1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
11

This measures how close a biometric reading is to a prerecorded template

Computers and Technology
1 answer:
rjkz [21]3 years ago
5 0

The question above has multiple choices;

<span>a)      </span>Hamming distance

<span>b)      </span>Match percentage

<span>c)       </span>Legacy amount 100.

<span>d)      </span>PDA reading

The answer is a) Hamming distance


Biometric authentications like other technologies are vulnerable to attacks such as spoofing and transmission. Binary template representations in recent research provide significant improvements in efficiency without compromising data accuracy for biometric modalities like iris, fingerprints, and palm prints.

Any binary biometric representation that uses hamming distance and converts it into a privacy preserving secure protocol comparison provides template protection.






You might be interested in
What are the different types of topology?​ in details
wlad13 [49]

Answer:

<h2> <u>NETWORK</u> <u>TOPOLOGY</u> .</h2>

This tefers to how nodes are connected to the network.

Types of topology.

  • Physical topology.
  • Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

  • Bus topology
  • Tree topology
  • Hybrid topology
  • Star topology
  • Ring topology.

Hope it helps you,any question so far...comment !!!

3 0
2 years ago
Read 2 more answers
Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
daser333 [38]

Answer:

Time taken to travel from one track to the next = 0.08ms

Initial track= 15     0

4      (15-4)*(0.08)= 0.88

40     (40-4)*(0.08)= 2.88

35      (40-35)*(0.08)= 0.4

11       (35-11)*(0.08)= 1.92

14       (14-11)*(0.08)= 0.24

7         (14-7)*(0.08)= 0.56

----------------------------------------------

Total seek time=0.88+2.88+0.4+1.92+0.24+0.56=6.88ms

Explanation:

We caculate the seek time for each request, and then add them together to find the total seek time. The final track number for the current request becomes the current track of next request, and this process is repeated till the last request is processed.

4 0
3 years ago
JAVA- If you have an int as the actual parameters, will it change to fit the parameters if it requires a double, or will the cod
ivann1987 [24]

If you have only 1 method that is not overloaded, then you will not be able to call it with inappropriate parameter types, that is, if the initial type of the parameter is int, then it will not be able to get the double, float, and other values, because of this an error will occur.

For this, method overloading is created.

Method overloading is when you create methods with the same name, but only the content and parameters of the methods are/can-be completely different.

6 0
3 years ago
The field on which records are sorted is called the composite primary key.A. TrueB. False
Gemiola [76]

Answer: TRUE

Explanation: Composite is simply used to refer to the existence of more than one event or pattern. The composite primary key as related to database management query refers to the synergy or combination of more than one field or column of a specified table which is used in sorting or accurate identification of a record. When attributes are combined, that is more than one, it assists in narrowing down the returned records such that records which are close and exclusive to the options specified are returned. Usually, the more the number of columns which makes uo the case mpoaite keys, the more unique and well sorted our returned output is.

4 0
3 years ago
You step out of your office and miss a telephone call. when you sit at your desk you notice that the voicemail light is blinking
Sauron [17]
The answer is <span>Unified Communications.  </span><span>You step out of your office and miss a telephone call. when you sit at your desk you notice that the voicemail light is blinking on your phone, you have a new email, and you have a transcribed instant message on your computer screen in the form of an instant message. your organization has most likely adopted Unified Communications type of technology.  </span>
6 0
3 years ago
Other questions:
  • Read the paragraph.
    12·2 answers
  • Derek is working at the help desk when he receives a call from a client about an issue with the company’s email. The customer is
    11·1 answer
  • How do I persuade my parents to allow me to have social media? I will be 15 in a week or so, so I am old enough. I'm pulling my
    5·1 answer
  • New Jersey and New York have the highest state taxes in the United States. They also have high ratios of people moving out compa
    13·1 answer
  • im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
    6·1 answer
  • (ANSWER!)
    8·2 answers
  • Can someone find out what this binary number thing is. Just find out the message, I'm having a difficult time
    13·1 answer
  • The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi
    12·1 answer
  • Design a loop that asks the user to enter a number. The loop should iterate 10
    15·1 answer
  • What is a scratch application pls help me build a game through scratch step by step​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!