A Windows-specific command-line shell used for advanced administrative tasks.
PowerShell (PSH)
A Linux-based tool for managing firewall rules.
iptables
Microprocessor architecture that is primarily used in mobile devices to help improve the performance of the CPU.
Advanced RISC Machine (arm)
One of three different channels available to Chrome users that allows more functionality with Chrome OS.
Developer Mode
A Windows-specific interpreter that allows users to perform advanced administrative tasks.
Command Prompt (CMD)
A network device that connects multiple devices within the same network which allows them to communicate with each other.
Switch
A process performed by a computer system to ensure the integrity of all onboard hardware components
Hardware Initialization
A standard designed to grant users the ability to share information across multiple accounts with a third-party application or website
Oauth2
The ability to interact with a computer strictly through text.
Command Line Interface (CLI)
A network computing device that sends and receives data from the internet.
Router
A software interface between the operating system and the firmware. Succeeded by UEFI.
Basic Input/Output System (BIOS)
Also known as multi-factor authentication or two-factor authentication (2fa), provides another way for users to protect their account by requiring a second level of authentication.
Second Factor Authentication:
The ability to interact with icons, images, and applications on the computer.
Graphical User Interface (GUI
Policies written by companies that outline things like security, access, user accounts, physical security, etc
Security Policies
A feature that can be enabled or disabled in the Google Drive settings menu, allowing for users to edit documents offline.
Offline Access
A software interface between the operating system and the firmware. Similar to BIOS.
Unified Extensible Firmware Interface (UEFI)
A protocol used to transfer data over the internet.
HyperText Transfer Protocol (HTTP)
A method that enables a user to interact with the computing device. In other words, the interface that allows users to efficiently operate computers.
User Interface (UI)
A security method used to block unauthorized access to a system or network.
Firewall
Features that are designed to assist people with disabilities.
Accessibility Feature
As the name implies, read-only memory is a type of non-volatile software and its code is strictly designed for reading purposes.
Read-Only Memory (ROM)
G Suite administrators can enforce advanced policies that help improve security.
Policy Enforcement