Biometric Security System on Laptop Computer - Essay Example

The study sought to devise a system to protect every laptop computer from hacking and unwanted file sharing due to usage without permission by unauthorized users. The researcher utilized fingerprint-based biometric security system on the power switch of personal computer, thus making It unquestionably “personal and confidential Nature of the Project The fingerprint-based biometric security system on personal laptop computer is ore accessible, secured, accountable and accurate.

We Will Write A Custom Essay Sample On
ANY TOPIC SPECIFICALLY
FOR YOU

For Only $13.90/page


order now

It is in the registered fingerprint where an account is created for hassle-free admission to the system. Furthermore, transactions do not consume much time and effort since the information needed to connect and to access one’s account is already automated. Why the project is selected ? This projected is selected for reasons enumerated as follows; 1. To develop protection to personal computers from unauthorized users 2. It uses fingerprint based biometric security system to make it unique , personal and cannot be copied .

Objectives This study aims to develop and devise a system in which only an authorized person could gain access on the most important data and information stored in the Specifically, the study aimed to answer the following questions: 1 . Computer How should the system be designed and developed In order to: a. Secure the user’s data from hacking or sharing, b. Provide an account security for the computer user, c. Ensure that the system is protected against alteration and not prone to errors? 2.

What Is the level of performance of the system based on the following criteria: a. Reliability b. Accessibility c. Efficiency d. Functionality? Biometric Security System on Laptop Computer Using Fingerprint-Based Power Switch By marionettes switch of personal computer, thus making it unquestionably “personal and confidential “. How should the system be designed and developed in order to: a. Secure the What is the level of performance of the system based on the following criteria.