1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lerok [7]
3 years ago
9

Windows Hello supports multiple biometric authentication methods, including facial recognition. The failsafe method to authentic

ate in case the facial recognition method is unavailable is ___.
a. fingerprint sensor
b. retina scanner
c. PIN
d. Microsoft Passport
Computers and Technology
1 answer:
Dafna11 [192]3 years ago
7 0

Answer:

The correct answer to the following question will be Option C (PIN).

Explanation:

The PIN is the failsafe system to authenticate in case the identification software is not available. This is a numeric password used only to authenticate a user who has access to the system.

The other three choices aren't in the right answer because they have not been authenticated if image recognition or any other identifying software is unavailable.

Therefore, Option C is the right answer.

You might be interested in
What does the following Boolean operators do?<br>AND function<br>OR function<br>NOT function​
Alisiya [41]
Hdehehdbendjdhwjsjsjjs
6 0
3 years ago
All but one of the following statements about stored procedures is true. Which one is false? a. They consist of one or more SQL
juin [17]

Answer:

B

Explanation:

All the options above are correct about SQL except that they're NOT compiled each time they're executed. Which makes the right option, B.

8 0
4 years ago
Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
levacccp [35]

Answer:

Check the output

Explanation:

# -*- coding: utf-8 -*-

"""

Created on Thu Apr 12 00:39:11 2018

author:

"""

stocks ={

       "tomato soup": 20,

       "cheese": 8,

       "bread": 6,

       "milk": 8,

       "butter": 7,

       "coffee": 8,

       "ice cream": 5,

       "orange juice": 12,

       "bacon": 6,

       "tortilla chips": 14,

       "ramen": 24 }

prices ={

       "tomato soup": 1.85,

       "cheese": 3.99,

       "bread": 2.50,

       "milk": 3.59,

       "butter": 1.99,

       "coffee": 5.99,

       "ice cream": 2.99,

       "orange juice": 2.50,

       "bacon": 5.49,

       "tortilla chips": 3.00,

       "ramen": 0.99 }

def grocery_cost(item_list,quantity_list):

   totalcost = 0

   for i in range(len(item_list)):

       totalcost=totalcost+(quantity_list[i]*prices[item_list[i]])

       

   return totalcost

def stock(item):

   print("Number of itmes present in the stock:",stocks[item])

print("Welcome to the on-line grocery store!!")

print("Items that are available for purchase:")

for key in stocks.keys():

   print(key)

#chosen foods

print("Enter the item with quantity or Enter 'Q' when you are done")

item_list=[]

quantity_list=[]

while True:

   item=input('Enter the item name: ')

   if item=='Q' or item=='q':

       break

   item_list.append(item)

   while True:

       quan=int(input('Enter the number of item: '))

       if stocks[item] >=quan:

           quantity_list.append(quan)

           break

       else:

           stock(item)

           print('Your requirement is higher than stock available. Please enter again!!')

print("\nTotal cost:", "$",grocery_cost(item_list,quantity_list))

Kindly check the output in the attached image below.

7 0
3 years ago
What steps can be used to password-protect a worksheet?
muminat

Answer:

Review

Changes

Protect sheet

Explanation:

I did it

8 0
3 years ago
Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, h
klio [65]

Answer:

what the answer chaoices

Explanation:

brainlest me please

3 0
3 years ago
Other questions:
  • A brick weighs 26 N. Measured underwater, it weighs 11 N.
    10·1 answer
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    6·2 answers
  • Convert 78 to binary
    6·2 answers
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • Which of the following are valid calls to Math.max? 1. Math.max(1,4) 2. Math.max(2.3, 5) 3. Math.max(1, 3, 5, 7) 4. Math.max(-1.
    9·1 answer
  • What is wrong with this code and correct it.
    12·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • Which iteration must have an expression that has a true or false value?
    10·1 answer
  • How is video compression accomplished?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!