1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
7

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called

Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
6 0
Biometric Authentication Device

A device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts its pattern to a digital code

You might be interested in
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away
wel

Answer:

access the computer remotely

Explanation:

The best option would be to access the computer remotely. This allows you to remotely view the computer and control it from anywhere in the world. This allows you to take full control, analyze, and fix the problem that the individual is having without having to explain step by step to the user what they have to do. This can be accomplished through a direct IP connection or through a third-party software, which the user will need to have installed on their computer.

5 0
3 years ago
How to write an algorithm to read and print a name?<br> I want the steps please
bearhunter [10]

Answer:

Step 1: Obtain a description of the problem. This step is much more difficult than it appears. ...

Step 2: Analyze the problem. ...

Step 3: Develop a high-level algorithm. ...

Step 4: Refine the algorithm by adding more detail. ...

Step 5: Review the algorithm.

Explanation:

8 0
3 years ago
Companies typically like to design scorecards that fit their business and industry. As a result there are now software applicati
Leya [2.2K]

Answer:

Web-based balanced scorecard applications are sometimes referred to as performance dashboards.

Explanation:

Performance dashboards are common management tools used to gauge performance and enable business people to measure, monitor, and manage the key activities and processes needed to achieve business goals.

6 0
3 years ago
PLEASE HELP!!! THIS IS DUE TODAY!! WILL MARK BRAINLIEST!!
noname [10]

Answer:

1. Respecting rules and cookies while browsing a website.

2. Being kind and properly following the requirements the owner asks you to follow. Reporting any sort of comment or image that is hurtful/harmful.

Explanation:

1. By the rules and cookies for a website, you ensure the safety of your device  and are not putting any information at risk.

2.  Cyberbullying is a huge issue and you can reduce cyberbullying with the simple steps of being kind and respecting others.

Conclusion:

These rules are examples of good digital citizenship and following them will benefit you and your peers greatly.  

8 0
3 years ago
Read 2 more answers
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
Other questions:
  • Which of the following is NOT a place where you are likely to encounter a pedestrian?
    5·2 answers
  • Explain the term remote backup with examples.​
    5·1 answer
  • Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
    5·1 answer
  • Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Everyti
    11·1 answer
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • Why would an online survey of 2,000 visitors to your college’s Web site be of little use in assessing the neighboring community’
    7·1 answer
  • Determine the number of bytes necessary to store an uncompressed binary image of size 4000 × 3000 pixels
    11·1 answer
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • 1. Describe data and process modeling concepts and tools.
    9·2 answers
  • I am making a project i have to advertise a product i picked a futureistic car
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!