Which of the following access methods uses radio frequency waves for authentication?
A. Video surveillance
B. Mantraps
C. Proximity readers
D. Biometrics
Answer: C. Proximity readers
Computer Science & Information Technology
You might also like to view...
Before merging two or more cells, you must ________ them
A) select B) divide C) delete D) format
Computer Science & Information Technology
A(n) ________ is a rule that Solver must enforce to reach the objective value.
A. binding constraint B. non-binding constraint C. objective D. solving method
Computer Science & Information Technology