COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Lie detectors that measure pulse rate
|
|
Fingerprint scanners and readers
|
|
Iris and retinal scanners
|
|
Voice and face recognition scanners
|
Detailed explanation-1: -Fingerprints. It’s well-known that every person has unique fingerprints. Fingerprints have been used to identify people since long before the digital age, so it’s a logical choice for biometrics. Fingerprint identification is cheap, affordable and typically extremely accurate.
Detailed explanation-2: -Fingerprinting is the most common biometrics technology and mainly uses four types of sensors – optical, capacitive, ultrasonic, and thermal. Biometric devices are of two types – identification and authentication devices.
Detailed explanation-3: -Biometrics and passwords are both designed to authenticate your identity and provide access to an account or device. Whereas a password is a phrase you enter upon login, biometrics systems use something unique to your person, such as fingerprints, voice characteristics or retina patterns to identify you.