1 User identification

1.1 User identification

1. Acoustic speech features are?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

2. Prosodic speech features are?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

3. High level speech features are?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

4. What are the most important parts of a speaker identification system?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

5. What is the main task of a speaker verification system?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

6. What is the main task of a speaker identification system?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

7. What is the prior deployment domain of a speaker verification system?

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

8. The most attractive biometric for personal identification is:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

9. Face identification is:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

10. The name for a set of mathematical methods where main aim is to detect points in digital image where brightness changes sharply is:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

11. For the classification of extracted features can be used:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

12. To reduce the negative influence of illumination is recommended to use:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

13. 3D face recognition compared to 2D face recognition approach achieves:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

14. Local curvature features and point-to-point matching belong to:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

15. The method suitable for real time applications (method is not time consuming) is:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

16. Extraction of the compact information from the images that is relevant for distinguishing between the face images of different people is called:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

17. User can be identified by:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

18. Memometrics is based on:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

19. Cognometrics is based on:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

20. Token create numerical code through:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

21. Authorization means:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

22. Attribute based Access Control is:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

23. One of the most common techniques of access control is:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer

24. User can access system based on the role in the model:

a) | |||

b) | |||

c) | |||

d) |

Evaluate your answer