1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
4 years ago
11

¿dispositivos de hardware Que permite identificar la huella digital registrada por el usuario?

Computers and Technology
1 answer:
docker41 [41]4 years ago
3 0

Answer:

Lector de huellas dactilares

Explanation:

Un lector de huellas dactilares funciona tomando la imagen de los valles lineales con curvas y las crestas de la huella dactilar a medida que se enrollan las extremidades frontales de los dedos (falange distal) o se utilizan para tocar la huella dactilar que funciona de forma óptica, térmica, tecnología capacitiva o ultrasónica.

Sin embargo, debido a las irregularidades en la percepción del dispositivo sensorial de huellas dactilares que funciona por contacto entre el dedo y el sensor cada vez que el dedo se presiona sobre la superficie de detección, se han desarrollado tecnologías de escaneo de huellas dactilares 3D sin contacto para capturar la imagen de una persona. huella digital cuando sea necesario.

You might be interested in
Object Material: metal or non-metal? Prediction: Will the light bulb light up? Morm Observation: Does the light bulb light up? n
Mandarinka [93]

Answer:

it would be nail key

Explanation

mainly cuz i went to college ad it makes sense ause mettal and metal yw:)

4 0
3 years ago
Modify your program from Learning Journal Unit 7 to read dictionary items from a file and write the inverted dictionary to a fil
Bond [772]

Answer:

Following are the code to this question:

import ast as a #import package ast

d1= {}#defining an empty dictionary  

def invert_dictionary(d1):#defining a method invert_dictionary

   i = dict()#defining variable i that hold dict method  

   for k in d1:#defining for loo to check dictionary value

       val = d1[k]#defining val variable to holds dictionary key values

       for val1 in val:#defining another for loop to hold value of dictionary and inverse it

           if val1 not in i:#defining if block to check value

               i[val1] = [k]#hold key value

           else:#defining else block

               i[val1].append(k)#add value in dictionary

   return i#return inverse value

with open("dict_items.txt", "r") as data:#use open method to add a list as a file

   dict_item = a.literal_eval(data.read())#defining a variable that covert item as a text string in the input file  

   '''covert input string into dictionary item'''

   e_val = input("Please enter a value")#defining variable e_val to input value

   dict_item['4']=str(e_val)#holding value in dictionary

   dict_item['5']='e'#holding value in dictionary

   dict_item['6']='f'#holding value in dictionary

   '''Invert the dictionary value '''

   invert_data =invert_dictionary(dict_item)#defining variable to holding method value

'''calculating the format of each item of inverted dictionary as a text string output file.'''

f_data = {i:str(j[0]) for i,j in inverted_data.items() }#defining f_data to hold coverted value

import json as j#import package

with open('out_put.txt', 'w') as file:#use open method to open file

   file.write(j.dumps(f_data))#add value

Explanation:

In the above-given code has four parts which can be defined as follows:

In the first part, a method invert_dictionary is defined that accepts a dictionary, and defines two for loops in which the second loop uses a conditional statement to convert the inverse form and return its value, and after inverse it use the open method to add a list as a file, and defining a variable that covert item as a text string in the input file.

In the second step, a variable e_val is declared for input value , and use the dict_item variable to holding dictionary  value, and call the method and hold its value.

In the third and fourth step it calculating the format of each item of inverted dictionary as a text string output file.

6 0
3 years ago
A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statem
quester [9]

Answer:

A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statement "the living room floor is rectangular" is an example of a(n) <u>assumption</u> . The length and width of the room are examples of <u>known</u> information, which you can obtain as <u>input</u> from the user.

Explanation:

The given question is a Problem statement.

Problem statement can be defined as the brief description of an issue that needs to be focused in order to reach the require goal.

So the parts that a problem statement may have include:

  • facts and figures (assumptions), that are known in the given scenario.
  • data required (solution)to be calculated by focusing on present assumptions (given as input by the user).

So the attributes to be filled into blanks of given statement are assumption, known, input.

i hope it will help you!

4 0
4 years ago
Problem (Commands): Let c be a copy flag and let a computer system have the set of rights {read, write, execute, append, list, m
dlinn [17]

Answer:

Aee explaination

Explanation:

1.

command copy_all_rights(p,q,s)

if read in a[p,s]

then

enter read into a[q,s];

if write in a[p,s]

then

enter write into a[q,s];

if execute in a[p,s]

then

enter execute into a[q,s];

if append in a[p,s]

then

enter append into a[q,s];

if list in a[p,s]

then

enter list into a[q,s];

if modify in a[p,s]

then

enter modify into a[q,s];

if own in a[p,s]

then

enter own into a[q,s];

end

2.

command copy_all_rights(p,q,s)

if own in a[p,s] and copy in a[p,s]

then

enter own into a[q,s];

if modify in a[p,s] and copy in a[p,s]

then

enter modify into a[q,s];

if list in a[p,s] and copy in a[p,s]

then

enter list into a[q,s];

if append in a[p,s] and copy in a[p,s]

then

enter append into a[q,s];

if execute in a[p,s] and copy in a[p,s]

then

enter execute into a[q,s];

if write in a[p,s] and copy in a[p,s]

then

enter write into a[q,s];

if read in a[p,s] and copy in a[p,s]

then

enter read into a[q,s];

delete copy in a[q,s];

end

3.

"q" would be the effect of copying the copy flag along with the right, because q would have copy right to transfter to another, which may not be intended.

3 0
4 years ago
​___________, such as smart phones and social​ media, fundamentally change the nature of an industry and can be influential enou
svlad2 [7]

Answer:

Disruptive Technologies.

Explanation:

Smart Phones and the social media are very power tools they can be used to spread a news like a fire very rapidly.

People mostly believe the new that come on their smartphones and the social media.

So the employees of the company can also be influenced by these technologies hence they can disrupt the work of the company and can make or break the company.

6 0
4 years ago
Other questions:
  • One of the essential skills that software development engineers must have is the proficiency in at least one of the modern compu
    6·1 answer
  • Almost all PCs have this type of serial connector
    8·1 answer
  • What does subscribing to a website’s RSS feed provide to a subscriber?
    10·1 answer
  • What does limited access to a document mean?
    14·2 answers
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • We wish to design a decoder, with three inputs, x, y, z, and eight active high outputs, labeled 0, 1, 2, 3, 4, 5, 6, 7. There is
    5·1 answer
  • You've been hired by Maple Marvels to write a C++ console application that displays information about the number of leaves that
    5·1 answer
  • Which function in spreadsheet software can be used to predict future sales or inventory needs?
    5·2 answers
  • The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
    15·1 answer
  • Purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and softwa
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!