Examlex
Which of the following is NOT a method in which a security system tries to authenticate a user's identity?
Primacy Effect
A cognitive bias that results in a person recalling items or information presented at the beginning of a list better than those in the middle or end.
Low-ball Technique
A persuasion tactic in which an initially favorable deal is later altered to become less favorable to the individual who agreed to it.
Foot-in-the-door Technique
A persuasion strategy in which agreement to a small, initial request increases the likelihood of compliance with a larger, later request.
Door-in-the-face Technique
A persuasion strategy where a large, unreasonable request is made first and, if refused, a smaller, more reasonable request is made.
Q14: The point of structured programming is to
Q23: The U.S.Defense Department created _,which provides round-the-clock
Q27: Modeling tools allow systems analysts to present
Q34: Oil spilled into the ocean does not
Q52: The more megapixels a digital camera has,the
Q107: The consequences of mutations are invariably harmful.
Q143: What short-distance wireless standard is used to
Q155: If the performance of individual parts of
Q164: One advantage of modularization of a program
Q169: Very-high-level languages are also called fourth-generation languages