1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
2 years ago
6

Describe the 3 different types of authentication

Computers and Technology
2 answers:
Paha777 [63]2 years ago
7 0

research on Google and it tells you the answer

Alexandra [31]2 years ago
5 0
Type 1 – Something You Know: includes passwords, PINs, combinations, code words, or secret handshakes. Anything that you can remember and then type, say, do, perform, or otherwise recall when needed falls into this category.

Type 2 – Something You Have – includes all items that are physical objects, such as keys, phones, smart cards and USB drives devices

Type 3 – Something you are: includes any part of the human body that can be offered for verification, such as fingerprints, palm scanning, facial recognition, retina scans, iris scans, and voice verification.
You might be interested in
Write a program that asks the user for three strings.
Varvara68 [4.7K]

Answer:

good luck djfjjdndnfjfjjfjfdsadd

5 0
2 years ago
Caracteristicas de los valores numericos en excel
Vilka [71]
Todos los libros de Excel están formados por hojas, cada una de las hojas contiene más de 17 mil millones de celdas y en cada una de esas celdas podremos almacenar nuestros datos. Por esta razón es importante conocer los tipos de datos que podemos ingresar en cada una de las  celdas de Excel


hope this help
6 0
2 years ago
We need goku and naruto fight story someone
lana [24]

Answer:

goku comes in and turns super sayain  naruto come in with kurama and naruto get goku with a rasagen and geku is still fist fightin while naruto is using his kurama and turns into kurama and knocks out goku now naruto thinks he won and goku IS HITIN HIM WITH A KAMEKAMEHA GOKU IS SIROUS NOW

Explanation:

8 0
2 years ago
Read 2 more answers
Source code is one particular representation of a software system. It highlights some details and hides others. This is a good e
grigory [225]

Answer:

Abstraction

Explanation:

Under fundamental principles of software engineering, the term "abstraction" is simply defined as the act of highlighting some details and hiding other ones.

Thus, the correct answer among the options is Abstraction.

8 0
2 years ago
Which characteristic describes the troposphere?
abruzzese [7]

Answer:

The answer is B: has the highest air pressure

I just took the quiz!

7 0
3 years ago
Other questions:
  • You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
    5·1 answer
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • The Receiver recognizes the sounds the Sender is making and transforms them into words and ideas in his own mind. What is this
    5·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • What is the name of the process that weighs the alternatives, gathers all necessary information, and can ultimately lead you to
    9·2 answers
  • Ian kno da answer tell me
    7·2 answers
  • With a heat exchanger, the temperature of the process fluid can be measured with a temperature-
    14·1 answer
  • Does anyone else have edge and think its not the awful?
    12·2 answers
  • A network of computers that provides access to information on the web.
    15·2 answers
  • Write the use of the Goto statement with the help of an example.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!