× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
s
5
g
5
K
5
o
5
g
5
o
4
k
4
s
4
I
4
k
4
j
4
o
4
New Topic  
babdo babdo
wrote...
Posts: 500
Rep: 0 0
6 years ago
________ involve using a physical attribute such as a fingerprint for authentication.
 
  a. Backdoors
  b. Rootkits
  c. Biometrics
  d. Trojan horses

- - -

To customize system settings in Word, click the File tab and then click ________.
 
  A) Manage
  B) Customization
  C) Settings
  D) Options
Read 21 times
1 Reply
Replies
Answer verified by a subject expert
NJdihsiNJdihsi
wrote...
Top Poster
Posts: 816
6 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

babdo Author
wrote...

6 years ago
Just got PERFECT on my quiz
wrote...

Yesterday
This helped my grade so much Perfect
wrote...

2 hours ago
Brilliant
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  967 People Browsing
Related Images
  
 2850
  
 241
  
 372
Your Opinion
Who will win the 2024 president election?
Votes: 7
Closes: November 4

Previous poll results: Where do you get your textbooks?