Complete Step 1 on page WD118.
The first part of Step 2 advises you to type the paper.
Instead of typing it, paste
the text below as “paste, keep text only.”
Continue with the rest of Step 2 (and the other steps).
Ensure that your
completed paper looks like the figures in the book.
In an attempt to protect personal data and information from online thieves, many organizations, such as financial
institutions or universities, that store sensitive or confidential items use a two-step verification process. With two-
step verification, a computer or mobile device uses two separate methods, one after the next, to verify the identity
of a user.
ATMs (automated teller machines) usually require a two-step verification. Users first insert their ATM card into the
ATM (Step 1) and then enter a PIN, or personal identification number, (Step 2) to access their bank account. If
someone steals these cards, the thief must enter the user’s PIN to access the account.
