What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?
A. Micrometrics
B. Macrometrics
C. Biometrics
D. MicroBiometrics
A. Micrometrics
B. Macrometrics
C. Biometrics
D. MicroBiometrics