A technique to control access to computer network resources at a computer
facility permits a user to interact with the computer facility through a
computer node of a network, wherein the user interaction comprises
language learning responses submitted to the computer facility through
the computer node, and a user authentication process is performed to
determine if the permitted user interaction is authorized. The user
authentication process is performed with user authentication information
that is obtained by the computer facility during the permitted user
interaction and also with user authentication information that is
extracted from the user's language learning responses. In this way, user
authentication occurs without intruding into the utilization of the
computer facility.