(1) In terms of access control, what are false acceptance an…
(1) In terms of access control, what are false acceptance and false rejection? Which one is worse? (2) In terms of access control, what is the difference between verification and identification?