Authentication technologies are used by many organizations to _____.
A. verify the accuracy of their product descriptions and prices
B. secure sensitive data duringĀ e-commerce
C. confirm the uniform resource locator (URL) of their suppliers' Websites
D. confirm the identity of a user requesting access to information or assets
Answer: D
Computer Science & Information Technology
You might also like to view...
Insertion sorting is one of the most common sorting techniques used ____.
A. in personal computers B. in word-processing applications C. by card players D. in databases
Computer Science & Information Technology
If no directory name is included as a parameter with the ls command, the contents of the current directory are listed.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology