Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.

A. shared
B. public
C. unique
D. common

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following database models relates, or connects, data in different files through the use of a key, or common data element?

A. hierarchical B. network C. object- oriented D. relational E. offline

Computer Science & Information Technology

Pseudocode does not typically include __________.

(a) definitions (b) input/output (c) action statements (d) control statements

Computer Science & Information Technology