____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.
A. Multifactor authentication
B. Database authentication
C. Biometrics
D. RADIUS
Answer: C
Computer Science & Information Technology
You might also like to view...
14) Write a complete Java class that uses the console window to prompt the user for a sentence to parse. Use the StringTokenizer class to echo the tokens back to the console.
What will be an ideal response?
Computer Science & Information Technology
Word inserts a picture into a document as a(n) ________ object
Fill in the blank(s) with correct word
Computer Science & Information Technology
Excel's ________ format is used to present information in charts, graphs, and pictures
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To create the effect of a border around another element, you first create a ______ of the appropriate dimensions.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology