Face Recognition Question & AnswersJune 5, 2021 By WatElectronics This article lists 100 Face Recognition MCQs for engineering students. All the Face Recognition Questions & Answers given below includes solution and link wherever possible to the relevant topic.Face recognition is a biometric solution designed to recognize a human face without any physical contact required. The system runs through algorithms that match the facial node of a person to the images saved in a database. The system first recognizes the unique features such as eyes, ears, nose,…etc, and compares those features to the images stored in the database. When the features of the person match with the image then the system shows that the person is matched with that particular image. Face recognition systems are used to find the identification of the criminals, to track the attendances in schools, colleges, etc. 1). How many types of comparisons are there in face recognition?OneTwoThreeFourHintThere are two types of comparisons are there in face recognition they are verification and identification 2). How many stages are there to identify the person’s face?OneTwoThreeFourHintThere are four stages are there to identify the person’s face they are capture, extraction, comparison, and match/no match 3). ___________ are the components of face recognitionEnrollment moduleDatabaseIdentification moduleAll of the aboveHintThe enrollment module, identification module, and database are the components of face recognition 4). What is the standard form of FAR?False Acceptance RateFace Acceptance RateFalse Acceptance RecognitionNone of the aboveHintThe standard form of FAR is False Acceptance Rate 5). What is the standard form of FRR?False Recognition RateFace Rejection RateFalse Rate RecognitionNone of the aboveHintThe standard form of FRR is Face Rejection Rate 6). What are the advantages of face recognition?Easy to useInexpensive biometricExpensive biometricBoth a and bHint The face recognition systems are easy to use and they are inexpensive biometric 7). _________ are the applications of face recognition for commercial useResidential securityVoter verificationBanking using ATMAll of the aboveHintResidential security, voter verification, banking using ATM are the applications of face recognition for commercial use 8). _________ are the applications of face recognition for government useLaw enforcementSecurity/counter-terrorismImmigrationAll of the aboveHintLaw enforcement, security/counter-terrorism, immigration are the applications of face recognition for government use 9). The accuracy of the face recognition system is around _______80%90%99.32%None of the aboveHintThe accuracy of the face recognition system is around 99.32% 10). The accuracy of the face recognition decreases based on __________Lighting conditionFace positioningMakeupAll of the aboveHintThe accuracy of the face recognition decreases based on the lighting condition, face positioning, and makeup 11). The applications of the face recognition are __________Criminal identificationSurveillanceTracking attendanceAll of the aboveHintThe face recognition systems are used for criminal identification, used in surveillance, and also for tracking attendance 12). The face recognition is a biometric tool?TrueFalseHintYes, face recognition is a biometric tool used to identify the facial features of the person 13). Is the face recognition system is a software-based technique?TrueFalseHintYes, the face recognition system is a software-based technique 14). In which year the first semi-automated system for face recognition is introduced?1940’s1950’s1960’s1970’sHintIn the 1960s the first semi-automated system for face recognition is introduced 15). Who introduced the first semi-automated system for face recognition?H.C.WolfC.BISSONW.BLEDSOEAll of the aboveHintH.C.Wolf, W.BLEDSOE, C.BISSON introduced the first semi-automated system for face recognition 16). How many types of biometrics are there?OneTwoThreeFourHintThere are two types of biometrics are there they are physiological and behavioral characteristics 17). The physiological biometrics include __________Face recognitionHand scan and voice scanSignature and keystroke scanAll of the aboveHintThe physiological biometrics includes face recognition, hand scan & voice scan, signature and keystroke scan 18). The implementation of face recognition technology include________Data acquisitionInput processing, decision makingFace image classificationAll of the aboveHintThe implementation of face recognition technology include data acquisition, input processing, decision making, and face image classification 19). _________ are the nodal points measured by the software for face recognitionDistance between the eyesWidth of the noseCheekbones, jawline, chinAll of the aboveHintThe distance between the eyes, the width of the nose, cheekbones, jawline, and chin are the nodal points measured by the software for face recognition 20). Which one is not a physiological type biometric?Voice scanFinger scanIris scanAll of the aboveHintThe voice scan is not a physiological type biometricFace Recognition MCQs for Quiz 21). Which one is not a behavioral type biometric?Retina scanVoice scanSignature scanAll of the aboveHintThe retina scan is not a behavioral type biometric 22). _________ are the image-based face recognition approachesAppearance-based face recognitionModel-based face recognitionBoth a and bNone of the aboveHintBoth Model-based and Appearance-based are the image-based face recognition approaches 23). ______ comes under model-based face recognition2D morphable model3D morphable modelPCABoth a and bHint The 2D and 3Dmorphable models are coming under model-based face recognition 24). What are the difficulties in face recognition?Head poseAging problemOcclusionAll of the aboveHint The head pose, aging problem, and occlusion are the difficulties in face recognition 25). __________ is a face recognition algorithmPrincipal components analysisLinear discriminant analysisElastic bunch graph matchingAll of the aboveHintThe principal components analysis, linear discriminant analysis, and elastic bunch graph matching are the face recognition algorithms 26). What is an example of biometrics?National ID’sPassportsVoter registrations, driver licensesAll of the aboveHint The national id’s, passports, voter registrations, and driver licenses are the example for biometrics 27). In which year the accuracy of the manual facial recognition system was increased?1960197019801990HintIn 1970 the accuracy of the manual facial recognition system was increased with 21 facial features 28). In which year the linear algebra is applied to the manual facial recognition system?1960197019881990HintIn 1988 the linear algebra is applied to the manual facial recognition system 29). In which year the first face recognition installation is done in an airport?1960197019882011Hint In 2011 the first face recognition installation is done in an airport 30). Which method is used for face recognition?Holistic matchingFeature-basedHybridAll of the aboveHintThe holistic matching, feature-based, and hybrid methods are used for face recognition 31). What is an example for access management?Restricted facilitiesOS, databasesTrading, online bankingHintThe restricted facilities are examples of access management 32). In the holistic matching method, only eyes are taken as input to recognize the face?TrueFalseHint No, in holistic matching method uses a complete face region to match the person 33). What is the standard form of TDBM?Tabular Dataset Building ModuleTable Datasheet Building ModuleTabular Dataset Building ModeNone of the aboveHintThe standard form of TDBM is Tabular Dataset Building Module 34). What is the standard form of FPM?Face Processing ModuleFace Preprocessing ModuleFiltering and Preprocessing ModuleNone of the aboveHintThe standard form of FPM is Filtering and Preprocessing Module, it performs RGB to grayscale transformation and scaling 35). Which application comes under information security?Permission-based systemsAccess logSuspect identificationData privacyHintData privacy doesn’t come under information security 36). Which application comes under the access management area?Permission-based systemsData privacySuspect identificationNone of the aboveHintThe permission-based systems don’t come under the access management area 37). ________ application is an example for personal securityExpression interpretationPhoto camera applicationsPerson identificationAll of the aboveHint The expression interpretation, person identification, and photo camera applications are examples of personal security 38). ________ application is an example for entertainment leisureExpression interpretationPhoto camera applicationsPerson identificationAll of the aboveHintThe photo camera application is an example for entertainment leisure 39). What is an example of information security?Medical recordsOS, databasesTrading, online bankingAll of the aboveHintThe medical records, os, databases, trading, and online banking are some examples of information security 40). Which application comes under biometrics?Home video surveillance systemSimulated agingSuspect trackingPerson identificationHintThe person identification comes under biometricsFace Recognition MCQs for Exams 41). Which application comes under law enforcement?Home video game systemsHome video surveillance systemsSecure access authenticationVideo surveillanceHintThe video surveillance comes under law enforcement 42). Which method does a hybrid face recognition system use?Feature extractionHolisticBoth a and bNone of the aboveHintThe hybrid face recognition system use feature extraction and holistic methods 43). Why face recognition is required?Provides secure access control b) c) d)No passwords are requiredProtects personal privacyAll of the aboveHintFace recognition provides secure access control, no passwords are required, and it protects personal privacy 44). What is an example for law enforcement?Border controlsInvestigationDriver monitoring systemAll of the aboveHintThe investigation is an example for law enforcement 45). ___________ is an example comes under personal securityOSDatabasesDriver monitoring systemAll of the aboveHintThe driver monitoring system is an example that comes under personal security 46). What is the standard form of FFA?Face Fusiform AreaFusiform Face AreaFace Fusiform AutomationNone of the aboveHintThe standard form of FFA is Fusiform Face Area 47). _______ are the problems related to face recognitionOcclusionOptical technologyExpressionAll of the aboveHintThe problems related to face recognition are expression, optical technology, and occlusion 48). _________ is an face recognition databaseMITUMISTFERETAll of the aboveHintThe MIT, UMIST, and FERET are the face recognition databases 49). What is the standard form of AAM?Appearance Active ModuleActive Appearance ModuleArea Active ModuleNone of the aboveHintThe standard form of AAM is Active Appearance Module 50). Which image-based approach needs multiple images?Single model-based approachMulti image-based approachGeometric approachesAll of the aboveHintThe multi image-based approach needs multiple images 51). _________ is an example for multi-image based approach2D morphable model methodsMultilinear SVD’sBoth a and bNone of the aboveHintThe multilinear SVDs is an example of a multi image-based approach 52). ___________ is an multispectral fusion algorithmPhysics-based weighted fusionWavelet fusionIllumination adjustment via data fusionAll of the aboveHintThe physics-based weighted fusion, wavelet fusion, and illumination adjustment via data fusion are the multispectral fusion algorithms 53). In which year the face recognition system using fuzzy MLP is developed?1980198820002009Hint In 2009 the face recognition system using fuzzy MLP is developed 54). What is the standard form of MLP?Multi-Layer ProtectionMulti-Layer ProcessMulti-Layer PerceptionNone of the aboveHintThe standard form of MLP is Multi-Layer Perception 55). What is the standard form of HMM?Hidden Multilayer ModelHidden Markov ModelHigh Multilayer ModelNone of the aboveHint The standard form of HMM is Hidden Markov Model, it is a tool used in face recognition 56). Which tool is used in face recognition?HMMArtificial neural networksBoth a and bNone of the aboveHintThe tools used in face recognition are Hidden Markov Model and Artificial neural networks 57). What is the standard form of CNN?Convolutional Neural NetworkCombinational Neural NetworkComplex Neural NetworkNone of the aboveHintThe standard form of CNN is Convolutional Neural Network 58). What is the standard form of FFNN?Forward Feed Neural NetworkFeed Forward Neural NetworkForward Feed NetworkNone of the aboveHintThe standard form of FFNN is Feed Forward Neural Network 59). How many steps does the LPP algorithm have?OneTwoThreeFourHintThe LPP algorithm has three steps they are constructing an adjacency map, choosing the weights, and solving the eigenproblem 60). In which year the ORL 2D face recognition data sheet was developed?1991-19921992-19941983-19861988-1989Hint In between 1992-1994 the ORL 2D face recognition data sheet was developedFace Recognition MCQs for Engineers 61). What is the standard form of PCA?Principal Component AnalysisProjection Component AnalysisPreserving Component AnalysisNone of the aboveHintThe standard form of PCA is Principal Component Analysis 62). In which approach the patterns are represented by models, samples, and pixels?Template matchingStatistical approachNeural networkNone of the aboveHint In the template matching approach, the patterns are represented by models, samples, and pixels 63). ___________ is an example for linear appearance-based approachPCALDABoth a and bNone of the aboveHintThe PCA and LDA are examples of a linear appearance-based approach 64). __________ is an example for modal based approachElastic bunch graph matchingLDAPCANone of the aboveHintElastic bunch graph matching is an example of a modal based approach 65). The modal based approaches are ________Two dimensionalThree dimensionalTwo or three dimensionalNone of the aboveHint The modal based approaches are two or three-dimensional approaches 66). The template matching the patterns are represented by _________TexturesCurvesPixelsAll of the aboveHintThe template matching the patterns are represented by textures, curves, and pixels 67). Which statistical tool is used to construct a set of templates?SVMPCALDA, ICAAll of the aboveHintThe tools which are used to construct a set of templates are SVM, PCA, LDA, and ICA 68). In which year artificial intelligence was introduced?1980198219831988HintArtificial intelligence was introduced in 1988 69). What is the standard form of PDBNN?Probabilistic Decision Based Neural NetworkProbabilistic Based Neural NetworkProbabilistic Data-Based Neural NetworkNone of the aboveHintThe standard form of PDBNN is Probabilistic Decision Based Neural Network 70). What is the standard form of GAT?Group-Based Artificial ToolGroup-Based Adaptive ToolGroup-Based Adaptive ToleranceNone of the aboveHintThe standard form of GAT is Group Based Adaptive Tolerance 71). ___________ method evaluates shrinking feature setsSFSSBSSBFSNone of the aboveHintThe sequential backward selection method evaluates shrinking feature sets 72). ___________ method evaluates growing feature setsSFSSBSSBFSNone of the aboveHintThe sequential forward selection method evaluates growing feature sets 73). _______ methods are used for face trackingHead trackingFeature trackingImage-based trackingAll of the aboveHintThe head tracking, feature tracking, and image-based tracking methods are used for face tracking 74). _________ is an appearance-based method used in face extractionEigenface-basedDistribution-basedNeural networksAll of the aboveHintThe eigenface-based, distribution-based, and neural networks are the appearance-based methods used in face extraction 75). The detection methods are categorized into _________TwoFourSixEightHintThe detection methods are categorized into four types they are knowledge-based, feature-invariant, template matching, and appearance-based methods 76). The detection depends on ________ scenarioImages in motionControlled environmentColor imagesAll of the aboveHintThe detection depends on images in motion, controlled environment, and color images 77). The classifiers are executed independently in ________ combinerSerialParallelBoth a and bNone of the aboveHintThe classifiers are executed independently in a parallel combiner 78). In which year the face recognition grand challenge was launched?1980200519831988HintIn 2005 the face recognition grand challenge was launched 79). In which year the first facial recognition technology was presented?1991200519831988HintIn 1991 the first facial recognition technology was presented 80). What is the standard form of LPP?Locality Projection PreservingLocality Preserving ProjectionLocal Projection PreservingNone of the aboveHintThe standard form of LPP is Locality Preserving Projection Face Recognition MCQs for Interviews 81). What is the standard form of BSIF?Binarized Simple Image FeaturesBinarized Simple Image FacesBinarized Statistical Image FeaturesNone of the aboveHintThe standard form of BSIF is Binarized Statistical Image Features 82). The deep learning is categorized into _________OneThreeSixEightHintDeep learning is categorized into three types they are sum-product network, convolutional neural network, and deep neural network 83). The traditional methods are categorized into ________OneThreeSixEightHintThe traditional methods are categorized into three approaches they are hybrid, local, and historic 84). Which one is a 3D face recognition database?BosphorusBU-3DFEBoth a and bNone of the aboveHintThe Bosphorus and BU-3DFE are the 3D face recognition database 85). _________ is an example of occlusionMask, glassHandShadowAll of the aboveHintWhen a person covered face with hands, mask, glass, etc, then those images come under occlusion 86). _________ is an example for heterogeneous face recognitionSimple photographsInfrared imagesSketch imagesAll of the aboveHintThe infrared, sketch images and simple photographs are examples of heterogeneous face recognition 87). What is the standard form of SSFR?Single Sample Freckle RecognitionSimple Sample Freckle RecognitionSingle Sample Face RecognitionNone of the aboveHintThe standard form of SSFR is Single Sample Face Recognition 88). What is the standard form of SSPP?Single Sample Per PersonSimple Sample Per PersonSample Single Per PersonNone of the aboveHintThe standard form of SSPP is Single Sample Per Person 89). ___________ is an example for soft biometricsFrecklesMolesScarsAll of the aboveHintThe freckles, moles, scars, are some examples of soft biometrics 90). The video-based face recognition approaches are categorized into ___________TwoThreeSixEightHintThe video-based face recognition approaches are categorized into two types they are sequence-based and set based 91). What does the Microsoft Kinect sensor consist of?IR projectorInfrared camera, RGB cameraMotorized tilt, multi-array microphoneAll of the aboveHintThe Microsoft Kinect sensor consists of an IR projector, infrared camera, RGB camera, motorized tilt, and multi-array microphone Read more about Sensors 92). The face recognition technology (FERET) database was developed in _______1980199619831988Hint The FERET database was developed in 1996 93). What is the standard form of ILSVRC?Image Large Scale Visual Recognition ChallengeImage Large Scale Face Recognition ChallengeImage Large Scale Visual Recognition ChangedNone of the aboveHintThe standard form of ILSVRC is Image Large Scale Visual Recognition Challenge 94). The CNN structure includes _____PoolingConvolutionalRectified linear unitAll of the aboveHintThe CNN structure includes pooling and convolutional layer and rectified linear unit 95). How many human emotions does the emotion prediction model predict?OneThreeSixEightHintThe emotion prediction model predicts six human emotions they are surprise, sadness, anger, fear, disgust, and happiness 96). The data augmentation techniques are categorized into ________OneTwoSixEightHintThe data augmentation techniques are categorized into two types they are data wrapping and oversampling augmentations 97). Which one is a multicultural facial expression dataset?RaFDJAFFETFEIDAll of the aboveHintThe RaFD, JAFFE, and TFEID are the multicultural facial expression dataset 98). The geometric data augmentation techniques in a face expression recognition are of __________OneTwoSixFiveHint The geometric data augmentation techniques in face expression recognition are of five types they are random rotation, horizontal & vertical reflection, translation, and cropping 99). What is the standard form of KDEF?Karolinska Different Emotional FacesKarolinska Data Emotional FacesKarolinska Directed Emotional FacesNone of the aboveHintThe standard form of KDEF is Karolinska Directed Emotional Faces 100). What is the standard form of SSSIFD?Simple Shot Scale-Invariant Face DetectorSingle Shot Scale-Invariant Face DetectorSimple Scale Shot-Invariant Face DetectorNone of the aboveHintThe standard form of SSSIFD is Single Shot Scale-Invariant Face Detector, it solves anchor problems Time is Up!