Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

A. Who you are
B. What you have
C. What you know
D. Who you know


Answer: D

Computer Science & Information Technology

You might also like to view...

________ is the term used when your computer has used up all its RAM and its virtual memory

Fill in the blank(s) with correct word

Computer Science & Information Technology

_________ are designed to be used with smartphones and other mobile devices. A. Mobile operating systems B. Smart operating systems C. IBM mainframes D. Personal operating systems

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Both Windows and UNIX-based systems use a central configuration file, called ____, to configure MySQL on startup.

A. my.uni B. my.cnf C. my.sql D. my.str

Computer Science & Information Technology

Which of the following is a valid name for a table?

A. TBL_1 B. 2_TBL C. TBL 3 D. 4 tbl

Computer Science & Information Technology