Bunuel wrote:
A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.
The reasoning above is flawed because it
(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than
...
The reasoning above is flawed because it
(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than
...
Statistics : Posted by 8Harshitsharma • on 11 Aug 2019, 04:09 • Replies 7 • Views 4158










