Operating System

1:

The most common approach to authenticating a user identity is

A.

user passwords

B.

user log in

C.

hardware device

D.

none of these

 

Answer : A

Explanation :

Write your comments here:


Report Error
 

Option: A

Explanation : Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here.