1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
5

What are three ways digital identity is created and kept up? (open answer)

Computers and Technology
1 answer:
Anna007 [38]3 years ago
6 0

Answer:

Capture attributes as ID documents or biometric data

Explanation:

Examples of such attributes include biometrics, verified identification documents, and third-party verification procedures. To create a trusted digital ID, there are typically three steps: capturing verified attributes, verification of the documents, and digitization of the ID.

Great day :) toodles

You might be interested in
For your biology class, you will be giving a presentation of the findings of a plant growth experiment. Which application is bes
ICE Princess25 [194]

Answer: Powerpoint

Explanation: Easy to give graphs and add pictures. You can also add shapes to create a bar graph if needed.

6 0
3 years ago
Though there are no specific federal laws for cyberbullying, in some cases cyberbullying
inessss [21]
Cyberbullying overlaps with discriminatory harassment
7 0
3 years ago
A certain computer can be equipped with 268,435,456 bytes of memory. Why would a manufacturer choose such a peculiar number inst
Arte-miy333 [17]

Answer:

Computer system use Binary and it uses power of 2 only.

Explanation:

The reasons for equipping memory with a peculiar number instead of round or even number are as follows:

  • The computer system uses the power of 2 instead of the power of 10 to equipping memory and hence use a number like 250,000,000 is not possible.
  • The computer systems work on the memory where 1 MB or 1 megabyte shows as 1024 kb or 1,048,576 bytes.
  • In computer system memory capacity is always some multiply of 1024 bytes.
  • Hence, 268,435,456 bytes of memory shows 256 MB of memory.

5 0
4 years ago
What is the function of the command prompt?
yan [13]
The answer is B cause you use it to make commands
6 0
3 years ago
Lynn wants to share parts of an essay she wrote in her slide presentation
fgiga [73]

Answer:

no

Explanation:

No she should not  because it might be for a test

6 0
2 years ago
Other questions:
  • One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o
    13·1 answer
  • 11) Write the definition for a child class of Circle named Cylinder. The cylinder should have a double attribute named height. T
    12·1 answer
  • What are some of the good effects of social media
    7·1 answer
  • Will a pair of bar magnet ,with keepers on the two ends, act as a magnet
    13·1 answer
  • When there is a limited amount of a product, such as rare art or collectible
    13·1 answer
  • Universal Containers has a requirement to integrate Salesforce with an external system to control record access. What option sho
    11·1 answer
  • What is the difference between packet filtering and a proxy server?
    11·1 answer
  • Which of the following things could you do in order to tell if a pair of colors has strong contrast? A. Look at the colors on th
    12·1 answer
  • What is the action take to the input called?
    15·1 answer
  • List how much hard disk capacity you recommend, and write a sentence explaining why.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!