1-12
13-26
27-37
37-44
Bonus
100

What is Authentication?

Process where one must verify their identity.

100

Encryption

Translates data into a code that can only be deciphered by authorized sources.

100

Local Storage

Files saved on the computer rather than on the cloud.

100

Second Factor Authentication

Provides a second layer requirement for authentication, increasing security.

100

User Interface (UI)

Allows the user to interact with the device.

200

Command Line Interface (CLI)

Interact with the computer through text.

200

Firewall

Block unauthorized sources into a system or network.

200

Hardware Initialization

Process done to ensure the integrity of all onboard hardware sources.

200

System on a Chip (SoC)

Fully functional system on a integrated circuit.

200

Command Prompt (CMD)

Allows users to perform advanced Administration tasks.

300

Crosh

Shell environment Uniquely available to Chrome OS.

300

Firmware

Software in read-only memory in which provides functionality between the hardware and software.

300

Read-Only Memory (ROM)

Read only memory, non volatile software, meant for reading purpose only.

300

Reduced Instruction Set Computing (RISC)

Run less complex instruction, enabling a better performance.

400

Basic Input/Output System (BIOS)

Software interface between the operating system and the firmware.

400

Graphical User Interface (GUI)

The ability to interact with icons, images, and applications.
400

Oauth2

Allows users to share information across multiple accounts through a third party. 

400

Unified Extensible Firmware Interface (UEFI)

Software Interface between the operating system and the firmware. Similar to BIOS.

M
e
n
u