curriculum/challenges/english/blocks/learn-how-to-discuss-popular-trends-in-technology/65fdcfcd986a305a20de5e57.md
Watch the video below to understand the context of the upcoming lessons.
Watch the video.
{
"setup": {
"background": "company2-breakroom.png",
"characters": [
{
"character": "Tom",
"position": { "x": -25, "y": 0, "z": 1 }
},
{
"character": "Alice",
"position": { "x": 125, "y": 0, "z": 1 }
}
],
"audio": {
"filename": "4.2-4.mp3",
"startTime": 1
},
"alwaysShowDialogue": true
},
"commands": [
{
"character": "Tom",
"position": { "x": 25, "y": 0, "z": 1 },
"startTime": 0
},
{
"character": "Alice",
"position": { "x": 70, "y": 0, "z": 1 },
"startTime": 0.5
},
{
"character": "Tom",
"startTime": 1.7,
"finishTime": 4.1,
"dialogue": {
"text": "Alice, what's the deal with biometrics?",
"align": "left"
}
},
{
"character": "Tom",
"startTime": 4.4,
"finishTime": 7.4,
"dialogue": {
"text": "I keep hearing about facial recognition and fingerprint scanning.",
"align": "left"
}
},
{
"character": "Alice",
"startTime": 8.1,
"finishTime": 11.5,
"dialogue": {
"text": "Biometrics is the use of physical or behavioral traits for security.",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 12.1,
"finishTime": 13.6,
"dialogue": {
"text": "It's used for access control,",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 13.8,
"finishTime": 15.9,
"dialogue": {
"text": "like unlocking your phone with your face or fingerprint.",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 16.4,
"finishTime": 18.3,
"dialogue": {
"text": "Also, it's used for identity verification",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 18.3,
"finishTime": 20,
"dialogue": {
"text": "at airports and secure facilities.",
"align": "right"
}
},
{
"character": "Tom",
"startTime": 20.5,
"finishTime": 21.5,
"dialogue": {
"text": "Is it safe?",
"align": "left"
}
},
{
"character": "Alice",
"startTime": 22,
"finishTime": 24.6,
"dialogue": {
"text": "It's generally secure, but like any technology,",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 24.7,
"finishTime": 26.9,
"dialogue": {
"text": "it has its challenges and privacy concerns.",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 27.3,
"finishTime": 31.2,
"dialogue": {
"text": "It's necessary to keep biometric data protected to maintain its security.",
"align": "right"
}
},
{
"character": "Tom",
"startTime": 31.7,
"finishTime": 34.4,
"dialogue": {
"text": "What are people studying in biometrics these days?",
"align": "left"
}
},
{
"character": "Alice",
"startTime": 35.2,
"finishTime": 38.2,
"dialogue": {
"text": "Researchers are exploring biometrics beyond traditional methods.",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 38.7,
"finishTime": 41.8,
"dialogue": {
"text": "For example, they're experimenting with palm vein recognition",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 41.8,
"finishTime": 44.9,
"dialogue": {
"text": "and even behavioral biometrics like typing patterns",
"align": "right"
}
},
{
"character": "Alice",
"startTime": 44.9,
"finishTime": 45.9,
"dialogue": {
"text": "to enhance security.",
"align": "right"
}
},
{
"character": "Alice",
"position": { "x": 125, "y": 0, "z": 1 },
"startTime": 46.4
},
{
"character": "Tom",
"position": { "x": -25, "y": 0, "z": 1 },
"startTime": 46.9
}
]
}