________ involve using a physical attribute such as a fingerprint for authentication
a. Backdoors
b. Rootkits
c. Biometrics
d. Trojan horses
C
Computer Science & Information Technology
You might also like to view...
An object's ____ thus consists of ____ values.
A. position; three B. point of view; three C. position; six D. point of view; six
Computer Science & Information Technology
Alice does not provide a ____ statement.
A. doInOrder B. forAllTogether C. doTogether D. do
Computer Science & Information Technology