Which of the following multifactor authentication methods uses biometrics?

A. Somewhere you are
B. Something you have
C. Something you know
D. Something you are


Answer: D. Something you are

Computer Science & Information Technology

You might also like to view...

____ are the horizontal and vertical lines that are created and positioned in the Document window.

A. Guides B. Rulers C. Measures D. Spacers

Computer Science & Information Technology

Match the following features with their use or definition:

I. endnote II. footnote III. outline IV. bibliography V. table of contents A. list of sources in a document B. placed at the end of a page C. help readers find specific sections in a document D. placed at the end of the document E. helps organize your document

Computer Science & Information Technology

Slide Sorter view displays all the slides in a presentation as thumbnails

Indicate whether the statement is true or false

Computer Science & Information Technology

It is a good idea to develop a formal plan for the regular post-publishing review and maintenance of your site.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology