1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
13

Technology that verifies a person's identity is _____. a smart card Automated Fingerprint Verification an EPD a digital ink pen

Computers and Technology
2 answers:
Art [367]3 years ago
5 0

Automated Fingerprint Verification

tresset_1 [31]3 years ago
3 0
The answer is Automated fingerprint.
 Automated Fingerprint is the process that verifies a person's identity. It is primarily used for law enforcement agencies for criminal identification initiatives. It is important because it includes identifying a person suspected of committing a crime or linking suspects to unsolved crimes. 

You might be interested in
In the context of the components of a typical expert system, _____ is a software package with manual or automated methods for ac
Pani-rosa [81]

Answer:

knowledge acquisition facility

Explanation:

In the context of the components of a typical expert system, Knowledge acquisition facility is defined as that component of an expert system that is responsible for providing an effective and efficient medium for collecting and incorporating relevant information such as data, new rules, relationships and facts used by the expert system.

6 0
3 years ago
What is the file extension for an impress file??
gogolik [260]
<span>In this resource, files created in OOo Impress will be referred to as ODP files and Impress Files.</span>
6 0
3 years ago
100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
Reika [66]

\frac{8}{100} or \frac{2}{25}
7 0
3 years ago
Read 2 more answers
Why is fluency in information technology becoming increasingly important for many college majors?
never [62]
I think the answer to your question is opt. D
5 0
3 years ago
Read 2 more answers
What is the best way to protect against the loss of important files
Lemur [1.5K]
Back them up on a different drive
4 0
3 years ago
Other questions:
  • This is the computer âchipâ that interprets computer instructions and processes data:
    13·1 answer
  • How can a user view the options for Junk E-mail?
    11·2 answers
  • A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
    6·1 answer
  • A7DF is the hexadecimal representation for what bit pattern?
    8·1 answer
  • ____ is the security guarantee that people who intercept messages cannot read them. A. Availability B. Encryption C. Confidentia
    9·1 answer
  • What are some examples of how AutoFormat can convert text as you type? Check all that apply.
    8·1 answer
  • What will happen if you reverse the connection of IDE?<br>​
    9·1 answer
  • How can you continue learning about computer science and improve your coding abilities?
    5·1 answer
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the n
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!