What is Authentication?
Process where one must verify their identity.
Encryption
Translates data into a code that can only be deciphered by authorized sources.
Local Storage
Files saved on the computer rather than on the cloud.
Second Factor Authentication
Provides a second layer requirement for authentication, increasing security.
User Interface (UI)
Allows the user to interact with the device.
Command Line Interface (CLI)
Interact with the computer through text.
Firewall
Block unauthorized sources into a system or network.
Hardware Initialization
Process done to ensure the integrity of all onboard hardware sources.
System on a Chip (SoC)
Fully functional system on a integrated circuit.
Command Prompt (CMD)
Allows users to perform advanced Administration tasks.
Crosh
Shell environment Uniquely available to Chrome OS.
Firmware
Software in read-only memory in which provides functionality between the hardware and software.
Read-Only Memory (ROM)
Read only memory, non volatile software, meant for reading purpose only.
Reduced Instruction Set Computing (RISC)
Run less complex instruction, enabling a better performance.
Basic Input/Output System (BIOS)
Software interface between the operating system and the firmware.
Graphical User Interface (GUI)
Oauth2
Allows users to share information across multiple accounts through a third party.
Unified Extensible Firmware Interface (UEFI)
Software Interface between the operating system and the firmware. Similar to BIOS.