An authentication process consists of two steps: identification step and __________ step.
Fill in the blank(s) with the appropriate word(s).
verification
Computer Science & Information Technology
You might also like to view...
In Access, ________ work together to store, search, input, report, and automate data
A) Presentations B) Documents C) Worksheets D) Objects
Computer Science & Information Technology
A file that contains organized data is called a data ________
A) merge B) file C) source D) master
Computer Science & Information Technology