DBMSs are used primarily for modeling data.
Answer the following statement true (T) or false (F)
False
You might also like to view...
A(n) ____ procedure does not return a value.
A. Sub B. Function C. Assignment D. Static
Answer the following statements true (T) or false (F)
1. The Windows desktop is manipulated by using a mouse. 2. Perhaps the easiest way to launch or start a program whose icon appears on the desktop is to click on the icon. 3. To launch any program from the Start menu, pull down the All Programs menu and then select the program. 4. Running two or more programs simultaneously is called multitasking. 5. Under Windows, each active program runs in its own window.
Create a list of ten different PandA encodings that are different from those presented in this chapter.
What will be an ideal response?
A variation of the following biometric authentication protocol was experimentally tested several years ago at immigration checkpoints in major U.S. airports. A user registers in person by showing her credentials (e.g., passport and visa) to the registration authority and giving her fingerprint (a "palmprint" was actually used). The registration authority then issues to the user a tamper-resistant
smartcard that stores the reference fingerprint vector and can execute the matching algorithm. The checkpoint is equipped with a tamper resistant admission device that contains a fingerprint reader and a smartcard reader. The user inserts her smartcard and provides her fingerprint to the device, which forwards it to the smartcard. The smartcard executes the comparison algorithms and outputs the result ("match" or "no match") to the device, which admits or rejects the user accord ingly. Clearly, an attacker can defeat this scheme by programming a smartcard that always outputs "match.". Show how to modify the scheme to make it more secure. Namely, the ad mission device needs to make sure that it is interacting with a valid smartcard issued by the registration authority. You can assume that the smartcard can perform cryptographic com putations and that the admission device knows the public key of the registration authority. The attacker can program smartcards and is allowed to have an input-output interaction with a valid smartcard but cannot obtain the data stored inside it.