SlideShare a Scribd company logo
1 of 20
SCANNER 
•Group members - Amir hamza khan Bhaves Rathi Sarim Shehzad 
•Intructor - Sir Saqib
WHAT IS SCANNER ? 
•A scanner is an input device that scans documents such as 
photographs and pages of text. When a document is 
scanned, it is converted into a digital format. This creates 
an electronic version of the document that can be viewed 
and edited on a computer.
FLATBED SCANNERS 
•Most scanners are flatbed devices, which means they 
have a flat scanning surface. This is ideal for 
photographs, magazines, and various documents. 
Most flatbed scanners have a cover that lifts up so 
that books and other bulky objects can also be 
scanned.
SHEET-FED SCANNERS 
•Another type of scanner is a sheet-fed scanner, which 
can only accept paper documents. While sheet-fed 
scanners cannot scan books, some models include an 
automatic document feeder, or ADF, which allows 
multiple pages to be scanned in sequence.
HOW DOES A SCANNER WORKS ? 
•Scanners work in conjunction with computer software 
programs, which import data from the scanner. Most 
scanners include basic scanning software that allows the 
user to configure, initiate, and import scans. Scanning 
plug-ins can also be installed, which allow various 
software programs to import scanned images directly.
CONTINUE 
•For example, if a scanner plug-in is installed for 
Adobe Photoshop, a user can create new images 
in Photoshop directly from the connected 
scanner.
CONTINUE 
• While Photoshop can edit scanned images, some programs like 
Acrobat and OmniPage can actually recognize scanned text. 
This technology is called optical character recognition, or OCR. 
Scanning software that includes OCR can turn a scanned text 
document into a digital text file that can be opened and edited 
by a word processor. Some OCR programs even capture page and 
text formatting, making it possible to create electronic copies of 
physical documents.
OPTICAL MARK 
RECONITION 
•Reads hand-drawn marks such as small circles or rectangles 
•An OMR device scans the documents and matches the 
patterns of light
SOME MAJOR MANUFACTURERS OF 
SCANNERS ARE GIVEN BELOW 
Epson, Hewlett-Packard, Microtek, 
and Relisys.
BAR CODE READER 
A barcode reader (or barcode scanner) is an electronic 
device for reading printed barcodes. it consists of a 
light source, a lens and a light sensor translating 
optical impulses into electrical ones. Additionally, 
nearly all barcode readers contain decoder circuitry 
analyzing the barcode's image data provided by the 
sensor and sending the barcode's content to the 
scanner's output port.
RFID (RADIO FREQUENCY 
IDENTIFICATION 
Radio-frequency identification (RFID) is the wireless 
use of electromagnetic fields to transfer data, for the 
purposes of automatically identifying and tracking 
tags attached to objects. The tags contain electronically 
stored information. Some tags are powered by and read 
at short ranges (a few meters) via magnetic fields 
(electromagnetic induction)
CONTINUE 
• Others use a local power source such as a battery, or else have no 
battery but collect energy from the interrogating EM field, and then 
act as a passive transponder to emit microwaves or UHF (ultra high 
frequency) radio waves (i.e., electromagnetic radiation at high 
frequencies). Battery powered tags may operate at hundreds of meters. 
Unlike a barcode, the tag does not necessarily need to be within line of 
sight of the reader, and may be embedded in the tracked object.
MEGNETIC STRIP CARD 
READERS 
• A magnetic stripe card is a type of card capable of storing data by 
modifying the magnetism of tiny iron-based magnetic particles on a band of 
magnetic material on the card. The magnetic stripe, sometimes called swipe 
card or magnet stripe, is read by swiping past a magnetic reading head. 
Magnetic stripe cards are commonly used in credit cards, identity cards, and 
transportation tickets. They may also contain an RFID tag, a transponder 
device and/or a microchip mostly used for business premises access control or 
electronic payment.
HERE YOU CAN SEE 
MAGNETIC STRIP
MAGNETIC INK CHARACTER RECOGNITION 
• Magnetic ink character recognition (MICR) is a character-recognition 
technology used mainly by the banking industry to 
ease the processing and clearance of cheques and other documents. 
The MICR encoding, called the MICR line, is at the bottom of 
cheques and other vouchers and typically includes the document-type 
indicator, bank code, bank account number, cheque number, 
cheque amount, and a control indicator. The technology allows 
MICR readers to scan and read the information directly into a 
data-collection device. Unlike barcodes and similar technologies, 
MICR characters can be read easily by humans.
BIOMETIC INPUT 
• biometrics is the identification of a person by the measurement 
of their biological features. For example, a user identifying 
themselves to a computer or building by their finger print or 
voice is considered a biometrics identification. When compared 
to a password, this type of system is much more difficult to fake 
since it is unique to the person. Below is a listing of all known 
biometric devices. 
• Other common methods of a biometrics scan are a person's face, 
hand, iris, and retina.
TERMINAL COMPUTER 
• computer terminal, a device that enables a computer to receive or deliver 
data. Computer terminals vary greatly depending on the format of the data 
they handle. For example, a simple early terminal comprised a typewriter 
keyboard for input and a typewriter printing element 
for alphanumeric output. A more recent variation includes the keyboard for 
input and a television like screen to display the output. The screen can be 
a cathode-ray tube or a gas plasma panel, the latter involving an ionized 
gas (sandwiched between glass layers) that glows to form dots which, in 
turn, connect to form lines. Such displays can present a variety of output, 
ranging from simple alphanumerics to complex graphic images used as 
design tools by architects and engineers.
CONTINUE 
• Portable terminals frequently use liquid crystal displays because of their low 
power requirements. The terminals of pen-based computers use a stylus to 
input handwriting on the screen. Touch-sensitive terminals accept input 
made by touching a pressure-sensitive panel in front of a menu displayed on 
the screen. Other familiar types of terminals include store checkout systems 
that deliver detailed printed receipts and use laser scanners to read 
the barcodes on packages, and automatic teller machines in banks
Scanners by Amir Hamza Khan (SZABISTIAN)

More Related Content

What's hot

Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013JASON WOODHOUSE
 
Technology :: Barcode Scanners Description and Products
Technology :: Barcode Scanners Description and ProductsTechnology :: Barcode Scanners Description and Products
Technology :: Barcode Scanners Description and Productsgustywarlock2252
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessArnab Roy Chowdhury
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readersadil529
 
vrushabh sahare barcoding presentation
vrushabh sahare   barcoding presentationvrushabh sahare   barcoding presentation
vrushabh sahare barcoding presentationAkash Maurya
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareMuhammed Afsal Villan
 
Working principle of a barcode Reader
Working principle of a barcode ReaderWorking principle of a barcode Reader
Working principle of a barcode ReaderMarajulislam3
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]dherendra dev
 
Barcode technology
Barcode technologyBarcode technology
Barcode technologyPRANJAL SONI
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technologyDeveshDRA
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationAkshay Shelake
 

What's hot (20)

Barcode Reader(Scanner)
Barcode Reader(Scanner)Barcode Reader(Scanner)
Barcode Reader(Scanner)
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 
Working of barcode reader
Working of barcode readerWorking of barcode reader
Working of barcode reader
 
Technology :: Barcode Scanners Description and Products
Technology :: Barcode Scanners Description and ProductsTechnology :: Barcode Scanners Description and Products
Technology :: Barcode Scanners Description and Products
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of Business
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readers
 
Ppt
PptPpt
Ppt
 
vrushabh sahare barcoding presentation
vrushabh sahare   barcoding presentationvrushabh sahare   barcoding presentation
vrushabh sahare barcoding presentation
 
Barcodes - Types, Working and Hardware
Barcodes - Types, Working and HardwareBarcodes - Types, Working and Hardware
Barcodes - Types, Working and Hardware
 
Working principle of a barcode Reader
Working principle of a barcode ReaderWorking principle of a barcode Reader
Working principle of a barcode Reader
 
barcodes [Recovered]
barcodes [Recovered]barcodes [Recovered]
barcodes [Recovered]
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Barcode
BarcodeBarcode
Barcode
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Regulatory aspect of barcode technology
Regulatory aspect of barcode technologyRegulatory aspect of barcode technology
Regulatory aspect of barcode technology
 
Bar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its applicationBar codes and its type with different scanner and its application
Bar codes and its type with different scanner and its application
 
Barcode scanner
Barcode scannerBarcode scanner
Barcode scanner
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
bar coding
bar codingbar coding
bar coding
 
Barcode
BarcodeBarcode
Barcode
 

Viewers also liked

c++ pointers by Amir Hamza Khan (SZABISTIAN)
c++ pointers by Amir Hamza Khan (SZABISTIAN)c++ pointers by Amir Hamza Khan (SZABISTIAN)
c++ pointers by Amir Hamza Khan (SZABISTIAN)Ameer Hamxa
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocolselvakumar_b1985
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 

Viewers also liked (7)

c++ pointers by Amir Hamza Khan (SZABISTIAN)
c++ pointers by Amir Hamza Khan (SZABISTIAN)c++ pointers by Amir Hamza Khan (SZABISTIAN)
c++ pointers by Amir Hamza Khan (SZABISTIAN)
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 

Similar to Scanners by Amir Hamza Khan (SZABISTIAN)

Input devices lecture 5
Input devices lecture 5Input devices lecture 5
Input devices lecture 5Farheen Javed
 
Barcode printer and barcode label dealers in delhi (1)
Barcode printer and barcode label dealers in delhi (1)Barcode printer and barcode label dealers in delhi (1)
Barcode printer and barcode label dealers in delhi (1)samarth solutions
 
Input and output devices
Input and output devicesInput and output devices
Input and output devicesShouaQureshi
 
hardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romhardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romquratyousaf8
 
Data Scanning Devices
Data Scanning DevicesData Scanning Devices
Data Scanning Devicesswatisinghal
 
Barcode Scanners Advantages, Limitations, and Applications.pptx
Barcode Scanners Advantages, Limitations, and Applications.pptxBarcode Scanners Advantages, Limitations, and Applications.pptx
Barcode Scanners Advantages, Limitations, and Applications.pptxPOS Central
 
4 input and output devices
4   input and output devices4   input and output devices
4 input and output devicesarslanzafar13162
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology pptVyakhayaYadav
 
IO Devices
IO DevicesIO Devices
IO DevicesQsrealm
 
Input, processing and output (week 2).pptx
Input, processing and output (week 2).pptxInput, processing and output (week 2).pptx
Input, processing and output (week 2).pptxOmosuwa Richard Abiodun
 
Capabilities and characteristic of hardware and software --
Capabilities and characteristic of hardware and software --Capabilities and characteristic of hardware and software --
Capabilities and characteristic of hardware and software --PAQUIAAIZEL
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 

Similar to Scanners by Amir Hamza Khan (SZABISTIAN) (20)

Input Devices
Input DevicesInput Devices
Input Devices
 
Input devices lecture 5
Input devices lecture 5Input devices lecture 5
Input devices lecture 5
 
Barcode printer and barcode label dealers in delhi (1)
Barcode printer and barcode label dealers in delhi (1)Barcode printer and barcode label dealers in delhi (1)
Barcode printer and barcode label dealers in delhi (1)
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
INPUT AND OUTPUT DEVICES
INPUT AND OUTPUT DEVICESINPUT AND OUTPUT DEVICES
INPUT AND OUTPUT DEVICES
 
Computer system
Computer systemComputer system
Computer system
 
Silchar paper final
Silchar paper finalSilchar paper final
Silchar paper final
 
hardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and romhardware chapter computer o level and ram and rom
hardware chapter computer o level and ram and rom
 
Data Scanning Devices
Data Scanning DevicesData Scanning Devices
Data Scanning Devices
 
Input devices-3
Input devices-3Input devices-3
Input devices-3
 
Paper based interaction
Paper based interactionPaper based interaction
Paper based interaction
 
Automatic Data Capture.pptx
Automatic Data Capture.pptxAutomatic Data Capture.pptx
Automatic Data Capture.pptx
 
Barcode Scanners Advantages, Limitations, and Applications.pptx
Barcode Scanners Advantages, Limitations, and Applications.pptxBarcode Scanners Advantages, Limitations, and Applications.pptx
Barcode Scanners Advantages, Limitations, and Applications.pptx
 
Card reader
Card readerCard reader
Card reader
 
4 input and output devices
4   input and output devices4   input and output devices
4 input and output devices
 
Barcode Technology ppt
Barcode Technology pptBarcode Technology ppt
Barcode Technology ppt
 
IO Devices
IO DevicesIO Devices
IO Devices
 
Input, processing and output (week 2).pptx
Input, processing and output (week 2).pptxInput, processing and output (week 2).pptx
Input, processing and output (week 2).pptx
 
Capabilities and characteristic of hardware and software --
Capabilities and characteristic of hardware and software --Capabilities and characteristic of hardware and software --
Capabilities and characteristic of hardware and software --
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Scanners by Amir Hamza Khan (SZABISTIAN)

  • 1.
  • 2. SCANNER •Group members - Amir hamza khan Bhaves Rathi Sarim Shehzad •Intructor - Sir Saqib
  • 3. WHAT IS SCANNER ? •A scanner is an input device that scans documents such as photographs and pages of text. When a document is scanned, it is converted into a digital format. This creates an electronic version of the document that can be viewed and edited on a computer.
  • 4. FLATBED SCANNERS •Most scanners are flatbed devices, which means they have a flat scanning surface. This is ideal for photographs, magazines, and various documents. Most flatbed scanners have a cover that lifts up so that books and other bulky objects can also be scanned.
  • 5. SHEET-FED SCANNERS •Another type of scanner is a sheet-fed scanner, which can only accept paper documents. While sheet-fed scanners cannot scan books, some models include an automatic document feeder, or ADF, which allows multiple pages to be scanned in sequence.
  • 6. HOW DOES A SCANNER WORKS ? •Scanners work in conjunction with computer software programs, which import data from the scanner. Most scanners include basic scanning software that allows the user to configure, initiate, and import scans. Scanning plug-ins can also be installed, which allow various software programs to import scanned images directly.
  • 7. CONTINUE •For example, if a scanner plug-in is installed for Adobe Photoshop, a user can create new images in Photoshop directly from the connected scanner.
  • 8. CONTINUE • While Photoshop can edit scanned images, some programs like Acrobat and OmniPage can actually recognize scanned text. This technology is called optical character recognition, or OCR. Scanning software that includes OCR can turn a scanned text document into a digital text file that can be opened and edited by a word processor. Some OCR programs even capture page and text formatting, making it possible to create electronic copies of physical documents.
  • 9. OPTICAL MARK RECONITION •Reads hand-drawn marks such as small circles or rectangles •An OMR device scans the documents and matches the patterns of light
  • 10. SOME MAJOR MANUFACTURERS OF SCANNERS ARE GIVEN BELOW Epson, Hewlett-Packard, Microtek, and Relisys.
  • 11. BAR CODE READER A barcode reader (or barcode scanner) is an electronic device for reading printed barcodes. it consists of a light source, a lens and a light sensor translating optical impulses into electrical ones. Additionally, nearly all barcode readers contain decoder circuitry analyzing the barcode's image data provided by the sensor and sending the barcode's content to the scanner's output port.
  • 12. RFID (RADIO FREQUENCY IDENTIFICATION Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by and read at short ranges (a few meters) via magnetic fields (electromagnetic induction)
  • 13. CONTINUE • Others use a local power source such as a battery, or else have no battery but collect energy from the interrogating EM field, and then act as a passive transponder to emit microwaves or UHF (ultra high frequency) radio waves (i.e., electromagnetic radiation at high frequencies). Battery powered tags may operate at hundreds of meters. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object.
  • 14. MEGNETIC STRIP CARD READERS • A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magnet stripe, is read by swiping past a magnetic reading head. Magnetic stripe cards are commonly used in credit cards, identity cards, and transportation tickets. They may also contain an RFID tag, a transponder device and/or a microchip mostly used for business premises access control or electronic payment.
  • 15. HERE YOU CAN SEE MAGNETIC STRIP
  • 16. MAGNETIC INK CHARACTER RECOGNITION • Magnetic ink character recognition (MICR) is a character-recognition technology used mainly by the banking industry to ease the processing and clearance of cheques and other documents. The MICR encoding, called the MICR line, is at the bottom of cheques and other vouchers and typically includes the document-type indicator, bank code, bank account number, cheque number, cheque amount, and a control indicator. The technology allows MICR readers to scan and read the information directly into a data-collection device. Unlike barcodes and similar technologies, MICR characters can be read easily by humans.
  • 17. BIOMETIC INPUT • biometrics is the identification of a person by the measurement of their biological features. For example, a user identifying themselves to a computer or building by their finger print or voice is considered a biometrics identification. When compared to a password, this type of system is much more difficult to fake since it is unique to the person. Below is a listing of all known biometric devices. • Other common methods of a biometrics scan are a person's face, hand, iris, and retina.
  • 18. TERMINAL COMPUTER • computer terminal, a device that enables a computer to receive or deliver data. Computer terminals vary greatly depending on the format of the data they handle. For example, a simple early terminal comprised a typewriter keyboard for input and a typewriter printing element for alphanumeric output. A more recent variation includes the keyboard for input and a television like screen to display the output. The screen can be a cathode-ray tube or a gas plasma panel, the latter involving an ionized gas (sandwiched between glass layers) that glows to form dots which, in turn, connect to form lines. Such displays can present a variety of output, ranging from simple alphanumerics to complex graphic images used as design tools by architects and engineers.
  • 19. CONTINUE • Portable terminals frequently use liquid crystal displays because of their low power requirements. The terminals of pen-based computers use a stylus to input handwriting on the screen. Touch-sensitive terminals accept input made by touching a pressure-sensitive panel in front of a menu displayed on the screen. Other familiar types of terminals include store checkout systems that deliver detailed printed receipts and use laser scanners to read the barcodes on packages, and automatic teller machines in banks