Important Questions on Electronic Voting

Only available on StudyMode
  • Download(s) : 738
  • Published : May 7, 2013
Open Document
Text Preview
1.) Explain different ways a vote thief could cast multiple votes in an online election and in automated election (PCOS MACHINE)
A vote thief could cast multiple votes in an online election and in automated election in many ways; one of these is through online overriding a voting system, the thieves’ control the voting system through internet without noticed by the public officials, they manipulate the vote counts, and also the campaign adds by the candidates not only the vote thieves can do all multiple vote casting; also the internet hackers which is more threatening when they attacked, some hackers attacks the government websites, one of the hackers that works on these is the Anonymous Hackers which is now advertised on television due to their hacking activities on the government websites.

Another way a vote thief can cast a multiple vote is through an automated election, our country today is now on a state of using the method of automated election with the use of PCOS MACHINE, this machine counts the people`s vote mechanically and it works like a Xerox machine scanning the information on your paper. A vote thief can cast multiple votes in a PCOS MACINE by putting a material that can pass the machine`s scanning process and make it count the multiple votes, they can also put a foreign object to surpass the machine`s system to cast multiple vote, another way is they can do some tricks like the scammers usually do in an ATM MACHINE.

2.) What is the quickest and safest to make a computer secure?
Here's how to protect your digital identity and your computer from threats such as viruses, spyware, and phishing scams. You should have a back up on your files, don't wait until you lose hours or even years of work in a single moment. You should change your password to prevent your account or protected files to be hacked by a saboteur. Firewalls can help protect computers by blocking potentially hostile connection attempts. Malware, or malicious software, is...
tracking img