1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
givi [52]
3 years ago
8

. What physical characteristic does a retinal scan biometric device measure?

Computers and Technology
1 answer:
elena-s [515]3 years ago
4 0

Answer: D)The pattern of blood vessels at the back of the eye.

Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.

Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.

Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).

You might be interested in
How does Python recognize a tuple?
Maru [420]

Answer:

You use parentheses around the data values.

Explanation:

j took the test on edge

4 0
3 years ago
How are switches indirectly involved in ARP poisoning?
11Alexandr11 [23.1K]

Answer:

They

are indirectly involved in the attack because they do not verify the the MAC/IP address

association

Explanation:

PLEASE MARK ME AS BRAINLIEST

8 0
3 years ago
As a member of the accounting group,
Anastasy [175]

Answer:

rtg

Explanation:

rth

3 0
3 years ago
Choose the term that best matches the definition.
Y_Kistochka [10]

Answer: it’s network protocol

Explanation:

4 0
2 years ago
Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa
gladu [14]

Answer:

Ransomware

Explanation:

Just as its name implies, you have to pay a 'ransom' to get a locked file that  belongs to you

4 0
1 year ago
Other questions:
  • What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML 2. HTML is a backend technology and CSS i
    7·1 answer
  • What is the penalty for refusing to submit to alcohol testing (drivers ed)
    7·2 answers
  • If you are unsure about what is or isn’t appropriate to wear to a new job, what is the best thing to do?
    13·2 answers
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • Sulfur content is measured in
    11·1 answer
  • PLEASE HURRY!!!
    11·1 answer
  • Write the header file Stadium.h for a Stadium class. The Stadium class has the following data members: 1) an array of 1000 Seat
    7·1 answer
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!