When Jim logs into a system, his password is compared to a hashed value stored in a database. What is this process?

A. Identification
B. Hashing
C. Tokenization
D. Authentication


Answer: D. Authentication

Computer Science & Information Technology

You might also like to view...

“________ trumps consistency.”

a. Faith b. Hope c. Clarity

Computer Science & Information Technology

Each column in a range represents a(n) ____________________ that describes some attribute or characteristic of a person, place, or thing.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Mechanical locks can accept a variety of inputs as keys, including magnetic strips on ID cards, radio signals from badges, personal identification numbers (PINs) typed into a keypad, or some combination of these to activate an electrically powered locking mechanism. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 4-1Kyra needs to send a letter with an important announcement to all 500 of her clients. She decides to use mail merge. Choose the best answer to complete the steps.Kyra clicks Start Mail Merge, and then clicks _____, since her final document is a letter.

A. Documents B. Letters C. Memos D. Templates

Computer Science & Information Technology