Chapter 1: lesson 14, lesson 13, lesson 15

Ace your homework & exams now with Quizwiz!

You can quickly access a program or storage location with which of the following?

A shortcut

An automated method of recognizing a person based on behavioral or physiological characteristics is called _____.

Biometrics

What is data encryption?

The process of encoding messages so they can only be viewed by authorized individuals

Which of the following is software that enables you to perform a specific function?

An application

Which of the following is the strongest password?

Hy%Bq&4$

What is the purpose of a terminal emulator software?

It creates a terminal interface to a mainframe system that runs within the regular operating system of a desktop computer.

Which software is used to process instructions and coordinate between devices?

Operating system

Consider the following line of text used in a command line interface: 'ls -1' What is the '-1' portion of this line of text called?

Option

Consider the following line of text used in a command line interface: 'cd /projects' What is the '/project' portion of this line of text called?

Parameter

Tisha is a UNIX programmer. Which of the following functions would require a different set of programming skills than what Tisha has to offer?

Running word processing and spreadsheet software applications.

Where do we find access to the tools we use on the computer?

The desktop

A computer interface where a user interacts with a computer system by typing in lines of text is called _____.

command line interface

Which of the following statement/s is relevant to hacking computer systems? i. It is about unauthorized access to a computer system. ii. Data obtained from a database is used for personal gain. iii. It is about protecting information on a computer system iv. It is about changing the hardware of a computer system

i and ii

When you delete files and shortcuts on your computer, they end up in the _____.

recycle bin

A firewall is a _____.

security system consisting of software and hardware between an internal network and the Internet


Related study sets

Module 3.3: Skewness,Kurtosis and Position

View Set

Chapter 16Lesson 3: Health Concerns and Issues

View Set