1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
10

Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st

andard biometric technique (fingerprint, palm print, iris, facial features, etc.) and research the costs for having biometric readers for that technique located at two separate entrances into a building. Next, research ways in which attackers attempt to defeat this particular standard biometric technique. Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques

Computers and Technology
1 answer:
lyudmila [28]3 years ago
7 0

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

You might be interested in
Write the code in python to ask the user to input two integers. Your program will then print the greatest common divisor of the
Hunter-Best [27]

import math

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

print(math.gcd(num1, num2))

The gcd() - greatest common divisor function, which is part of the math module works perfectly in this situation.

3 0
2 years ago
In order to print multiple worksheets, what needs to happen before printing?
ryzh [129]

Answer:

Explanation:

Click the File tab.

Click Print, or press the control p keyboard command.

On the Print screen, select the printer and other settings.

Click Print.

7 0
3 years ago
4. This is considered to be short term memory because it only holds programs
9966 [12]

Answer:

RAM

Explanation:

RAM or Random Access Memory only holds programs which are currently running

8 0
3 years ago
"So far this month you have achieved $100.00 in sales, which is 50% of your total monthly goal. With only 5 more workdays this m
Rus_ich [418]

Answer:

$20 per day for next 5 working days.

Explanation:

if 50% is $100.00 another $100 need to achieve in 5 days.

100/5=20

3 0
3 years ago
Read 2 more answers
A.m. client appears at the top of every page
LuckyWell [14K]

Answer:

what do you mean by this

clarify it

7 0
2 years ago
Other questions:
  • is a specific system for gathering information from a single group of respondents by continuously monitoring the advertising, pr
    13·1 answer
  • Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
    12·1 answer
  • Microsoft words spell checker
    9·1 answer
  • Write a python application that allows a user to enter any number of student test scores until the user enters 999. If the score
    14·1 answer
  • Write the steps of applying background colour to the document?​
    15·2 answers
  • What is bespoke software???​
    9·2 answers
  • One can find mountain ranges, elevation levels, and deserts on a physical map.
    15·2 answers
  • What maintains data about various types of objects, events, people, and places?
    10·1 answer
  • What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax
    5·1 answer
  • The term used to describe whereby old and new media are available via the integration of personal computers and high speed satel
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!