1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
3 years ago
6

One type of technology that can verify a person's identity is _____.

Computers and Technology
2 answers:
Digiron [165]3 years ago
6 0

hello there

the answer is

Automated Fingerprint Verification

thank you

Juliette [100K]3 years ago
3 0

AFV (Automated Fingerprint Verification)

You might be interested in
If a database named Contacts has a table named tblEmployees and another database named Orders links to that tblEmployees table,
Vlad1618 [11]

Answer:

cache I think

Explanation:

I am not sure or memory HDD or SSD

5 0
3 years ago
What is the standard internet protocol, which provides the technical foundation for the public internet?
luda_lava [24]
You have to be carefull no bulling cuiberbulling people hurt there self for stuff like that
3 0
3 years ago
, how do you make this user <br> XtraCrispyIzzy<br> 12 characters or less for microsoft?
xxTIMURxx [149]

Answer:

Maybe take away the 'xtra'

8 0
2 years ago
Give two examples of desktop publishing software
soldier1979 [14.2K]
There are quite a lot of desktop publishing software as of today.
I'll give you the names of some of it.
- Adobe inDesign - one of the most popular
- Corel Draw
- Microsoft Publisher
- Serif
- Ultra Xml
And more.
There are actually a lot if you are just about to check in the internet.
7 0
3 years ago
Which amendment to the Constitution ended slavery in the United States?
KonstantinChe [14]
<span>The amendment to the constitution which ended slavery in the United States of America is the thirteen amendement. The correct option is B. The thirteen amendment forbades slavery and involuntary servitude in United States of America. The amendment was passed at the end of the civil war.</span>
4 0
3 years ago
Other questions:
  • Helllllp: Virtual private networks require a secure remote connection.<br> True or False?
    10·2 answers
  • How can investors receive compounding returns? A: by selecting a savings account that has a higher interest rate B: by investing
    9·2 answers
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • Which one of these do not belong on the Do's list in Helpful Hints when preparing a presentation: Which one of these do not belo
    8·1 answer
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • A computer has been stored, uncovered, in a dusty closet for several months. Why might this situation cause the operating system
    13·1 answer
  • Explain how computer system is different from computer in 150 words
    14·1 answer
  • What is the code for this please?​
    13·1 answer
  • Anyone trying to play fortnite ? im bored lol
    6·2 answers
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!