Tess-Privacy
edited
Name: Tess Unami Tueros Hofstede
... of Article: "NSW
"NSW Police get
Date publi…
Name: Tess Unami Tueros Hofstede
...
of Article: "NSW
"NSW Police get
Date published: 27th of February, 2009
Brief description of the ideas in the article:
...
the community.
Technology:
The fingerprint scanner is the most common type of biometric used for security. It provides an identification of a person based on the acquisition and recognition of the individual and unique patterns and ridges in a fingerprint.
Tess_Q_P
edited
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informat…
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
Nitza_Q_P
edited
Answer the following questions
Remember to mention IT in your answers and support it with your kn…
Answer the following questions
Remember to mention IT in your answers and support it with your knowledge.
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
Marketing databases
Government surveillance Remember to mention ITDefine 4 terms in your answers and support it with your knowledge. the table above (that do not have a definition yet)
Nitza_Q_P
Tess_Q_P
Gabriela_Q_P
edited
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informa…
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
Q2: “The computer is a great humanizing factor because it makes the individual more important. The more information we have on each individual, the more each individual counts.” Do you agree with this statement by science fiction writer Isaac Asimov? Explain your answer giving reasons, facts and IT support.
Q3: Biometrics: What is Biometrics. Describe three situations where biometrics is used. Explain when these uses maybe an invasion to privacy and how can this be prevented.
Q4: Determine what information about you is stored in your school computers. What information are you allowed to see? What information are others allowed to see? Exactly who may access your files? Can you find out who sees your files? How long is the information retained after you leave school? (Mention how this investigation was conducted.)
Tess_Q_P
edited
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informa…
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
Q2: “The computer is a great humanizing factor because it makes the individual more important. The more information we have on each individual, the more each individual counts.” Do you agree with this statement by science fiction writer Isaac Asimov? Explain your answer giving reasons, facts and IT support.
Q3: Biometrics: What is Biometrics. Describe three situations where biometrics is used. Explain when these uses maybe an invasion to privacy and how can this be prevented.
Q4: Determine what information about you is stored in your school computers. What information are you allowed to see? What information are others allowed to see? Exactly who may access your files? Can you find out who sees your files? How long is the information retained after you leave school? (Mention how this investigation was conducted.)
Nitza_Q_P
edited
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informa…
Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
Q2: “The computer is a great humanizing factor because it makes the individual more important. The more information we have on each individual, the more each individual counts.” Do you agree with this statement by science fiction writer Isaac Asimov? Explain your answer giving reasons, facts and IT support.
Q3: Biometrics: What is Biometrics. Describe three situations where biometrics is used. Explain when these uses maybe an invasion to privacy and how can this be prevented.
Q4: Determine what information about you is stored in your school computers. What information are you allowed to see? What information are others allowed to see? Exactly who may access your files? Can you find out who sees your files? How long is the information retained after you leave school? (Mention how this investigation was conducted.)