
- •Biometric devices
- •1. Read the following descriptions and match them with the corresponding vocabulary words above. (Malicious) (Sufficient) (Unique) (Uncertain) (Controversial) (Optical)
- •(Detection) (Recognition) (Storage) (Enforcement) (Tissue) (Reflection)
- •(To acquire) (To provide) (To utilize) (To establish) (To reject) (To enforce)
- •2. Complete the statements below.
- •3. Decide whether the following statements are true or false:
- •4. Complete the following passage using the appropriate words from the box below.
- •5. Read the text and then write the correct form of the word in capitals to complete the gaps. The first is done.
- •6. Match the following acquisition devices with each associated biometric technology.
- •7. Translate the following sentences into English
- •You are given the main issues and requirements of biometric technologies. Match them with the corresponding definitions.
- •Use the internet to find some information about the following biometric devices and complete the table below with appropriate information:
- •1. Complete the sentences with the correct form of the verbs.
- •2. Compete the sentences with can, could, may, might, will, should, ought to or must and the infinitive in the appropriate form.
- •3. Using the words given and other words, complete the second sentence so that it has a similar meaning to the first sentence. Do not change the word given.
4. Complete the following passage using the appropriate words from the box below.
A computer __________1 device is a __________2 used to measure an intrinsic __________3 trait, usually for purposes of __________4. Biometric devices are now in __________5 use, not only by government agencies and high-security __________6 operations, but also by security-conscious private __________7. Computer biometric __________8 help secure information on __________9 and other data __________10 devices. On printers and fax machines, they __________11 that the intended recipients receive __________12 documents sent. Biometric devices can make it easier to __________13 and monitor entry to high-security areas. Biometrics is also the __________14 of face __________15 technology used in __________16 with camera surveillance or special biometric photos.
1. |
A. security |
B. software |
C. biometric |
D. hardware |
2. |
A. tool |
B. device |
C. gadget |
D. machine |
3. |
A. global |
B. mental |
C. physical |
D. behavioral |
4. |
A. authentication |
B. identification |
C. verification |
D. recognition |
5. |
A. widespread |
B. common |
C. everyday |
D. limited |
6. |
A. public |
B. secret |
C. private |
D. general |
7. |
A. human |
B. people |
C. person |
D. individuals |
8. |
A. devices |
B. instrument |
C. design |
D. mechanism |
9. |
A. laptops |
B. discs |
C. flash drives |
D. usb port |
10. |
A. archives |
B. storage |
C. memory |
D. database |
11. |
A. ignore |
B. neglect |
C. ensure |
D. prevent |
12. |
A. responsible |
B. experienced |
C. critical |
D. sensitive |
13. |
A. manipulate |
B. control |
C. manage |
D. command |
14. |
A. goal |
B. support |
C. basis |
D. ground |
15. |
A. description |
B. identification |
C. analysis |
D. recognition |
16. |
A. conjunction |
B. combination |
C. separation |
D. resolution |