moving into some of our other types of input devices. We have our microphones now. Microphones for computers come in all shapes and sizes. We have large recording microphone set ups that are very expensive and used in order to capture high quality sound. And Niece may go through a very,
very intensive audio programs, or
Mays. Use a type of input that needs a driver in order to run. Or we may have microphones that are simple.
1/8 inch Jax. We have an example of a headset with a microphone here. As we can see
with this particular headset and microphone pair, we have to separate 1/8 inch jacks. They're both labeled the one on the right has a small diagram of a headset on it, and the one on the left has a microphone inscribed on it. And essentially all we have to do is just there. There plug and play,
and you plugged the headphone into your headphone jack in your computer and you plug the microphone into the microphone Jack in your computer.
No additional software
typically required depending on your operating system and what type of sound recording software it already has on there, it should just be able to pick up
the input from the from the microphone without having to run in any additional disks or any additional software. We do have stand stand alone microphones or again, the high, very high quality industrial recording microphones, which
you may use a different type of connector. They may use the USB connect
And with those we need to make sure that,
especially the USB connector, that we're always checking out the specifications that come with the microphone. And they're reading the instruction and installing any software that we need to install go and at our microphones, the list move into, ah, device that we use a lot of times for security. And this is a biometric reader.
Now, biometric readers are
essentially just devices that we plug into our computer, and they can read information about us about who we are. This includes things such a cz ah, fingerprint reader that we see we're actually seeing nowadays on some phones, you swipe your finger across the fingerprint reader and it lets you in. There are some keyboards that have built in
fingerprint readers that you layer
your finger on the keyboard on the fingerprint reader, and it reads. It uses that is, biometric identification. And there are some stand alone
fingerprint readers that you can just plug into a computer, installed a correct software and then use your fingerprint as, ah, biometric identification as your authentication meetings. Fingerprint is probably one of the most popular when we're talking about biometric devices. There've been several different studies that have shown that fingerprints are
harder to replicate, then say,
than other types of authentication, especially password. And again, your fingerprint is unique to you. We make that a very popular means of authentication and fingerprint Readers aren't as difficult to manufacture some of our other biometric readers. Um, now some of our other biometric readers also include those such a CZ iris scanners.
spy movies, or you may actually encounter them. Depending on where you work, where you look into the looking to the people or you look into the scanner and you keep your head still on, it actually scans your iris, or it scans the blood vessels in the back of your eye, and this
is another means of biometric authentication. ah, lot less popular, a lot less common than fingerprint readers, but they are still out there, and they're in use. We probably you probably won't see this as a plug and play device into your computer if you're using these. This is a hot, probably a much more high security facility,
and these would be in
called by experienced technicians into the system and would be set up with the computer. The last type of biometric system that we want to talk about is going to be actual voice readers. They sometimes have voice scanners or voice identify IRS that are used
as, ah, authentication means, But you can see how easily those could be possibly defeated with a recording of somebody. Or they could become frustrating. If, say, you come into work and you have ah, authentication through your voice and you have a cold and your voice is distorted
and I could get frustrating because you're not ableto speak in the voice that I recognize. It's just a little
attack on biometric, actually is. Some of our phones actually do face facial recognition. These could be defeated through means such a zoo, pictures of people's faces or people that look really, really close if the face facial recognition isn't exact, but facial recognition is still in use.
It is out there, and it's used in situations more than just unlocking your phone.
I can also be used in investigative work as faras facial recognition through pictures across the databases. So it is another meat on biometric device biometric identification means to be aware of.