1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
6

Describe the 3 different types of authentication

Computers and Technology
2 answers:
Paha777 [63]3 years ago
7 0

research on Google and it tells you the answer

Alexandra [31]3 years ago
5 0
Type 1 – Something You Know: includes passwords, PINs, combinations, code words, or secret handshakes. Anything that you can remember and then type, say, do, perform, or otherwise recall when needed falls into this category.

Type 2 – Something You Have – includes all items that are physical objects, such as keys, phones, smart cards and USB drives devices

Type 3 – Something you are: includes any part of the human body that can be offered for verification, such as fingerprints, palm scanning, facial recognition, retina scans, iris scans, and voice verification.
You might be interested in
LAB: Convert to binary - methods
Georgia [21]

Answer:

import java.util.Scanner;

public class Lab{

  public static String integerToReverseBinary(int number)

  {

      String binary = "";

      if(number == 0){

          return "0";

      }

      while(number > 0)

      {

          int remainder = number % 2;

          number = number / 2;

          binary += Integer.toString(remainder);

      }

      return binary;

  }

 

  public static String reverseString(String wordString)

  {

      String binaryString = "";

      int length = wordString.length();

      for(int i = length -1 ; i >= 0 ; i--)

      {

          binaryString += wordString.charAt(i);

      }

      return binaryString;

  }

 

Explanation:

In the java source code, the Lab class is defined which has two methods, 'reverseString' and 'integerToReverseBinary'. The latter gets the argument from the former and reverses the content of its string value, then returns the new string value. The former gets the integer value and converts it to its binary equivalence for which are converted to strings and returned.

8 0
3 years ago
2. A well designed high-volume system will minimize _________ inventory and reduce _____________for the product or service. a) w
valina [46]

Answer:

A.

Explanation:

A well designed high-volume system will minimize work-in-process (WIP) inventory and reduce lead time for the product.

Work in process (WIP) are partially finished products. WIP inventory could be minimized by designing a suitable high-volume system.

Lead time or throughput time is the time taken for a product to be manufactured or processed. A well designed high-volume system would reduce throughput time.

7 0
3 years ago
<img src="https://tex.z-dn.net/?f=%28a%20%2B%20b%29%20%20%7B2%7D" id="TexFormula1" title="(a + b) {2}" alt="(a + b) {2}" align
MariettaO [177]

Answer:

ab2

Explanation:

3 0
3 years ago
When you right click a picture in a word processing program, which actions can you choose to perform on that image?
Juliette [100K]

1 - A

2 - B

I hope this helps!

8 0
3 years ago
What is a decision tree
tigry1 [53]
A decision tree is a diagram or chart that people use to determine a course of action or show a statistical probability.
5 0
3 years ago
Other questions:
  • Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
    12·1 answer
  • 4. A friend knows you are taking a technology class in college and asks you how a hard drive works. In your own words, describe
    6·1 answer
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • Differences between barcode reader and character recognition devices​
    9·2 answers
  • Are all tps dashboards
    15·1 answer
  • According to your text, three factors are responsible for the rapid rise in new product development. They are faster and more ec
    9·1 answer
  • To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
    7·1 answer
  • If you'd like to queue multiple exports and keep working on a different project in Premiere Pro, what method should you use?
    5·1 answer
  • As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After s
    12·1 answer
  • For which of the four game elements will you give a detailed description about the challenges that the player will face, such as
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!