goodnoodle4558 goodnoodle4558 21-03-2024 Computers and Technology contestada What policies are promoted by requiring authentication and description in the case of a nonpossessory security interest, and why are those requirements dispensed with in the case of a possessory security interest?