1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
3 years ago
13

The technology that identifies people through bodily characteristics is known as

Computers and Technology
2 answers:
RSB [31]3 years ago
8 0
Answer: Biometrics

Biometrics is a technology that determines people by his or her physiological characteristics. It is commonly used by big companies, establishments and of course schools.  It is also the study of a lot of biological characteristics. Biometrics is also used as an authentication measure through physical characteristics. 

levacccp [35]3 years ago
7 0

Answer: Biometric Identification

Explanation: The term biometrics refers to technologies that identify people through bodily characteristics such as fingerprints, retinal patterns, and voice patterns.

(Fingerprints are an example of biometrics—that is, body characteristics that identify individuals. Biometrics is an ideal tool for identification because the body characteristics don’t change.)

As the use of technology in medicine increases, biometrics may play a greater role in creating, accessing, and protecting the confidentiality of medical records. Biometrics can be used to

* Identify a patient. Fingerprints, for example, can identify a patient who is physically present, and voice recognition software can help verify the identity of a patient over the phone. This means of identification prevents health identity fraud, and it can instantly associate a patient, or the information generated with reference to the patient, with the correct records for both administrative and clinical purposes.

* Simplify secure access to records. Rather than memorizing and constantly changing passwords to preserve security, physicians and other health personnel can use their own biometric features that don’t change to create secure access for those entitled to access. The reliable authentication process of biometrics isn’t subject to the potential abuse that password sharing allows.

You might be interested in
The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured syst
erma4kov [3.2K]

Answer:

Isp

Explanation:

An Internet service provider is an organisation that provides services for accessing,

using, or participating in the Internet. Internet service providers can be organised in

various forms

6 0
3 years ago
How many orbiting satellites are requested to provide uninterrupted around the clock GPS service around the world
svp [43]
It’s at least 24 operational GPS satellites, 95% of the time I hope this helps
8 0
2 years ago
The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
ser-zykov [4K]

Answer:

Table function

Explanation:

The table function can also be used to compare between items. The items can be arranged in columns and the features tonbe compared can be placed in columns. With this one can make comparison between the items.

5 0
3 years ago
Suppose you would like to urgently deliver 40 terabytes data from boston to los angeles. you have available a 100 mbps dedicated
kotykmax [81]
FedEx overnight. It would take about 35 days to transfer all 40 terabytes. It would only move 4.32 terabytes of data in 12 hours.
4 0
3 years ago
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
Margaret [11]

Explanation:

A.)

we have two machines M1 and M2

cpi stands for clocks per instruction.

to get cpi for machine 1:

= we multiply frequencies with their corresponding M1 cycles and add everything up

50/100 x 1 = 0.5

20/100 x 2 = 0.4

30/100 x 3 = 0.9

CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8

We find CPI for machine 2

we use the same formula we used for 1 above

50/100 x 2 = 1

20/100 x 3 = 0.6

30/100 x 4 = 1.2

CPI for m2 =  1 + 0.6 + 1.2 = 2.8

B.)

CPU execution time for m1 and m2

this is calculated by using the formula;

I * CPI/clock cycle time

execution time for A:

= I * 1.8/60X10⁶

= I x 30 nsec

execution time b:

I x 2.8/80x10⁶

= I x 35 nsec

6 0
3 years ago
Other questions:
  • The         provides access to the Internet; may also be internal
    5·1 answer
  • What is the size of the opening in the camera that the light passes through?
    9·2 answers
  • You've created a letter from a blank document. To format this letter with a unified font, colors, and effects you'll apply a A.g
    6·2 answers
  • According to Fourman, Informatics is _______________ with a very _____________ scope.
    5·2 answers
  • A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
    9·1 answer
  • John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
    14·2 answers
  • Computer memory uses different numbers of bytes to store different data types.
    7·1 answer
  • Is EXE is the extension of MS Excel file.<br> subject: ICT for GR 5
    10·1 answer
  • Please help me i will mark as brainliest​
    10·1 answer
  • __________ translates analog voice signals into digital data and uses the Internet to transport the data.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!