Chapter 1: lesson 14, lesson 13, lesson 15
You can quickly access a program or storage location with which of the following?
A shortcut
An automated method of recognizing a person based on behavioral or physiological characteristics is called _____.
Biometrics
What is data encryption?
The process of encoding messages so they can only be viewed by authorized individuals
Which of the following is software that enables you to perform a specific function?
An application
Which of the following is the strongest password?
Hy%Bq&4$
What is the purpose of a terminal emulator software?
It creates a terminal interface to a mainframe system that runs within the regular operating system of a desktop computer.
Which software is used to process instructions and coordinate between devices?
Operating system
Consider the following line of text used in a command line interface: 'ls -1' What is the '-1' portion of this line of text called?
Option
Consider the following line of text used in a command line interface: 'cd /projects' What is the '/project' portion of this line of text called?
Parameter
Tisha is a UNIX programmer. Which of the following functions would require a different set of programming skills than what Tisha has to offer?
Running word processing and spreadsheet software applications.
Where do we find access to the tools we use on the computer?
The desktop
A computer interface where a user interacts with a computer system by typing in lines of text is called _____.
command line interface
Which of the following statement/s is relevant to hacking computer systems? i. It is about unauthorized access to a computer system. ii. Data obtained from a database is used for personal gain. iii. It is about protecting information on a computer system iv. It is about changing the hardware of a computer system
i and ii
When you delete files and shortcuts on your computer, they end up in the _____.
recycle bin
A firewall is a _____.
security system consisting of software and hardware between an internal network and the Internet