Suppose you are a customs inspector. You are responsible for checking suitcases for secret compartments in which bulky items such as jewelry might be hidden. Describe the procedure you would follow to check for these compartments.

What will be an ideal response?


Although unrelated to the writing of programs, this question does call for the student to think creatively in developing a set of security requirements and a specification to meet those requirements.

Computer Science & Information Technology

You might also like to view...

Which statement about trees is false?

a. A tree is a nonlinear, two-dimensional data structure. b. Each node in a tree contains two links. c. The children of a node are called siblings. d. A node with no children is called a leaf node.

Computer Science & Information Technology

If  X is true, Y is true, and Z is false, which of the following expressions is true?

A. X AND Y AND Z B. X OR Y AND Z C. X AND Y OR Z D. X > Y AND Z

Computer Science & Information Technology

An Android is a closed source operating system that is based on the Linux kernel used for phones and tablets but is available on laptops and PCs

Indicate whether the statement is true or false

Computer Science & Information Technology

While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate

A. It is the default route. B. This is the address for the DHCP server. C. The PC has not been assigned an IP address. D. The firewall is down.

Computer Science & Information Technology