Authentication technologies are used by many organizations to _____.

A. verify the accuracy of their product descriptions and prices
B. secure sensitive data duringĀ e-commerce
C. confirm the uniform resource locator (URL) of their suppliers' Websites
D. confirm the identity of a user requesting access to information or assets

Answer: D

Computer Science & Information Technology

You might also like to view...

Insertion sorting is one of the most common sorting techniques used ____.

A. in personal computers B. in word-processing applications C. by card players D. in databases

Computer Science & Information Technology

If no directory name is included as a parameter with the ls command, the contents of the current directory are listed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology