Which of the following is NOT among the three types of authentication mechanisms?

A. something a person knows
B. something a person has
C. something a person says
D. something a person can produce


Answer: C

Computer Science & Information Technology

You might also like to view...

Public key cryptography is so-named because:

a. It is highly popular b. Its use is not restricted by patents c. It utilizes an open source encryption algorithm d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public

Computer Science & Information Technology

Which statement is false?

a. Unless directed otherwise, the computer executes Java statements one after the other in the order in which they're written. b. Activity diagrams normally show the Java code that implements the activity. c. Like pseudocode, activity diagrams help programmers develop and represent algorithms. d. The arrows in

Computer Science & Information Technology

________ can be added only in Design view

A) Fields B) Tables C) Data D) Sections

Computer Science & Information Technology

The ________ button allows you to move a paragraph to a lower level

Fill in the blank(s) with correct word

Computer Science & Information Technology