____ identify users by a particular unique biological characteristic.

A. Possessed object access systems
B. Password access systems
C. Possessed knowledge access systems
D. Biometric access systems


Answer: D

Computer Science & Information Technology

You might also like to view...

A data type that contains only one of two values—Yes/No, True/False, or On/Off

a. Yes/No b. AutoNumber c. Attachment

Computer Science & Information Technology

When you close a document in Office 2010, what happens to the application?

A) It also closes with the document. B) If you close two of more documents simultaneously, the application closes; if only one document is closed, the application remains open. C) The application remains open. D) It automatically remains open for a minimum of 10 additional minutes.

Computer Science & Information Technology

Sketch the graph of the following quadratic function using a graphing calculator.  State whether the function has a maximum or a minimum.  Determine the maximum or minimum value to the nearest tenth.  Determine the roots of the quadratic function to the nearest tenth.

What will be an ideal response?

Computer Science & Information Technology

The term "social networking site" is a misnomer, as no such site is meant to be purely social.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology