answersLogoWhite

0


Best Answer

Have a professional installer install a system for you.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How can we implement a password based door locking system in which the password can be set by the user?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is Password based door locking system?

Such a system refers to one that uses a password to open or close specific doors using a password. Without the correct password, the door will not open.


What is the aim of password based door locking?

It is because if you have a key hole people can find the right shaped key and use it to open the door whereas if there is a password only you would know how to open the door


How do you change your saved password?

Changing a saved password would be based on what Operating System or platform you are changing the saved password on and the method preferred to accomplish the task.


How could you plan and implement a web based enquiry system of a tourist company?

You can used PHP and Mysql


What would you do to improve the security side of mobile and internet banking?

Personally what I would do is make sure the app for mobile banking completely disables itself once the user has gone back to the menu of his phone just in-case someone was able to restart the app and the app itself restarted from the same position it was left (normally smart phones are prone to having apps that restart back to where you left off) Also what I would do for the app was to implement a password system, so everytime you exit the app you need to put in a password of your choosing (not numbered like on the barclays app) For internet banking i would also implement a password based system like on the app as explained before, also i would make sure the site cannot be opened once closed especially if logged into your specific banking area.


Advantages of microprocessor based system?

There are many different advantages of a microprocessor based system. Some of these include that it only uses 3 components so it is simple to use and install and it will increase your memory.


Locked your dell inspiron 1545 forgot password what do you do?

It depends on which password you forgot. If it's that one for BIOS, you have to send it to Dell and ask them to cancel the password. They charge for such things so get ready you credit card. If you forget password for Windows then again it depends on which kind of windows you have. For vista ultimate with BitLocker on there is no chance to cancel password. You will have reinstall system or cancel the password and loose all data on encrypted drives. You have something simpler, you can find a special CD in internet to cancel passwords for windows NT based systems (windows NT, 2000, xp, Vista Home, Business and so, Ultimate with BitLocker off).


What should you do if you forget computer password in windows 8 and 8.1?

There are LINUX-based programs that can remove a local account password for any Windows-based PC. These are generally available for download for free or at a nominal cost. These generally do not reveal what the password WAS; they simply remove the password, allowing you to set any password you want. None of these applications will remove network passwords.


Which of these changes did Askia Muhammad implement in the Songhai government?

He introduced laws which were based on the teachings of the Quran.


What are two common techniques used to protect a password file?

• One-way function: The system stores only the value of a function based on the user's password.When the user presents a password, the system transforms that password and compares it with the stored value. In practice, the system usually performs a one-way transformation (not reversible) in which the password is used to generate a key for the one-way function and in which a fixed-length output is produced. • Access control: Access to the password file is limited to one or a very few accounts.


What is the password of hack login form v2.96?

The password for hack login form v2.96 varies based on what the administrator set it to. They will need to be contacted directly to provide the specific password.


What is graph based protocol in DBMS?

g ProtocolTree locking protocol is used to employ exclusive lock and when the database is in the form of a tree of data items. Tree locking protocol is serializable.Advantages of Tree Locking ProtocolUnlocking of data item is earlier.Shorter waiting time, increase in concurrency.Disadvantages of Tree Locking ProtocolTransaction may have to unnecessary lock data items to access its child nodes.Huge number of locks and locking overhead.