Biometric methods include:

A. finger and hand geometry
B. iris and palm imaging
C. face, retina, and voice recognition
D. password composition
E. all of the above


Answer: E

Computer Science & Information Technology

You might also like to view...

The compression function used in secure hash algorithms falls into one of two categories: a function specifically designed for the hash function or an algorithm based on a ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The value returned by the InputBox function is the same whether the user clicks the OK button, Cancel button, or Close button.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Typing new text into a document at the insertion point is called ________ mode

Fill in the blank(s) with correct word

Computer Science & Information Technology

File and Printer Sharing for Microsoft Network is an example of which type of network component?

A. network server B. network protocol C. network client D. network interface

Computer Science & Information Technology