Which of the following is an example of authentication using something Jane, a user, has and something she knows?

A. GSM phone card and PIN
B. Username and password
C. Username and PIN
D. Fingerprint scan and signature


Answer: A. GSM phone card and PIN

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a benefit of avoiding redundancy in a database?

A) Reduces errors when recording new data B) User doesn't have to remember where data is stored C) Conserves space D) Prevents unauthorized manipulation of data

Computer Science & Information Technology

Instead of appending one array to another, you can merge two or more arrays with the ____________________  function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How may batch processing be used to improve operational efficiency?

What will be an ideal response?

Computer Science & Information Technology

Press the ____________________ key to select multiple contiguous layers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology