Respuesta :

Answer:

Possessed objects

Explanation:

Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;

i. smart cards

ii. driver's license

iii. id cards

iv. smart keys

v. smart watches.

Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).

ACCESS MORE
EDU ACCESS