1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
12

Something the user knows (ID and password); something the user has (such as a smart card, which is a credit card device storing

info, or a token, a small electronic device that changes user passwords automatically); or something that is part of the user (such as biometrics, which identify the user based on physical characteristics such as a fingerprint or voice/face recognition
Computers and Technology
1 answer:
Vlad1618 [11]3 years ago
8 0

Answer:

Secure Authentication involves a combination of the following three information

Explanation:

Generally, it is important that users have access to secure sources of information or data. These data will be used by the users to get access to their platform such as account details. The user should also be the only person that has access to his or her vital information. This should not be disclosed to any other person.

You might be interested in
________ is an open-source program supported by the Apache Foundation that manages thousands of computers and implements MapRedu
coldgirl [10]

Answer:

Hadoop.

Explanation:

Apache Hadoop:- Supported by Apache foundation it is an open-source framework created for processing very large data sets.

Apache Hadoop consists of components including:

MapReduce for parallel processing.

(HDFS) Hadoop Distributed File System.

Yarn for cluster resource managementand job scheduling.

Common libraries needed by the other Hadoop subsystems.

5 0
3 years ago
Explain ,how the computer network reduces cost of operation? (don't copy from any website)​
melomori [17]

Answer:

Computer network reduces the operation cost as it allows to share software and hardware in the network.

4 0
3 years ago
When you identify the data elements in a new database, you typically subdivide data elements into?
DochEvi [55]
When you identify the data elements in a new database, you typically subdivide data elements into <span>the smallest practical component. 

Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
</span>
4 0
3 years ago
In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
azamat

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

4 0
3 years ago
Consider the packets exchanged in TCP connection setup between Host A and Host B. Assume that Host A's initial sequence number i
Rasek [7]

Answer:

I think that part C correct option

6 0
3 years ago
Other questions:
  • When creating a software package, the software must be designed, the code must be written, and then the code must be tested. Thi
    6·1 answer
  • Most programming languages provide loop statements that help users iteratively process code. In Coral you can write loops that h
    15·1 answer
  • Which finger types the return or enter key?
    6·2 answers
  • Tips for being confident and entertaining when presenting?
    6·1 answer
  • PLS ANSWER ASAP!
    9·1 answer
  • B) If you send me an email, then I will finish my program. If you do not send me an email, then I will go to sleep early. Theref
    10·1 answer
  • i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
    11·1 answer
  • Computers help eliminate the repetitiveness of manual tasks. How can this benefit you in your overall career?
    9·2 answers
  • Which computer component are you most like? Explain why.
    10·1 answer
  • T/F static development is the process of constructing the programs and code modules that serve as the building blocks of the inf
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!