Which technique best describes a one-to-one search to verify an individual's claim of identity?

A. Authorization
B. Accounting review
C. Authentication
D. Availability


Answer: C. Authentication

Computer Science & Information Technology

You might also like to view...

A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ content accepts and responds to human actions using multimedia elements.

A. Navigational B. Active C. Authored D. Interactive

Computer Science & Information Technology

You can use ________ to highlight or emphasize cells that meet a specific condition

A) conditional formatting B) structured referencing C) sorting D) filtering

Computer Science & Information Technology

What are the six steps necessary to design a database for a set of requirements?

What will be an ideal response?

Computer Science & Information Technology