loanyst4477 loanyst4477 24-04-2024 Computers and Technology contestada Which of the following solutions are used for authenticating a user to gain access to systems, applications, and data? a. Web camera b. None of the above c. Voice d. Digital certificates e. Headphone devices