The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:
A. you need.
B. non-trivial
C. you are.
D. you can get.
A. you need.
B. non-trivial
C. you are.
D. you can get.