Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.

A. bar codes
B. virtual reality glasses
C. collaboration systems
D. authentication systems


Answer: D

Computer Science & Information Technology

You might also like to view...

A local pizzeria that has been around for more than forty years, keeps adjusting to new conditions and altering their practices.  Such behavior is known as ____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The SQL ___________ statement modifies information in a database.

a) SELECT b) MODIFY c) CHANGE d) UPDATE

Computer Science & Information Technology

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.)

A. netstat -u B. netstat --udp C. netstat -t udp D. netstat udp

Computer Science & Information Technology

The process of ____________________ involves resolving defects in the program code.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology