1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
10

Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st

andard biometric technique (fingerprint, palm print, iris, facial features, etc.) and research the costs for having biometric readers for that technique located at two separate entrances into a building. Next, research ways in which attackers attempt to defeat this particular standard biometric technique. Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques

Computers and Technology
1 answer:
lyudmila [28]3 years ago
7 0

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

You might be interested in
What are examples of object types that can be viewed in the Navigation pane? Check all that :
TiliK225 [7]

Answer:

2.) Forms

4.) Queries

6.) Tables

Explanation:

8 0
3 years ago
A<br>A<br>printount<br>of your report or a till slip is an<br>example of what​
san4es73 [151]

Answer:

It's an example of a software/hardware.

Explanation:

4 0
3 years ago
Define the following <br>chatting <br>browsing <br>E-commerce​
vova2212 [387]

Answer:

- <em>chatting</em>: real-time communication via keyboard between two or more users on a local network (LAN) or over the Internet.

- <em>browsing</em>: refers to reading and scanning through data; commonly used to describe when a user reads through pages on the Internet and is also often referred to as surfing.

- <em>e-commerce</em>: commercial transactions conducted electronically on the internet.

5 0
3 years ago
While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
Contact [7]
Use currency conversion dialog box select rupee to us dollar
8 0
3 years ago
What are the functions of an input device​
marshall27 [118]

Answer:

To feed the computer with data/instructions

6 0
3 years ago
Read 2 more answers
Other questions:
  • Technician A says a modern automobile has more than 1 mile of wiring. Technician B says there could be more than 1,000 individua
    15·1 answer
  • HURRY
    5·1 answer
  • During which part of geologic time were dinosaurs most common?
    11·2 answers
  • On a digital clock the displayed time changes constantly (True or False)
    15·1 answer
  • When a CPU executes each instruction in a program, it uses a process known as the __________.
    15·1 answer
  • Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the
    11·1 answer
  • Suppose an initially empty stack S has performed a total of 15 push operations, 12 top operations, and 13 pop operations ( 3 of
    5·1 answer
  • what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
    6·1 answer
  • How do we benefit from this increased interconnectivity?
    6·1 answer
  • APCPS B U10L12 exam (Connexus)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!