Submitted By Masooma Maryam. Class: 7d (Q-No:1 ) Biometric scanner: A biometric device is based on a technology that can identify a person using their unique facial characteristics, fingerprints, signatures, DNA, or iris pattern. It has been derived from the Greek terms' bio', which means 'life' and' metric,' which means 'to measure.' The main uses of biometric systems and devices are following 1. 2. 3. 4. 5. 6. 7. 8. 9. identification and authentication. Biometric devices are most commonly used in security. Banking. mobile access and authentication law enforcement. public transports. schools. home assistants. building access Biometric system improves security system which is discussed below. No Passwords to Steal: Biometrics allow companies to replace passwords and tokens with an easy-to-use yet secure solution, eliminating the threat passwords pose and boosting overall access control with proof of identity. Proof of Identity: The main advantage that biometric authentication brings to security is proof of who’s behind the transaction. Whether it’s making a payment or logging into a server, biometrics require a physical component, who the user actually is, to grant access. Identity-based access control is a significant improvement over alternative authentication factors something you know or something you are because these can be borrowed, sold, or stolen. Only biometrics provides proof of identity, rather than simply granting access. Improved Privacy: While one of the biggest concerns consumers have surrounding biometrics is privacy, a properly implemented biometric authentication solution actually enhances personal privacy. When biometric data is encrypted and securely stored using techniques like visual cryptography and a distributed data model, it drastically reduces the risk of a user’s biometric data being compromised in a data breach – not to mention cutting the risk of a data breach itself. (Q-No:2): Epassword? A password is a string of characters used to verify the identity of a user during the authentication process. Passwords are typically used in tandem with a username; they are designed to be known only to the user and allow that user to gain access to a device, application or website. Passwords can vary in length and can contain letters, numbers and special characters. A password is sometimes called a passphrase, when the password uses more than one word, or a passcode or passkey, when the password uses only numbers, such as a personal identification number (PIN). A password is a simple application of challenge-response authentication, using a verbal, written or typed code to satisfy the challenge request. The order and variety of characters are often what determines the difficulty, or security strength, of a given password. That is why security systems often require users to create passwords that use at least one capital letter, number and symbol. For a password to be an effective security mechanism, its details must be kept secret. Otherwise, unauthorized users could gain access to the files and securities one is trying to protect. (Q-No:3) port : A port is a virtual point where network connections start and end. Ports are software-based and managed by a computer's operating system. Each port is associated with a specific process or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than weLAN port: ( Local Area Network) A LAN port, also known as a network port or network connection, is a socket used to connect computers, servers, video game consoles, and other devices to the internet. Parallel port : In computing, a parallel port is a type of interface found on early computers for connecting peripherals. The name refers to the way the data is sent; parallel ports send multiple bits of data at once, as opposed to serial communication, in which bits are sent one at a time. USB Port : A USB port is a standard cable connection interface for personal computers and consumer electronics devices. USB stands for Universal Serial Bus, an industry standard for short-distance digital data communications. USB ports allow USB devices to be connected to each other with and transfer digital data over USB cables. LAN port: ( Local Area Network) A LAN port, also known as a network port or network connection, is a socket used to connect computers, servers, video game consoles, and other devices to the internet. Lan Port : ( local area network ) A LAN port, also known as a network port or network connection, is a socket used to connect computers, servers, video game consoles, and other devices to the internet.