首页
登录
职称英语
To fight against computer crimes, a computer system needs a sure way of iden
To fight against computer crimes, a computer system needs a sure way of iden
游客
2024-06-08
40
管理
问题
To fight against computer crimes, a computer system needs a sure way of identifying its right users and rejecting those who are not entitled to use it. The identification system should be quick, simple, and convenient.
At present, signatures are widely used to identify credit card holders, but it takes an expert to detect a good forgery. Sometimes even a human expert is fooled, and there is no reason to believe that a computer could do any better.
Photographs are also sometimes used for identification. But, people find it inconvenient to stop by a credit-card company and to be photographed. Companies might lose business if they made the pictures under absolute requirement. Also, photographs are less useful these days, when people frequently change their appearance by changing the way they wear their hair. Finally, computer programs for analyzing photographs are still highly experimental.
Cash-drawing systems often use two identification numbers: One is recorded on a magnetic stripe on the identification cards, and the other is given to the CRS holder. When the user inserts his card into the cash-drawing terminal, he keys in the identification number he has been given. The computer checks to see that the number recorded on the card and the other keyed in by the user refer to the same person.
For a long time, fingerprints have provided a method of positive identification. But they suffer from two problems. One is that there is no simple system for comparing fingerprints electronically, the other is that because most people associate being fingerprinted with being arrested; they almost surely would resist being fingerprinted for routine identification.
Voiceprints have been suggested. With these, the user has only to speak a few words for the computer to analyze his voice. There are no psychological problems here. And technically it’s easier to take and analyze voiceprints than fingerprints. However, it has yet to be proved that the computer cannot be fooled by imitation. Also, the voice is subjected to the noise and distortion of a telephone line.
Even lipprints have been suggested. But it’s doubtful that kissing computers will ever catch on. [br] Which of the following methods is the least psychologically acceptable?
选项
A、Photographs.
B、Lipprints.
C、Fingerprints.
D、Voiceprints.
答案
C
解析
推理题根据文章内容,人们对通过指纹识别身份有抵触,因此是最不可取的。
转载请注明原文地址:https://tihaiku.com/zcyy/3625539.html
相关试题推荐
[originaltext]W:Mike,you’resittinginfrontofyourcomputeragain!Thesea
[originaltext]W:Mike,you’resittinginfrontofyourcomputeragain!Thesea
[originaltext]W:Mike,you’resittinginfrontofyourcomputeragain!Thesea
[originaltext]M:Judy’stakingsixteencreditsandworkinginacomputercenter
[originaltext]M:Judy’stakingsixteencreditsandworkinginacomputercenter
[originaltext]M:Judy’stakingsixteencreditsandworkinginacomputercenter
[originaltext]M:Judy’stakingsixteencreditsandworkinginacomputercenter
[originaltext]M:Judy’stakingsixteencreditsandworkinginacomputercenter
Inoursystemofeducationtoday,examinationsareacommonfeature.Ourpre
Inoursystemofeducationtoday,examinationsareacommonfeature.Ourpre
随机试题
Duringthe1980s,unemploymentandunderemploymentinsomecountrieswasas
A.全手烧伤 B.手背烧伤 C.手掌或环形烧伤 D.前臂屈侧或手的环形烧伤
既能收敛止血,又兼能补虚的药物是A.三七 B.仙鹤草 C.白及 D.紫珠
患者男,50岁。高空作业不慎坠落损伤脑部,出现深昏迷,脑干反射消失,脑电波消失,
处理个人与他人的关系,关键是要处理好( ) A.个人与他人的利益关系 B.
下列选项中,物权变动的情形包括A.政府征收了甲村的土地 B.乙将自己的彩电赠与
清末修律时,修订法律大臣俞廉三在“奏进民律前三编草案折”中表示:“此次编辑之旨,
与异烟肼等单胺氧化酶抑制剂合用可出现高热、兴奋、高血压危象,甚至死亡的药物是A.
单位或个体经营者的下列业务,不应视同销售征收增值税的有( )。A.个体商店代销鲜
根据麦克里兰三重需要理论,促使别人顺从自己意志的欲望,属于()需要。A.成长
最新回复
(
0
)