1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
6

Describe the 3 different types of authentication

Computers and Technology
2 answers:
Paha777 [63]3 years ago
7 0

research on Google and it tells you the answer

Alexandra [31]3 years ago
5 0
Type 1 – Something You Know: includes passwords, PINs, combinations, code words, or secret handshakes. Anything that you can remember and then type, say, do, perform, or otherwise recall when needed falls into this category.

Type 2 – Something You Have – includes all items that are physical objects, such as keys, phones, smart cards and USB drives devices

Type 3 – Something you are: includes any part of the human body that can be offered for verification, such as fingerprints, palm scanning, facial recognition, retina scans, iris scans, and voice verification.
You might be interested in
A Java main method uses the parameter (String[ ] variable) so that a user can run the program and supply "command-line" paramete
Firdavs [7]

Answer:

The answer is "Option a"

Explanation:

  • In java, the main function is the point of entry of every java program. Its syntax always starts "public static void main" with (String args[]), in which it can also be modified by the name of the string array name.
  • It also known as an entry point is the key process. In any program, it is the first method, that executes whenever you run a program. There is one main feature in a regular app that uses instances of certain classes to operate.
4 0
3 years ago
Which installation changes from the old information system to the new one incrementally, starting with one or a few functional c
Wewaii [24]

Answer:

Phased installation

Explanation:

The name of this strategy is phased installation. Phased installation (or phased implementation) occurs when an existing system is replaced by a new one. However, unlike most implementations, this takes place in stages. This has several advantages. First, it allows you to test the system. If there is a problem with it, it is easier to revert back to the old strategy. Moreover, if employees need to adopt this new system, it allows them to get used to it slowly while still being able to access the previous one.

5 0
3 years ago
Who wrote the first computer program after floppy disc and dos
s2008m [1.1K]

<em>Alan Shugart assigned David L. Noble to lead the development of "a reliable and inexpensive system for loading microcode into IBM System/370 mainframes" using a process called Initial Control Program Load (ICPL). </em>

7 0
3 years ago
Wtite a command to convert the points variable to any numerical data type (integer or float)
Paul [167]

Answer:

Strings can be converted to numbers by using the int() and float() methods. If your string does not have decimal places, you'll most likely want to convert it to an integer by using the int() method.

Explanation:

4 0
2 years ago
A computer's CPU and hard drive are found in the what?
Jobisdone [24]
A computer's CPU and hard drive are found in the D.system unit.
Hope this helps:)
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the purpose of lookup tables in spreadsheet software
    13·2 answers
  • What does this say:<br> √ans
    6·2 answers
  • Name any extension of MS word.
    8·2 answers
  • A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plan
    13·1 answer
  • You are the network administrator for a company with a single Active Directory domain. The corporate office is located in Miami
    5·1 answer
  • Matt expects to get his first paycheck today. What deductions may be listed on his paycheck stub?
    11·1 answer
  • Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra
    10·2 answers
  • High level language - An object oriented programming language​
    5·1 answer
  • Determine whether or not the following pairs of predicates are unifiable. If they are, give the most-general unifier and show th
    13·1 answer
  • Anyone here play osu! ?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!