Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.
A. shared
B. public
C. unique
D. common
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following database models relates, or connects, data in different files through the use of a key, or common data element?
A. hierarchical B. network C. object- oriented D. relational E. offline
Computer Science & Information Technology
Pseudocode does not typically include __________.
(a) definitions (b) input/output (c) action statements (d) control statements
Computer Science & Information Technology