Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
A. Who you are
B. What you have
C. What you know
D. Who you know
Answer: D
Computer Science & Information Technology
You might also like to view...
________ is the term used when your computer has used up all its RAM and its virtual memory
Fill in the blank(s) with correct word
Computer Science & Information Technology
_________ are designed to be used with smartphones and other mobile devices. A. Mobile operating systems B. Smart operating systems C. IBM mainframes D. Personal operating systems
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Both Windows and UNIX-based systems use a central configuration file, called ____, to configure MySQL on startup.
A. my.uni B. my.cnf C. my.sql D. my.str
Computer Science & Information Technology
Which of the following is a valid name for a table?
A. TBL_1 B. 2_TBL C. TBL 3 D. 4 tbl
Computer Science & Information Technology