Which of the following access methods uses radio frequency waves for authentication?

A. Video surveillance
B. Mantraps
C. Proximity readers
D. Biometrics

Answer: C. Proximity readers

Computer Science & Information Technology

You might also like to view...

Before merging two or more cells, you must ________ them

A) select B) divide C) delete D) format

Computer Science & Information Technology

A(n) ________ is a rule that Solver must enforce to reach the objective value.

A. binding constraint B. non-binding constraint C. objective D. solving method

Computer Science & Information Technology