What are the four assurance methods? Give examples of each.

What will be an ideal response?


The four different assurance methods are as follows:
* Something you have: A smart card, an ATM card, or hardware token
* Something you know: A user ID, a password, or PIN
* Something you are: A part of the body such as a thumbprint, handprint, or retinal scan
* Something you do: Your handwriting or your speaking voice

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) People prefer to manipulate bits instead of characters and fields because bits are more compact. 2) People specify programs and data items as characters; computers then manipulate and process these characters as groups of zeros and ones. 3) Most organizations store all information in a single file to facilitate computer processing. 4) Each statement that processes a file in a Python program explicitly refers to that file by name. 5) Python imposes no structure on a file.

Computer Science & Information Technology

The notification area on a mobile device contains icons such as battery life, wireless signal strength, time, or external media connectivity

Indicate whether the statement is true or false

Computer Science & Information Technology

A  form that contains the values that a user previously entered in the form is called a ____ form.

A. pre-populated B. free form C. redisplayed D. sticky

Computer Science & Information Technology

You can control the number of digits displayed by the browser using thetoFixed()method.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology