Explanation of Solution
Use of verification system by a company:
Companies use the verification system in the following manner. They are mentioned below:
Fingerprint reader:
Fingerprint reader is also referred to as fingerprint scanner that scans or captures the fingerprint bends and indentations.
- Some companies use the fingerprint reader to provide the security to doors, systems, and software.
- Some fingerprint software are installed into a system, mobile phone, and so on to lock and unlock the system.
Face recognition system:
Face recognition system helps to capture the images of face.
- It compares with computer image. If the faces match, then the person or user is a legitimate person. Otherwise, the person or user is an unauthorized person.
- Some mobile devices use this type of verification to unlock the mobile.
- Some companies use this recognition system to provide the security to access the room.
Hand geometry system:
The hand geometry system helps to capture the hand shape and size.
- It compares the captured image of hand with computer images.
- If it matches, then the user is a legitimate person. Otherwise, the person or user is an unauthorized person.
- It can be used in colleges, hospitals, daycare centers, and so on.
- This type of recognition is used for huge companies to track the timing and attendance of the employees.
Voice verification system:
Voice verification system helps to compare the legitimate voice with a stored pattern of voice in the computer...
Biometric devices:
Biometric device is a device that helps to authenticate the identity of a person by translating the fingerprint into a digital code.
- The code that is given by a person for identification is compared with a digital code that is present in a computer, and it helps to check the behavioral and physical features of the devices.
- If a code matches with a computer code, then access to a computer is given to an individual.
- When it does not match, access to computer is not given to that individual.
Trending nowThis is a popular solution!
Chapter 5 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
- strategies to protect yourself against phishingarrow_forwardThe cryptography "salt" technique encrypts data. Explain how it strengthens passwords.arrow_forwardDescribe the process of digital signature generation and verification. Explain how digital signatures ensure data authenticity and non-repudiation.arrow_forward
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning