___________is the potential for the function of a biometric system to be compromised by fraudulent activity, design flaw, accident, hardware failure, or external environmental condition.

A. data vaulting
B. accuracy
C. backups
D. vulnerability
E. compromise


Answer: D

Computer Science & Information Technology

You might also like to view...

The __________ member variable may be accessed before any objects of the class have been created.

a. private b. public c. inline d. static e. None of these

Computer Science & Information Technology

Applets do not normally have constructors. The ___________ method performs the initialization of instance variables.

(a) setJMenuBar() (b) init() (c) paint() (d) close()

Computer Science & Information Technology

An alphabetical listing of topics of interest, but not necessarily sources, in a book or paper is a(n):

A) table of contents. B) bibliography. C) index. D) Source Manager.

Computer Science & Information Technology

An operand can be either a literal value or an identifier that has a value associated with it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology