Identifying who can use computer hardware, programs, and data—and limiting how they can be used—limits the way hackers make trouble. Time needed: 25 minutes. Materials needed: Activity: First, choose an object anywhere in your house that’s a container, like a refrigerator, someone's backpack, a drawer, or a leftovers container in the refrigerator.