Using a palm scan for authentication is an example of which of the following?

A) Authentication by knowledge
B) Authentication by ownership
C) Authentication by characteristic
D) Authentication by possession

C) Authentication by characteristic

Computer Science & Information Technology

You might also like to view...

A formula specifies how to add, subtract, multiply, or divide the numbers in worksheet cells.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An animation created using animation properties and the@keyframesrule is known as akeyframeanimation. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology