1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
4 years ago
6

Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq

ue to an individual Fingerprints have features such as bifurcations, islands, and crossovers
A. True
B. False
Computers and Technology
1 answer:
ruslelena [56]4 years ago
3 0

Voice authentication requires speech to text capability [False]

Facial recognition may be used for authentication [True]

The human iris is unique to an individual [True]

Fingerprints have features such as bifurcations, islands, and crossovers [True]

<u>Explanation:</u>

Biometric confirmation frameworks store this biometric information so as to check a client's personality when that client gets to their record. Since this information is one of a kind to singular clients, biometric validation is commonly more secure than conventional types of multifaceted confirmation. Qualities like fingerprints, face acknowledgment, hand geometry, voice acknowledgment, palm vein acknowledgment, retina filters, iris acknowledgment, and mark check are the most well-known sorts of attributes utilized for biometric verification

You might be interested in
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
"a terminal has two input queues." as a user types each character to the terminal, it is collected in the ____ queue.
lora16 [44]
<span>The answer is raw.  "a terminal has two input queues." as a user types each character to the terminal, it is collected in the raw queue.  As the user types in each character, it is collected in the raw input queue, When the line is completed and the enter key is pressed, the line is copied from the raw input queue to the canonical input queue and the Central Processing Unit (CPU) interprets the line.</span>
6 0
3 years ago
What can a dimm use to hold data and amplify a signal just before the data is written to the module?
ioda
DIMM stands for Dual In-line Memory Module) .It is a module that contains one or several random access memory (RAM) chips on a small circuit board.
DIMM uses registers to hold data and amplify a signal just before the data is written to the module.<span>Today's DIMMs use a 64-bit data path.</span>
6 0
4 years ago
The destructor automatically executes when the class object goes out of ____.
Tema [17]

Answer:

scope    

Explanation:

Destructor is a member function and it call automatically when the class object goes out of scope.

Out of scope means, the program exit, function end etc.

Destructor name must be same as class name and it has no return type.

syntax:

~class_name() { };

For example:

class xyz{

  xyz(){

        print(constructor);

   }

~xyz(){

        print(destructor);

   }

}

int main(){

    xyz num;

   

}//end program

when the object is create the constructor will called and when the program end destructor will call automatically.

4 0
3 years ago
Consider a company that needs to sort an array of structures of type Customer by balance, with the largest balance first. Here i
8090 [49]

Answer:

#include <iostream>

#include <string>

#include <cstring>

#include <cstdlib>

using namespace std;

struct Person

{

string name;

int age;

};

int main()

{

struct Person data[10];

struct Person *pData[10],*temp;

string names[] = {"a","b","c","g","z","l","p","q","r","w"};

int num[] = {4,6,34,8,13,90,33,22,18,23};

for(int i=0;i<9;i++)

{

data[i].name = names[i];

data[i].age = num[i];

pData[i] = &data[i];

}

for(int i=0;i<9;i++)

{

for(int j=i+1;j<9;j++)

{

if(pData[i]->name.compare(pData[j]->name)>0)

{

temp = pData[i];

pData[i] = pData[j];

pData[j] = temp;

}

}

}

for(int i=0;i<9;i++)

{

cout<<pData[i]->name<<" "<<pData[i]->age<<endl;

}

}

Explanation:

The line #include <iostream> initializes the program.

This program created an array of only 10 structures, Customer data. Also defined an auxiliary array Customer *pData.

The program uses these parameters to sorts the array of pointers so that when you go through pData in increasing order of index k, the entries pData[k] point to Customer objects in decreasing order by balance, meaning that pdata[0] now points to the customer with the highest balance, and pData[9] points to the customer with the smallest balance.

4 0
3 years ago
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • What are some good editing software apps for pc?
    11·1 answer
  • If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign
    8·1 answer
  • Can you get financial aid with average grades
    15·1 answer
  • 2. Integer plot function (find a smart way to code big integers) Write a program BigInt(n) that displays an arbitrary positive i
    8·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • What is the name of the advanced warrior race of robots in Doctor Who?
    10·2 answers
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • Which feature is not in ms PowerPoint​
    12·1 answer
  • Design an Application called Student Course Management create interface called Student Course add an abstract method called ad C
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!