1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
6

Password is an example of an authentication mechanisms that is based on " what an entity has".

Computers and Technology
2 answers:
Over [174]3 years ago
7 0

Answer:

False

Explanation:

A password in a one factor or multi-factor authentication is a mechanism not of what an entity has but what they know.

One factor authentication makes use of passwords only, to secure a user account. A multi-factor authentication uses two or more mechanisms for securing user accounts. It ask the question of what the users know (for password), what they have (security token, smart cards), and who they are(biometrics).

Alla [95]3 years ago
5 0

Answer:

False

Explanation:

The authentication mechanism especially the multi-factor authentication uses three types of authentication form factors.

i. What the entity knows: This includes what the entity knows and can always remember. Such as passwords and PINs

ii. What the entity has: This includes physical items that belong to the entity such as smart cards and token generators.

iii. What the entity really is: This includes natural or body features of the entity such as its thumbprint and its palm which can be used for verification.

According to these three factors, it is evident that password is based on "what an entity knows" and <u>not</u> "what an entity has".

You might be interested in
Which operating system is used by most the supercomputer system in the world
DENIUS [597]

Answer:

Linux

Explanation:

Linux runs all of the top 500 supercomputers

3 0
2 years ago
Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
elena-14-01-66 [18.8K]
  • Genres are used in Readers as well as writers.
  • By using genre patterns in writers it has been accepted by readers for accomplishing their purposes.
  • Genres allow both writers and readers to establish a working relationship between each other.
  • Both writers and readers are required for gamers and game publishers.
  • So Genres are very useful to them.
7 0
3 years ago
Describe computer as a source of communication.​
Andreas93 [3]

Answer:

Explanation:

Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. ... A sending device that initiates an instruction to transmit data, instructions, or information. A communications device that connects the sending device to a communications channel.

4 0
3 years ago
3
Yuki888 [10]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

There are some steps that you use to access the subtotal dialog box.

To access the Subtotal dialog box, you need to follow the following steps:

Click the Date tab

In the  Outline group, click Subtotal

to access the Subtotal dialog box.

The Subtotal function used in Excel and return the subtotal of the numbers in a column in a list or database. Subtotal is a builtin function in Excel that used to subtotal the number in a column or in a given database.

4 0
3 years ago
Read 2 more answers
Please don’t comment if you don’t know the answer.
abruzzese [7]

Answer:If your notebook computer battery does not power the notebook or will not hold a charge, troubleshoot the battery to see if it needs to be replaced. If the battery indicator LED, located near the power icon, does not glow or always blinks, there is a battery problem. Your computer might operate correctly when it is connected to the power adapter, but not when using battery power.

Explanation:

7 0
3 years ago
Other questions:
  • In JAVA, answer the following:
    15·1 answer
  • Being technologically literate requires being able to ______.
    11·2 answers
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
  • Please help ASAP, will mark brainliest!
    7·1 answer
  • Write a program that creates a Date object, sets its elapsed time to 10000, 100000, 1000000, 10000000, 100000000, 1000000000, 10
    9·1 answer
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem befo
    15·1 answer
  • What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?.
    15·1 answer
  • From Edmentum/Plato
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!