessary antibiotics are prescribed for viral respiratory infections.

Did you know?

Approximately 500,000 babies are born each year in the United States to teenage mothers.

Did you know?

Though “Krazy Glue” or “Super Glue” has the ability to seal small wounds, it is not recommended for this purpose since it contains many substances that should not enter the body through the skin, and may be harmful.

Did you know?

Before a vaccine is licensed in the USA, the Food and Drug Administration (FDA) reviews it for safety and effectiveness. The CDC then reviews all studies again, as well as the American Academy of Pediatrics and the American Academy of Family Physicians. Every lot of vaccine is tested before administration to the public, and the FDA regularly inspects vaccine manufacturers' facilities.

For a complete list of videos, visit our video library