____ are used to input data about a person so that the individual's identity can be verified based on a particular unique physiological characteristic.

A. Biometric readers
B. RFID tags
C. MICR readers
D. OMRs


Answer: A

Computer Science & Information Technology

You might also like to view...

When the loop is finished stepping through the values array, what value will be stored in values[0]?

Look at the following code sample: ``` const int SIZE = 10; int[] values = new int[SIZE]; for (int index = 0; index < SIZE; index++) { values[index] = index + 1; } ``` a. 10 b. 11 c. 0 d. 1

Computer Science & Information Technology

The ________ style is the default style for a new Word document

Fill in the blank(s) with correct word

Computer Science & Information Technology

Investigating a computer while it is turned on is called live forensics

Indicate whether the statement is true or false.

Computer Science & Information Technology

Name resolution by broadcast does not work for the Internet because routers do not forward _______________ messages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology