jordantotten9912 jordantotten9912 13-01-2022 Computers and Technology contestada Which technology can be implemented as part of an authentication system to verify the identification of employees?