A user can be identified by ________.

a) user knowledge, such as passwords, PINs and lock combinations
b) ownership of an item, such as badges, keys and smart cards
c) a unique characteristic such as a fingerprint
d) all of the above


d) all of the above

Computer Science & Information Technology

You might also like to view...

In PHP, you are limited to ten (10) code blocks in a single page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a system of hard drives based on redundancy and used for increased reliability and performance?

A. MTBF B. RPO C. RAID D. ESD

Computer Science & Information Technology

A system of rules that tells us what we can and cannot do is referred to as _____.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Character data type is used for a field that can store a variable amount of text or combinations of text and numbers where the total number of characters may exceed 255.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology