Explain two types of authentications that you must use when you need to access your workplace or university.  One when you access or authenticate your presence in the physical workplace environment and one when you access their systems. Justify why these authentication types are suitable and suggest any possible improvements.

Do you need help with your assignment?

An image as a link: W3Schools