1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
2 years ago
5

What are three ways digital identity is created and kept up? (open answer)

Computers and Technology
1 answer:
Anna007 [38]2 years ago
6 0

Answer:

Capture attributes as ID documents or biometric data

Explanation:

Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.

Great day :) toodles

You might be interested in
Hey friends,<br><br> What is a IT form?<br><br> thanks
ziro4ka [17]

Hi buddy, an IT form is for people who are applying at a TECH college.

Love u <3

Hope this helps

8 0
3 years ago
What is ransomware<br>я​
Novosadov [1.4K]

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

5 0
2 years ago
Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).
kenny6666 [7]
This is big sorry I can’t do it
6 0
2 years ago
1. Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard netwo
arsen [322]

Answer:

A. router

Explanation:

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. The standard networking device Isabella would recommend is router.

3 0
3 years ago
When making an assembly of design what command is most.commonly used?
Schach [20]
There are two common command lines used in creating design assembly. The 'push' and 'pull' command. Both allows you to get parts from the original predelivered content's source desgian    and recreate the design faster and with less memory.
6 0
2 years ago
Other questions:
  • Which of the following is true about REST?
    12·1 answer
  • At the moment i am tackling the cs50x projects and i need a little bit of help with problem set 1, the 'greedy algorithm'. I am
    5·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • Miguel owns a tile business. He has two employees who work in a small office. One answers phones and schedules appointments. Ano
    11·2 answers
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • What sorts of changes have you been observing in your society in your society in comparison in last 3 years​
    13·1 answer
  • The Operating System is used to locate, move, and copy files.
    10·1 answer
  • What are acenders? What are decenders?
    10·2 answers
  • Help plz. due yesterday
    13·1 answer
  • Software that converts program written in other language into machine language​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!