BIOMETRICS: IELTS Academic Reading Sample Question

The passage contains following question types from IELTS Reading Question Types:

  • Matching headings
  • Sentence completion
  • Summary Completion

BIOMETRICS

You should spend about 20 minutes on Questions 1 – 14, which are based on Reading Passage below.

A. The term “biometrics’ is derived from the Greek words bio (life) and metric (to measure). It refers to technologies for measuring and analysing a person’s physiological or behavioural characteristics, such as fingerprints, irises, voice patterns, facial patterns and hand measurements, for identification and verification purposes. One of the earliest known examples of biometrics in practice was a form of fingerprinting used in China in the 14th century. Chinese merchants stamped children’s palm prints and footprints on paper with ink to distinguish the young children from one another. This method of biometrics is still being practised today.

B. Until the late 1800s, identification largely relied upon ‘photographic memory.’ In the 1890s, an anthropologist and police desk clerk in Paris named Alphonse Bertillon sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study. He developed a method of multiple body measurements which was named after him – Bertillonage. Bertillon based his system on the claim that measurement of adult bones does not change after the age of 20. He also introduced a cataloguing system, which enabled the filing and checking of records quite quickly. His system was used by police authorities throughout the world, until 1903, when two identical measurements were obtained for two different persons at Fort Leavenworth prison. The prison switched to fingerprinting the following day and the rest of the world soon followed. abandoning Bertillonage forever. After the failure of Bertillonage. the police started using fingerprinting, which was developed by Richard Edward Henry of Scotland Yard, essentially reverting to the same methods used by the Chinese for years.

C. In the past three decades biometrics has moved from a single method (fingerprinting) to more than ten different methods. Hundreds of companies are involved with this development and continue to improve their methods as the technology available to them advances. As the industry grows, however, so does the public concern over privacy issues. Laws and regulations continue to be drafted and standards are beginning to be developed. While no other biometric has yet reached the wide range of use of fingerprinting, some are beginning to be used in both legal and business areas.

D. Identification and verification have long been in practice by presenting a personal document, such as a licence, ID card or a passport. It may also require personal information such as passwords or PINs. For security reasons, often two, or all three, of these systems are combined but as times progress, we are in constant need for more secure and accurate measures. Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of-sale applications. In addition to security, the driving force behind biometric verification has been convenience. Already, many European countries are introducing a biometric passport which will carry a paper-thin computer chip to store the facial image and at least one additional biometric identifier. This will help to counter fraudulent efforts to obtain duplicate passports and will verify the identity of the holder against the document.

E. Identification and verification are mainly used today in the fight against crime with the methods of fingerprint and DNA analysis. It is also used in security for granting access rights by voice pattern recognition. Additionally, it is used for personal comfort by identifying a person and changing personal settings accordingly, as in setting car seats by facial recognition. Starting in early 2000, the use of biometrics in schools has become widespread, particularly in the UK and USA. A number of justifications are given for such practices, including combating truancy, and replacing library cards or meal cards with fingerprinting systems. Opponents of school biometrics have raised privacy concerns against the creation of databases that would progressively include the entire population.

F. Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. There are two types of biometrics: behavioural and physical. Behavioural biometrics are generally used for verification while physical biometrics can be used for either identification or verification.

G. Iris-pattern and retina-pattern authentication methods are already employed in some bank automatic teller machines. Voice waveform recognition, a method of verification that has been used for many years with tape recordings in telephone wiretaps, is now being used for access to proprietary databanks in research facilities. Facial-recognition technology has been used by law enforcement to pick out individuals in large crowds with considerable reliability. Hand geometry is being used in industry to provide physical access to buildings. Earlobe geometry has been used to disprove the identity of individuals who claim to be someone they are not (identity theft). Signature comparison is not as reliable, all by itself, as other biometric verification methods but offers an extra layer of verification when used in conjunction with one or more other methods. No matter what biometric methodology is used, the identification verification process remains the same. A record of a person’s unique characteristic is captured and kept in a database. Later on, when identification verification is required, a new record is captured and compared with the previous record in the database. If the data in the new record matches that in the database record, the person’s identity is confirmed.

H. As technology advances, and time goes on, more and more private companies and public utilities will use biometrics for safe, accurate identification. However, these advances will raise many concerns throughout society, where many may not be educated on the methods. Some believe this technology can cause physical harm to an individual using it, or that instruments used are unsanitary. For example, there are concerns that retina scanners might not always be clean There are also concerns as to whether our personal information taken through biometric methods can be misused, tampered with, or sold, eg. by criminals stealing, rearranging or copying the biometric data Also, the data obtained using biometrics can be used in unauthorised ways without the individual’s consent. Much still remains to be seen in the effectiveness of biometric verification before we can identify it as the safest system for identification.

Questions 1– 5

Reading Passage has eight paragraphs, A – H.
Which paragraph contains the following information?
Write the correct letter A – H in spaces 1 – 5 below.

1) possible health hazards associated with the use of biometrics
2) convicted criminals were not the first to be identified by the use of biometrics
3) the application of mathematics in assessing biometric data
4) despite its limitations, biometrics has become a commercial field of activity
5) some biometric methods are useful only in conjunction with others

Questions 6 – 8

Complete the sentences below.
Choose NO MORE THAN TWO WORDS from the passage for each answer.

6) Members of the public are becoming increasingly worried about the……………….that may accompany the use of biometrics.

7) Biometrics can be used to improve the……………….of drivers and passengers.

8) Regardless of the technology used, it has one common purpose: to find somebody’s ………………and store it on the computer.

Questions 9 – 14

Complete the summary with the list of words A – L below.
Write the correct Utter A – L in spaces 9 – 14 below.

BIOMETRICS

As long ago as the 14th century, the Chinese made use of biometrics in order to tell young children apart, but it was only in the 1890s when it was first used by the authorities as a means of 9) ………………………… in criminal cases. The system developed by the Frenchman Bertillon –

that of measuring adult bones – was flawed, however, and so police adopted 10)  ………………………… as a more reliable way of identifying suspects. Governments, companies and even schools employ biometric technology to ensure, for example, that people do not enter a country illegally, gain access to certain buildings, or assume someone else’s 11) ………………………… . Apart from security, another important 12) …………………………………………… behind biometric verification has been 13)  ………………………… .The use of biometrics, however, has its critics, who say that the data collected could be used for different purposes without our 14) ………………………… .

A. identification, B. security, C. convenienceD. scanning, E. fingerprinting, F. identityG. violation, H. measuring, I. justificationJ. approval, K. factor, L. apprehension

Answers for IELTS Reading Sample Question

Justification of the Answers

1) H – ‘some believe this technology can cause physical harm_’

2) A – ‘One of the earliest known examples of biometrics in practice was a form of fingerprinting used in China in the 14th century. to distinguish the young children from one another’

3) F – The match points are processed using an algorithm’.

4) C Hundreds of companies are involved with this development’.

5) G – ‘Signature comparison is not as reliable, all by itself, as other biometric verification’.

6) Paragraph C – ‘As the industry grows, however, so does the public concern over privacy issues.’

7) Paragraph E – ‘Additionally, it is used for personal comfort by identifying a person and changing personal settings accordingly, as in setting car seats by facial recognition.’

8) Paragraph G – ‘A record of a person’s unique characteristic is captured and kept in a database.’

9) Paragraph B ‘In the 1890s, an anthropologist and police desk clerk in Paris named Alphonse Bertillon sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study.’

10) Paragraph B ‘After the failure of Bertillonage, the police started using fingerprinting……..’

11) Paragraph G – ‘individuals who claim to be someone they are not (identity theft).’

12) Paragraph D – * ..the driving force behind biometric verification..”

13) Paragraph D – In addition to security, the driving force behind biometric verification has been convenience…’

14) Paragraph H – ‘Also, the data obtained using biometrics can be used in unauthorised ways without the individual’s consent.’

Want to Download BIOMETRICS | IELTS Academic Reading Sample Question with answers pdf