1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
10

Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st

andard biometric technique (fingerprint, palm print, iris, facial features, etc.) and research the costs for having biometric readers for that technique located at two separate entrances into a building. Next, research ways in which attackers attempt to defeat this particular standard biometric technique. Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques

Computers and Technology
1 answer:
lyudmila [28]3 years ago
7 0

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

You might be interested in
Suppose that you are developing an application in which you want to connect to a server to upload some data. You create a socket
miskamm [114]

Answer:

a.The server's IP address or hostname.

d.The port number for the application on that server

Explanation:

We can point out that a socket is a tool which contains or which comprises of a pair of value.

Also a socket is an end point which identifies each other. In this case the client connecting to the server.

From the options a and d meets the criteria.

4 0
3 years ago
Write the function header (the first line of the function definition) to define a function named DisplayStats that accepts a str
Degger [83]

Answer:

void DisplayStats(string fName, int num1, double examScore);

Explanation:

Using C++ programming language.

Function headers (signatures) are allowed to be placed on top just before the main method in C++ indicating that the function's definition will be provided down below the main method, thereby allowing you to call the function within the main function.

The requirements of the the question are met. The function signature above indicates that it is void (wont return any value), The name is DisplayStats, and the parameter list are separated by single spaces as required with the correct data types.

4 0
3 years ago
The process of providing only the essentials and hiding the details is known as _____. Group of answer choices algorithm abstrac
almond37 [142]
The answer is data structure
8 0
2 years ago
What is the GCF of 48mn and 81mn??<br> O 3mn<br> O 3m?n<br> O 48mºn<br> O 129mn
vitfil [10]

Answer:

A. 3mn

Explanation:

48 divides by 2 48 = 24 x 2

then =2 x 2 x 12

then = 2 x 2 x 2 x 2 x 3

greatest factorization is 3 therefore,

3mn is the answer

8 0
3 years ago
A minor with prior convictions of Minor in Possession (MIP) who is charged with a subsequent MIP may be penalized with a jail se
GarryVolchara [31]
The minor may be penalized with a jail sentence of up to thirty days for his second offence.  A jail sentence of up to sixty days is possible for third offence. Under MCL 436, a minor is someone who is under twenty one years old. Such minors may not purchase, consume or be in possession of any alcoholic liquor. Possession of alcoholic drinks can be actual or constructive. It is actual when you have direct physical control over it and it is constructive when you know where it is and you have reasonable access to it.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which view is used to allow a publisher to view facing pages of a publication at the same time?  NormalMaster PageTwo-Page Sprea
    9·1 answer
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • Templates allow for the quick creation of _____.
    7·1 answer
  • To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security
    13·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Who loves you tube , anyone?
    10·2 answers
  • Write the code to produce a for loop that counts down from 20 to 0 by 2’s and prints the number each time it goes through the lo
    15·1 answer
  • Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a
    12·1 answer
  • The. Model has the disadvantage of high project cost due to creation several prototypes
    6·1 answer
  • During which phase of system development would you acquire any necessary hardware and software?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!