________ involve using a physical attribute such as a fingerprint for authentication
a. Backdoors
b. Rootkits
c. Biometrics
d. Trojan horses
C
Computer Science & Information Technology
You might also like to view...
Within a site, Active Directory replication is uncontrolled.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ____ character is used to indicate that a letter is a hot key on a menu item.
A. ampersand (&) B. forward slash (/) C. back slash (\) D. underscore (_)
Computer Science & Information Technology
What part of http://www.nps.gov/history/preserve-places.html is the host name?
A. http:// B. www.nps.gov C. history D. preserve-places.html
Computer Science & Information Technology
What is a touch pad?
What will be an ideal response?
Computer Science & Information Technology