Answer:
Possessed objects
Step-by-step explanation:
Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;
i. smart cards
ii. driver's license
iii. id cards
iv. smart keys
v. smart watches.
Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).