COMPUTER SOFTWARE
OPERATING SYSTEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
A disadvantage of this authentication method is that ridge patterns can be affected by cuts, dirt, or even wear and tear.
|
Iris Recognition
|
|
Fingerprint Recognition
|
|
Voice Recognition
|
|
Facial Recognition
|
Explanation:
Detailed explanation-1: -Fingerprint Recognition: Fingerprint authentication uses a person’s unique fingerprint to verify their identity. It can be used to secure everything from mobile devices to automobiles, even buildings, making it the most widespread biometric authentication technology.
Detailed explanation-2: -Fingerprint recognition. Facial recognition. Iris recognition. Finger vein pattern recognition. Palm vein pattern recognition.
There is 1 question to complete.