1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
11

Which of the following is a category of authentication tools. A something you have B something u see c something you hear d some

thing you want
Computers and Technology
2 answers:
ipn [44]3 years ago
8 0

Answer:

something you have

Explanation:

Alja [10]3 years ago
5 0

Answer:

Explanation:

Something you have.

You might be interested in
Which of these is outside the scope of an art director's responsibility?
Morgarella [4.7K]

Answer: telling the animators that an entire scene must be reworked

Explanation:

4 0
3 years ago
Read 2 more answers
Which rotation speed is not a typical spindle rotation speed for magnetic hard drives?3100; 5400; 7200; 10000
Hitman42 [59]

Answer:

5,400 because it turns at the right speed, but if it is too fast or too slow, it will not perform at it's fullest potential. Such as speed and storage.

3 0
3 years ago
How I can learn writing code?
slavikrds [6]

A good website to learn coding is called Lynda.com. It costs money but its well worth it!

3 0
2 years ago
Read 2 more answers
During prereading, it is not important to pay attention to visual aids. please select the best answer from the choices provided
Nadusha1986 [10]
True Because the visual aids will provide better hand to eye coordination
7 0
1 year ago
What Are the Various Broadband Internet Connections? *​
ra1l [238]

Answer:

This is your answer

4 0
3 years ago
Read 2 more answers
Other questions:
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • The item that is clicked in a JList can be retrieved using the _____ method of JList.
    8·1 answer
  • Types of operating systems
    5·2 answers
  • Please answer this a due tomorrow!!!
    5·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • The space where text and content is entered and positioned for onscreen reading or printing
    8·1 answer
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
  • What is the core function of an enterprise platform
    12·2 answers
  • TRUE OR FALSE:
    6·1 answer
  • One of 34 possible _________________ can be assigned to each axis of classification in the seven-character code.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!