Types of User Interfaces
Firewalls
Built in Features of ChromeOS
Firmware (Core Boot)
Authentication
100

A Windows-specific command-line shell used for advanced administrative tasks.

PowerShell (PSH)

100

A Linux-based tool for managing firewall rules.

iptables

100

Microprocessor architecture that is primarily used in mobile devices to help improve the performance of the CPU.

Advanced RISC Machine (arm)

100

One of three different channels available to Chrome users that allows more functionality with Chrome OS.

Developer Mode

200

A Windows-specific interpreter that allows users to perform advanced administrative tasks.

Command Prompt (CMD)

200

A network device that connects multiple devices within the same network which allows them to communicate with each other.

Switch

200

A process performed by a computer system to ensure the integrity of all onboard hardware components

Hardware Initialization

200

 A standard designed to grant users the ability to share information across multiple accounts with a third-party application or website

Oauth2

300

The ability to interact with a computer strictly through text.

Command Line Interface (CLI)

300

A network computing device that sends and receives data from the internet.

Router

300

A software interface between the operating system and the firmware. Succeeded by UEFI.

Basic Input/Output System (BIOS)

300

Also known as multi-factor authentication or two-factor authentication (2fa), provides another way for users to protect their account by requiring a second level of authentication.

Second Factor Authentication:

400

The ability to interact with icons, images, and applications on the computer.

Graphical User Interface (GUI

400

Policies written by companies that outline things like security, access, user accounts, physical security, etc

Security Policies

400

 A feature that can be enabled or disabled in the Google Drive settings menu, allowing for users to edit documents offline.

Offline Access

400

A software interface between the operating system and the firmware. Similar to BIOS.

Unified Extensible Firmware Interface (UEFI)

400

A protocol used to transfer data over the internet.

HyperText Transfer Protocol (HTTP)

500

A method that enables a user to interact with the computing device. In other words, the interface that allows users to efficiently operate computers.

User Interface (UI)

500

A security method used to block unauthorized access to a system or network.

Firewall

500

Features that are designed to assist people with disabilities.

Accessibility Feature

500

As the name implies, read-only memory is a type of non-volatile software and its code is strictly designed for reading purposes.

Read-Only Memory (ROM)

500

G Suite administrators can enforce advanced policies that help improve security.

Policy Enforcement

M
e
n
u