1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
4 years ago
10

Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st

andard biometric technique (fingerprint, palm print, iris, facial features, etc.) and research the costs for having biometric readers for that technique located at two separate entrances into a building. Next, research ways in which attackers attempt to defeat this particular standard biometric technique. Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques

Computers and Technology
1 answer:
lyudmila [28]4 years ago
7 0

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

You might be interested in
NEED HELP
amid [387]

Answer:

i would do B

Explanation:

I YOUNGI

I MIDDLE I

I   AGED  I

I     MEH   I

I_______ I

\ kinda old/

  \ ____ /

   I OLD I

3 0
3 years ago
A ________ is a computer or other electronic device connected to a network
Tanzania [10]
A _node_ is a computer or other electronic device connected to a network.

With the _mesh_ network topology, reliability is the major advantage while high cost is the disadvantage.
8 0
4 years ago
What does this mean? And how did I get it?
Oliga [24]
If you’re talking about the rank then it just means your ambitious i guess and you got it by answering peoples questions
3 0
3 years ago
Read 2 more answers
What is the result of wave motion on water particles
satela [25.4K]
They rise and fall in a circular motion. :)
5 0
3 years ago
Read 2 more answers
Create a C++ program that declares, initializes, and outputs the values contained in a two-dimensional array
Kazeer [188]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

int r_size,c_size;

cout<<"enter the number of row:";

// read the value of row

cin>>r_size;

cout<<"enter the number of column:";

// read the value of column

cin>>c_size;

// create a 2-d array

int arr[r_size][c_size];

// read the value of array

cout<<"enter the elements of array:"<<endl;

for(int x=0;x<r_size;x++)

{

for(int y=0;y<c_size;y++)

{

cin>>arr[x][y];

}

}

cout<<"elements of the array are:"<<endl;

// print the array

for(int a=0;a<r_size;a++)

{

for(int b=0;b<c_size;b++)

{

cout<<arr[a][b]<<" ";

}

cout<<endl;

}

return 0;

}

Explanation:

Here we have demonstrate a 2- dimensional array. In which, how to read the elements and how to print elements of array.Read the value of row and column from user.Create a 2-d array of size r_sizexc_size. then read the elements of array either row wise or column wise. Then print the elements.To print the elements, we can go either row wise or column.

Output:

enter the number of row:2

enter the number of column:3

enter the elements of array:

1 2 3

2 3 4

elements of the array are:

1 2 3

2 3 4

8 0
4 years ago
Other questions:
  • when applying styles to a document, which features of the style can be modified in the themes grouping?
    9·2 answers
  • In the dewey decimal sysytem, the call number 800 notes which section
    10·1 answer
  • Which business application uses location information to provide a service and is designed to give mobile users instant access to
    5·1 answer
  • Define the term unique key and give an example.
    6·1 answer
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    13·2 answers
  • Proszę daje wszystko potrzebuje tego
    8·2 answers
  • How is a source file different from a "listing file"?
    5·1 answer
  • Suppose users share a 1 Mbps link. Also suppose each user
    10·1 answer
  • Describe the difference between information poor and information rich society?​
    9·1 answer
  • A hardware component that keeps data and information when the device is not powered is called a ____ device.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!