Describe two examples of vulnerabilities of automobiles for which auto manufacturers have instituted controls. Tell whether you think these controls are effective, somewhat effective, or ineffective.

What will be an ideal response?


Vulnerability: Someone drives your car away without your permission. Control: Ignition switch lock. Effectiveness: Somewhat effective because it deters casual theft, but the knowledgeable thief can “hot wire” the engine, bypassing the ignition switch.

Vulnerability: Someone who does not realize your car has stopped crashes into the back of your car. Control: Brake lights. Effectiveness: Reasonably good. Note the redundancy of the system: with two brake lights, even if one fails, the second one warns other drivers.

Computer Science & Information Technology

You might also like to view...

What is the SQL statement needed to insert a new field in the Student table that would store the total number of credits each student has accumulated? What data type should we use, and why?

What will be an ideal response?

Computer Science & Information Technology

Flash memory does not require a constant power supply

Indicate whether the statement is true or false

Computer Science & Information Technology

Ratio data is similar to ordinal data except that the differences between the data can be quantified and proportions can be specified

Indicate whether the statement is true or false

Computer Science & Information Technology

Round robin is a load-balancing mechanism used by DNS servers to distribute name resolution activity among all available DNS servers

Indicate whether the statement is true or false

Computer Science & Information Technology