1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
2 years ago
10

What are three ways of verifying legitimate right of access to a computer system?

Computers and Technology
1 answer:
dezoksy [38]2 years ago
7 0

Something you know (such as a password)

Something you have (such as a smart card)

Something you are (such as a fingerprint or other biometric method)

<h3>What are the 3 methods of authentication?</h3>
  • The three authentication factors are Knowledge Factor – something you know, e.g. password.
  • Possession Factor – something you have, e.g.mobile phone. Inherence Factor – something you are, e.g., fingerprint.

To learn more about it, refer

to brainly.com/question/22654163

#SPJ4

You might be interested in
Tuesday
4vir4ik [10]

Answer:

?

Explanation:

these are instructions to a question?

7 0
3 years ago
A_________is an orderly collection of fact &amp; information.
sammy [17]

Answer:

C. Database

Explanation:

4 0
3 years ago
Allows a service provider organization to own and manage the infrastructure (including computing, networking, and storage device
djverab [1.8K]

Answer:

The answer is "Public Cloud computing".

Explanation:

It is a type of technology that focusing on domain-specific resources rather than using dedicated servers or intelligent machines. All services are provided as well as used throughout the Network and per user are paid, and certain options were wrong which can be described as follows:

  • In option 1, it is used to describe the details, it doesn't store data.
  • In option 2, It is used in the organization.
  • In option 3, It is used for courts or legal documentations.
7 0
3 years ago
Which of the following is the language used to create content that is shown on the World Wide Web?
kondor19780726 [428]
Your answer is HTML. 
6 0
3 years ago
Read 2 more answers
Explain the concepts o f polymorphism, Encapsulation, Inheritance in detail with suitable examples?
levacccp [35]

Answer:

Encapsulation:-It is the binding of the data and functions so that they works as one unit.

Inheritance:-When one class acquires the property of another class it is called inheritance.

Polymorphism :-It generally means more than one form

Explanation:

Encapsulation:- class is an example of encapsulation it can hold different data types and functions in a single container called class.

class Name{

public:

string first_name;

string last_name;

void Display()

{

cout<<first_name<<" "<<last_name<<endl;

}

};

Inheritance:-The property of a class acquiring the properties of another class is called inheritance.

Now we will inherit the above defined class.

class person: public Name

{

public:

char gender;

int age;

void Display()

{

cout<<first_name<<" "<<last_name<<gender<<age<<endl;

}

};

int main()

{

Name n;

person p;

n.Display();

p.Display();

}

Polymorphism- There are two types of polymorphism:-

1.Run time polymorphism=The values are decided at run time.

2.Compile time polymorphism=The values are decided at compile time.

Example:-In the above example we have function Display() in both the classes.This is an example of compile-time polymorphism. We are deciding at the time of compilation which display to use.

8 0
3 years ago
Other questions:
  • How Java provides protection through stack inspection approach ?
    7·1 answer
  • Match terms in the first column with the order descriptions in column two.
    11·1 answer
  • Describe the difference between fuses and circuit breakers. where might each type of device find its best use? g
    10·1 answer
  • Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address r
    9·1 answer
  • The members of the IT department have spent two days debating the best approach to roll out the new software update. After allow
    15·1 answer
  • For any two documents x and z, define k(x, z) to equal the number of unique words that occur in both x and z (i.e., the size of
    15·1 answer
  • _____________________ denotes the use of human interactions to gain any kind of desired access. Most often, this term involves e
    11·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
  • Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!