________ uses unique personal information, such as fingerprints, eyeball iris scans or face scans, to identify a user.
a) Biometrics.
b) A digital signature.
c) The Kerberos protocol.
d) None of the above.
a) Biometrics.
Computer Science & Information Technology
You might also like to view...
A(n) ____ guides individual access and employment of data.
A. access policy B. acceptable use policy C. privacy policy D. communication policy
Computer Science & Information Technology
Two tasks that are operating ________ are executing simultaneously.
a. concurrently b. in parallel c. sequentially d. iteratively
Computer Science & Information Technology