Any form of authentication that uniquely identifies you, such as your retinal patterns or fingerprints is called ____________________.

Fill in the blank(s) with the appropriate word(s).


biometrics

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. Performing a task in a program requires a method. b. A method houses the program statements that actually perform its tasks. c. The method hides its statements from its user, just as the accelerator pedal of a car hides from the driver the mechanisms of making the car go faster. d All of the above.

Computer Science & Information Technology

What four Physical layer functions can a repeater perform?

What will be an ideal response?

Computer Science & Information Technology

The Form Footer section displays information at the top of each form.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Provide rationale for using Mail Merge, explaining why it is useful and in what situations.

What will be an ideal response?

Computer Science & Information Technology