________ uses unique personal information, such as fingerprints, eyeball iris scans or face scans, to identify a user.

a) Biometrics.
b) A digital signature.
c) The Kerberos protocol.
d) None of the above.

a) Biometrics.

Computer Science & Information Technology

You might also like to view...

A(n) ____ guides individual access and employment of data.

A. access policy B. acceptable use policy C. privacy policy D. communication policy

Computer Science & Information Technology

Two tasks that are operating ________ are executing simultaneously.

a. concurrently b. in parallel c. sequentially d. iteratively

Computer Science & Information Technology