Back to Freecodecamp

Dialogue 4: Talking about Biometrics

curriculum/challenges/english/blocks/learn-how-to-discuss-popular-trends-in-technology/65fdcfcd986a305a20de5e57.md

latest4.3 KB
Original Source

--description--

Watch the video below to understand the context of the upcoming lessons.

--assignment--

Watch the video.

--scene--

json
{
  "setup": {
    "background": "company2-breakroom.png",
    "characters": [
      {
        "character": "Tom",
        "position": { "x": -25, "y": 0, "z": 1 }
      },
      {
        "character": "Alice",
        "position": { "x": 125, "y": 0, "z": 1 }
      }
    ],
    "audio": {
      "filename": "4.2-4.mp3",
      "startTime": 1
    },
    "alwaysShowDialogue": true
  },
  "commands": [
    {
      "character": "Tom",
      "position": { "x": 25, "y": 0, "z": 1 },
      "startTime": 0
    },
    {
      "character": "Alice",
      "position": { "x": 70, "y": 0, "z": 1 },
      "startTime": 0.5
    },
    {
      "character": "Tom",
      "startTime": 1.7,
      "finishTime": 4.1,
      "dialogue": {
        "text": "Alice, what's the deal with biometrics?",
        "align": "left"
      }
    },
    {
      "character": "Tom",
      "startTime": 4.4,
      "finishTime": 7.4,
      "dialogue": {
        "text": "I keep hearing about facial recognition and fingerprint scanning.",
        "align": "left"
      }
    },
    {
      "character": "Alice",
      "startTime": 8.1,
      "finishTime": 11.5,
      "dialogue": {
        "text": "Biometrics is the use of physical or behavioral traits for security.",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 12.1,
      "finishTime": 13.6,
      "dialogue": {
        "text": "It's used for access control,",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 13.8,
      "finishTime": 15.9,
      "dialogue": {
        "text": "like unlocking your phone with your face or fingerprint.",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 16.4,
      "finishTime": 18.3,
      "dialogue": {
        "text": "Also, it's used for identity verification",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 18.3,
      "finishTime": 20,
      "dialogue": {
        "text": "at airports and secure facilities.",
        "align": "right"
      }
    },
    {
      "character": "Tom",
      "startTime": 20.5,
      "finishTime": 21.5,
      "dialogue": {
        "text": "Is it safe?",
        "align": "left"
      }
    },
    {
      "character": "Alice",
      "startTime": 22,
      "finishTime": 24.6,
      "dialogue": {
        "text": "It's generally secure, but like any technology,",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 24.7,
      "finishTime": 26.9,
      "dialogue": {
        "text": "it has its challenges and privacy concerns.",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 27.3,
      "finishTime": 31.2,
      "dialogue": {
        "text": "It's necessary to keep biometric data protected to maintain its security.",
        "align": "right"
      }
    },
    {
      "character": "Tom",
      "startTime": 31.7,
      "finishTime": 34.4,
      "dialogue": {
        "text": "What are people studying in biometrics these days?",
        "align": "left"
      }
    },
    {
      "character": "Alice",
      "startTime": 35.2,
      "finishTime": 38.2,
      "dialogue": {
        "text": "Researchers are exploring biometrics beyond traditional methods.",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 38.7,
      "finishTime": 41.8,
      "dialogue": {
        "text": "For example, they're experimenting with palm vein recognition",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 41.8,
      "finishTime": 44.9,
      "dialogue": {
        "text": "and even behavioral biometrics like typing patterns",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "startTime": 44.9,
      "finishTime": 45.9,
      "dialogue": {
        "text": "to enhance security.",
        "align": "right"
      }
    },
    {
      "character": "Alice",
      "position": { "x": 125, "y": 0, "z": 1 },
      "startTime": 46.4
    },
    {
      "character": "Tom",
      "position": { "x": -25, "y": 0, "z": 1 },
      "startTime": 46.9
    }
  ]
}