首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
In computing, passwords are commonly used to limit access to official users. Yet the widespread use of passwords has serious dra
In computing, passwords are commonly used to limit access to official users. Yet the widespread use of passwords has serious dra
admin
2010-01-17
43
问题
In computing, passwords are commonly used to limit access to official users. Yet the widespread use of passwords has serious drawbacks. Office workers now have to remember an average of twelve system passwords. In theory they should use different passwords for each site, but in reality these would be impossible to remember, so many people use the same password for all.
An additional problem is that the majority use simple words such as "hello", or names of family members, instead of more secure combinations of numbers and letters, such as 6ANV76Y. This permits computer hackers to download dictionaries and quickly find the word that allows them access.
When system users forget their passwords there is extra expense in supplying new ones, while if people are forced to change passwords frequently they often write them down, making systems even less secure. Therefore, it is clear that the idea of passwords, which have been used as security devices for thousands of years, may need rethinking.
One possible alternative has been developed by the American firm Real User, and is called "passfaces". In order to access the system a worker has to select a series of photographs of faces from a randomly (随机地) generated sequence. If the pictures are selected in the correct order, access is granted. This concept depends on the human ability to recognize and remember a huge number of different faces, and the advantage is that such a sequence cannot be told to anyone or written down, so is more secure. It is claimed that the picture sequence, which used photographs of university students, is easier to remember than passwords, and it has now been adopted for the United States Senate.
"Passfaces" is a method to get access to a system through ______.
选项
A、remembering a large number of faces
B、selecting photographs of faces one likes
C、recognizing a sequence of face pictures
D、showing one’s face in front of the computer
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/YAYi777K
本试题收录于:
GCT工程硕士(英语)题库专业硕士分类
0
GCT工程硕士(英语)
专业硕士
相关试题推荐
Accordingtothespeaker,theproblemwith"insidervolumes"isthatthey______.Whenthespeakersaysthathesimultaneously
Thegovernmentregulations______thatputthisoldcityunderprotection.
Anotherculturalaspectofnonverbalcommunicationisonethatyoumightnotthinkabout:space.Everypersonperceiveshimself
Iwantanassistantwith______littleknowledgeofGermanand______experienceofofficeroutine.
Stranger:Excuserme,doyouhavesmallchangeforadollar?Passer-by:______
Theappealofadvertisingtobuyingmotivescanhavebothnegativeandpositiveeffects.Consumersmaybeconvincedtobuya
Humanbeingsareanimals.Webreathe,eatanddigest,andreproducethesamelife【B1】commontoallanimals.Inabiologicallabo
Elephantswhopaintaren’tnew.PaintingsbyRuby,anAsianelephantwholivedatthePhoenixZooinArizona,soldforupto$5,
Incomputing,passwordsarecommonlyusedtolimitaccesstoofficialusers.Yetthewidespreaduseofpasswordshasseriousdra
Noneofthesoldierswasallowedtoopenfireunlessheavylosswasshowntobe______inevitable.
随机试题
孕中期保健的重点是
患者,男,70岁,高血压三十余年。突然剧烈头痛、呕吐、意识不清。护理体检发现左侧周围性面瘫,右侧肢体瘫痪,巴氏征阳性,考虑为脑出血收入院。此时首要的护理措施是
关于数据与信息的关系,下列说法错误的是()。
行政行为合法的有效成立条件是()。①行为主体合法;②行为客体合法;③行为内容合法;④行为程序合法;⑤行为中介合法;⑥形式合法;⑦结果合法
与衬铅设备相比,搪铅设备使用的不同点有()。
下列各项中,属于债务重组日债务人应计入重组后负债账面价值的有()。
下列对哲学家及其思想的认定不正确的是()。
软件详细设计的方框图方法常用两个盒子:数据盒和过程盒,在数据盒中包含四种描述,它们是【】、局部数据、数据结构和调用参数描述。
A、Wivesandhusbandsdoingexactlythesamething.B、Equalityofthesexes.C、Husbandsearningenoughmoneytosupporttheirfam
A、Theyrefusedtoapologizeforhavingfollowedherthroughthetown.B、Theyregrettedhavingwronglyaccusedherofstealing.C
最新回复
(
0
)