Biometrics-IGCSE ICT

Biometrics-IGCSE ICT

9th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

ITGS: 1.02 Security and 1.05 Authenticity

ITGS: 1.02 Security and 1.05 Authenticity

9th - 12th Grade

12 Qs

BTEC DIT - C3 - B2 - Protecting Data

BTEC DIT - C3 - B2 - Protecting Data

11th Grade

10 Qs

Network issues and communication/ Security issues Grade 10

Network issues and communication/ Security issues Grade 10

10th Grade

10 Qs

Computer is a dumb person

Computer is a dumb person

9th - 11th Grade

11 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

UH Computasional Thinking

UH Computasional Thinking

10th Grade

10 Qs

Network Security Measures Quiz

Network Security Measures Quiz

11th Grade

10 Qs

Network Security Protocols

Network Security Protocols

10th Grade

15 Qs

Biometrics-IGCSE ICT

Biometrics-IGCSE ICT

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

ARATHY VANAJA

Used 329+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What was the first company to provide biometric verification to unlock phones?
Samsung
Apple
Windows
Google 

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the most common type of biometrics device in the enterprise?

Lie detectors that measure pulse rate

Fingerprint scanners and readers

Iris and retinal scanners

Voice and face recognition scanners

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A biometric modality that uses the physical structure of an individual's fingerprint for identification purposes.

Recognition

Iris recognition

Palm print recognition

Fingerprint Recognition

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The ability to fool a biometric sensor into recognizing an illegitimate user as a legitimate user (verification) or into misidentifying someone who is in the database.

Faceprint

Spoofing

Identity

Mimic

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one is not a considered a unique and distinct characteristic of security device measurement?
Fingerprints
Tongue 
Voice Patterns
Iris

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Biometrics are immune to hackers. 
True 
False

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Using biometrics makes us rely on one single source for identity. 
True 
False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?