COMPUTER FUNDAMENTALS

COMPUTER SOFTWARE

OPERATING SYSTEMS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A disadvantage of this authentication method is that ridge patterns can be affected by cuts, dirt, or even wear and tear.
A
Iris Recognition
B
Fingerprint Recognition
C
Voice Recognition
D
Facial Recognition
Explanation: 

Detailed explanation-1: -Fingerprint Recognition: Fingerprint authentication uses a person’s unique fingerprint to verify their identity. It can be used to secure everything from mobile devices to automobiles, even buildings, making it the most widespread biometric authentication technology.

Detailed explanation-2: -Fingerprint recognition. Facial recognition. Iris recognition. Finger vein pattern recognition. Palm vein pattern recognition.

There is 1 question to complete.