An authentication process consists of two steps: identification step and __________ step.

Fill in the blank(s) with the appropriate word(s).

verification

Computer Science & Information Technology

You might also like to view...

In Access, ________ work together to store, search, input, report, and automate data

A) Presentations B) Documents C) Worksheets D) Objects

Computer Science & Information Technology

A file that contains organized data is called a data ________

A) merge B) file C) source D) master

Computer Science & Information Technology