Introduction to Computer Concepts and Applications
Introduction to Computer Concepts and Applications AVIA 1003
Popular in Course
Popular in Aviation Sciences
This 3 page Class Notes was uploaded by Afton Zemlak DDS on Monday October 26, 2015. The Class Notes belongs to AVIA 1003 at University of Oklahoma taught by Laura Gramling in Fall. Since its upload, it has received 57 views. For similar materials see /class/229253/avia-1003-university-of-oklahoma in Aviation Sciences at University of Oklahoma.
Reviews for Introduction to Computer Concepts and Applications
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 10/26/15
Baileyl Teddy Bailey Ms Pedro English 101 October 15 2014 Access Granted Biometric devices authenticate a person s identity by verifying unique personal characteristics These devices translate a biometric identi er such as a ngerprint into a code that is compared with a digital code stored in a computer If the digital code in the computer matches the personal characteristic code the computer grants access Examples of biometric devices include ngerprint radars and face recognition systems A ngerprint reader or scanner captures curves and indentations of a ngerprint Organizations use ngerprint scanners to secure doors computers and software For example a ngerprint reader can be set up to authenticate users before they can access a computer Rossi External ngerprint readers usually plug into a USB port To save on desk space some laptops include builtin ngerprint readers1 A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user Some buildings use face recognition systems to secure access to rooms Law enforcement surveillance systems and airports use face recognition systems to protect the public Some mobile devices use face recognition systems to unlock the device Face recognition systems are becoming more sophisticated and can recognize people 1Nadeer and White state that ngerprint readers can perform different functions for different ngers for example one nger runs a program and another shuts down the computer 6263 Bailey2 With or Without glasses hats facial hair makeup or jewelry and with new hairstyles Allensmith Home and business users alike are using biometric security Through a biometric identi er such as a fingerprintbiometric deVices can deny or grant access to programs devices computers rooms and other locations Biometric deVices are an effective security technology Bailey3 Works Cited Allensmith Samantha Clare Understanding Face Recognition Systems nd Course Technology Web 16 Sept 2014 Nadeer Aisha Sati and Jonathon Richard White Biometric Security Chicago Windy City Press 2014 Print Rossi Marcelo Enrico quotHow to Use Fingerprint Readersquot Digital Security Review 2014Aug n pag Web 3 Oct 2014
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'