首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
To fight against computer crimes, a computer system needs a sure way of identifying its right users and rejecting those who are
To fight against computer crimes, a computer system needs a sure way of identifying its right users and rejecting those who are
admin
2014-01-13
52
问题
To fight against computer crimes, a computer system needs a sure way of identifying its right users and rejecting those who are not entitled to use it. The identification system should be quick, simple, and convenient.
At present, signatures are widely used to identify credit card holders, but it takes an expert to detect a good forgery. Sometimes even a human expert is fooled, and there is no reason to believe that a computer could do any better.
Photographs are also sometimes used for identification. But, people find it inconvenient to stop by a credit card company aid to be photographed. Companies might lose business if they made the pictures under absolute requirement. Also, photographs are less useful these days, when people frequently change their appearance by changing the way they wear their hair. Finally, computer programs for analyzing photographs are still highly experimental.
Cash-drawing systems often use two identification numbers: One is recorded on a magnetic stripe on the identification cards, and the other is given to the CRS holder. When the user inserts his card into the cash-drawing terminal, he keys in the identification number he has been given. The computer checks to see that the number recorded on the card and the other keyed in by the user refer to the, same person.
For a long time, fingerprints have provided a method of positive identification. But they suffer from two problems. One is that there is no simple system for comparing fingerprints electronically, the other is that because most people associate being fingerprinted with being arrested; they almost surely would resist being fingerprinted for routine identification.
Voiceprints have been suggested. With these, the user has. only to speak a few words for the computer to analyze his voice. There are no psychological problems here. And technically it’s easier to take and analyze voiceprints than fingerprints. However, it has yet to be proved that the computer cannot be fooled by imitation. Also, the voice is subjected to the noise and distortion of a telephone line.
Even lipprints have been suggested. But it’s doubtful that kissing computers will ever catch on.
Which of the following is NOT mentioned as one of the identification system requirements?
选项
A、Convenience.
B、Reliability.
C、Low costs
D、Acceptability.
答案
C
解析
细节判断题。根据首段尾句可知选项A正确;根据第二段第二句可知选项B正确,reliability是对原文no reason to believe的改写:由第五段尾句中的no simple system可知选项D正确;全文没有提到costs这个问题。故答案为C。
转载请注明原文地址:https://kaotiyun.com/show/PlhO777K
0
考博英语
相关试题推荐
TheAmericanConstitutionwaswrittenforpeoplethatareabletogovernthemselves.JohnAdamswrote,"OurConstitutionwasmad
【B1】ThemainimpressiongrowingoutoftwelveyearsonthefacultyofamedicalschoolisthattheNo.1healthproblemintheU
AndresearcherssaythatlikethoseliteraryromanticsRomeoandJuliet,theymaybeblindtotheconsequencesoftheirquestsf
Itisdifficulttoimaginewhatlifewouldbelikewithoutmemory.Themeaningsofthousandsofeverydayperceptions,thebases【
KevinRogersusedtobemyboss.Atthattimehewasahard-working,up-and-comingbusinessmanandarealslave-driver,alwayst
Whentravelerslackanawarenessof【51】timeisregulatedinaforeigncountry,theycanexpecttofeelsomewhatdisoriented.Sin
TheSolarDecathlonisunderway,andteamsofstudentsfrom14collegesanduniversitiesarebuildingsolar-poweredhomesonth
IndustrialproductionmanagerscoordinatetheresourcesandactivitiesrequiredtoproducemillionsofgoodseveryyearintheU
Massproductionis______onlyinaneconomywithahighlydevelopedtechnology.
Travellinglikethisisreallyanadventure.Veryoften,you’reoffdoingsomethingstrangewhereyoudon’tknowwhat’sgoingto
随机试题
A企业为矿山企业,地下金属矿山采用竖井、斜井、斜坡道联合开拓方式和下行分层胶结充填采矿方法。2012年5月9日8时,司机甲和司机乙开始在井下1150工作面进行铲装作业。9时,甲使用的铲装车出现故障,无法正常作业,于是来到休息室休息。10时30分,乙完成自
被称为“绒毛心”的炎症是心外膜的
全年需要供冷的房间,其外窗玻璃遮阳系数Cz与全年累计空调冷负荷Q(kWh)的关系是()。
基金转托管在转入方进行申报,基金份额转托管一次完成。( )
下列属于有权提议召开董事会临时会议的有()。I.代表1/10以上表决权的股东Ⅱ.1/3以上董事Ⅲ.监事会Ⅳ.高级管理人员
当社工和案主开始初次面谈时,社工只要自己非常清楚明了面谈的目的和角色就可以,没必要让案主对此有所了解。()
简述智力结构论的主要观点
贾德1908年所做的“水下打靶”实验,是学习迁移研究的经典实验之一,他将被试分成两组,要他们练习用标枪投中水下的靶子。实验前,对一组讲授了光学折射原理,另一组则不讲授,只能从尝试中获取一些经验。在开始投掷练习时,靶子置于水下1.2英寸处。结果,讲授过和未讲
A.Thespringpromotionwilllastfortwoweeks.B.Itvariesfromgoodstogoods.C.Nothingspecial.A:Whatdoyouwanttobu
下列关于t分布的表述,错误的是()。(2011年)
最新回复
(
0
)