1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
2 years ago
8

Which type of device would be used on a laptop to verify the identity of a user

Computers and Technology
1 answer:
Montano1993 [528]2 years ago
4 0

Answer:

A biometric identification device

Explanation:

As biometric identification devices, laptops commonly use a fingerprint scanner or, for facial recognition, a camera.

You might be interested in
What is the purpose of application software policies?
timofeeve [1]

Answer:

d. They serve to help educate users on how to use software more securely.

Explanation:

A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.

7 0
2 years ago
Listening to music on giggl, join!<br><br> link will be in comments, copy and paste
Ilya [14]

Answer:

umm, we can't say any links

Explanation:

7 0
2 years ago
Read 2 more answers
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
What is software and explain the five types of software
rewona [7]

Question: What is software and explain the five types of software

Explanation: The system software which is controlled and managed by the use of set of instructions and programs is called software.

Ex: Windows 7/8/10/xp etc...

the  types of software are'

system software and application software

Android.

CentOS.

iOS.

Linux.

Mac OS.

MS Windows.

Ubuntu.

Unix.

5 0
2 years ago
Read 2 more answers
Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she will
irina1246 [14]

Answer:

She's willing to lose $10.75.

Explanation:

$215.00 * .05 = answer

         or

$215.00 * .95 = x

$215.00 - x = answer

7 0
2 years ago
Other questions:
  • A(n ____ with a drop down menu provides consistency in function and appearance making it easy for users to learn and work with t
    7·1 answer
  • Businesses use a fax cover sheet is to _____. provide detailed service and product information make sure message reaches the rig
    14·2 answers
  • Your friend Suzy calls to ask for help with her computer. She says when she first turns on the computer, she doesn’t hear a spin
    10·1 answer
  • The box formed by the intersection of a row and column in a spreadsheet program is known as a ________.
    13·1 answer
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • How can you tell that you're driving in the right direction?
    14·1 answer
  • What kind of company would hire an Information Support and Service employee?
    7·1 answer
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • Making sure that your business has something special and distinct to offer is known as?
    12·1 answer
  • As marketing manager, you need to have ( blank) skills and (blank) skills.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!