Which of the following is an example of authentication using something Jane, a user, has and something she knows?
A. GSM phone card and PIN
B. Username and password
C. Username and PIN
D. Fingerprint scan and signature
Answer: A. GSM phone card and PIN
You might also like to view...
Which of the following is NOT a benefit of avoiding redundancy in a database?
A) Reduces errors when recording new data B) User doesn't have to remember where data is stored C) Conserves space D) Prevents unauthorized manipulation of data
Instead of appending one array to another, you can merge two or more arrays with the ____________________ function.
Fill in the blank(s) with the appropriate word(s).
How may batch processing be used to improve operational efficiency?
What will be an ideal response?
Press the ____________________ key to select multiple contiguous layers.
Fill in the blank(s) with the appropriate word(s).