Biometric methods include:
A. finger and hand geometry
B. iris and palm imaging
C. face, retina, and voice recognition
D. password composition
E. all of the above
Answer: E
You might also like to view...
The compression function used in secure hash algorithms falls into one of two categories: a function specifically designed for the hash function or an algorithm based on a ___________ .
Fill in the blank(s) with the appropriate word(s).
The value returned by the InputBox function is the same whether the user clicks the OK button, Cancel button, or Close button.
Answer the following statement true (T) or false (F)
Typing new text into a document at the insertion point is called ________ mode
Fill in the blank(s) with correct word
File and Printer Sharing for Microsoft Network is an example of which type of network component?
A. network server B. network protocol C. network client D. network interface