Professional Documents
Culture Documents
b. TECHNOLOGICAL/COMPUTERISED SYSTEM.
YOUR PHONE
YOUR LAPTOP
TRAINEES EXCHANGE PHONE AND TRY TO ACCESS DATA IN THE PHONE THINK OF
YOUR WORK GADGET,
YOUR FILES/FOLDERS
YOUR WHARTSAPP/ MESSAGES
COMPUTERISED
ACCESS CONTROL
they include:-
i. Alarm system
ii. Passwords
iii. Private identification numbers
iv. Swipe/ access cards
v. Fingerprints
vi. X-ray/ scanning machines
vii. Metal detectors
viii. Voice recognition
ix. Facial recognition
x. Pattern recognition
xi. hand geometry
NB LIST THE ADV AND DISADV OF ALL.
COMPUTERISED
ACCESS CONTROL
ANY OTHER FORMS