Author Question: List some methods used to restrict access to computers. What will be an ideal ... (Read 51 times)

s.tung

  • Hero Member
  • *****
  • Posts: 577
List some methods used to restrict access to computers.
 
  What will be an ideal response?

Question 2

__________________________ is a collection of 40 databases maintained by the National Library of Medicine. Some of the databases in the collection are MEDLINE and SDILINE.
 
  A. MEDCOM
  B. MEDLARS
  C. MED40
  D. MEDONLINE



tennis14576

  • Sr. Member
  • ****
  • Posts: 334
Answer to Question 1

Many organizations restrict access to their computers. This can be done by requiring authorized users to have personal identification numbers (PINs) or use passwords. Locking computer rooms and requiring employees to carry ID cards and keys are also used to restrict access. Biometric methods, including fingerprints, hand prints, retina or iris scans, lip prints, facial thermography, and body odor sensors, also help make sure only authorized people have access to computer systems. Biometric technology can use facial structure to identify individuals. Biometric keyboards can identify a typist by fingerprints.
None of these methods is foolproof. Even biometric methods, which for a time were seen as more reliable, are far from perfect. PINs and passwords can be forgotten or shared, and ID cards and keys can be lost or stolen.
Biometric methods also pose a threat to privacy, because anyone who can gain access to the database of physical characteristics gains access to other, possibly private information about you. Some biometric measures are inherently different than other security measures. In more traditional methods, such as fingerprinting, you are aware that your identity is being checked. However, iris and retina scans, facial thermographs, facial structure scans, and body odor sensors allow your identity to be checked without your knowledge, cooperation, or consent. This can be seen as an invasion of privacy. Now, there is the possibility of implanted radio frequency identification (RFID) tags as a security measure.

Answer to Question 2

B



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Between 1999 and 2012, American adults with high total cholesterol decreased from 18.3% to 12.9%

Did you know?

The first-known contraceptive was crocodile dung, used in Egypt in 2000 BC. Condoms were also reportedly used, made of animal bladders or intestines.

Did you know?

A seasonal flu vaccine is the best way to reduce the chances you will get seasonal influenza and spread it to others.

Did you know?

For pediatric patients, intravenous fluids are the most commonly cited products involved in medication errors that are reported to the USP.

Did you know?

According to research, pregnant women tend to eat more if carrying a baby boy. Male fetuses may secrete a chemical that stimulates their mothers to step up her energy intake.

For a complete list of videos, visit our video library