abbreviated
Google Applicated
Security
100

The ability to interact with a computer strictly through text. Or known as: "C.L.I" 


Command Line Interface

100

 A free email application available to users who sign up for a Google account.

 

Gmail

100

what are the Security Policies:

Policies written by companies that outline things like security, access, user accounts, physical security, etc.

200

Microprocessor architecture that is primarily used in mobile devices to help improve the performance of the CPU. 

Or known as "A.R.M."

Advanced RISC Machine

200

 Google’s web-based word processor application.

Google Docs

200

Also known as multi-factor authentication or two-factor authentication, provides another way for users to protect their account by requiring a second level of authentication.


Second Factor Authentication:

300

 A Windows-specific interpreter that allows users to perform advanced administrative tasks.

Or known as: "C.M.D"

Command Prompt

300

Google’s cloud-based storage application to store and access files online.

Google Drive

400

 As the name implies, read-only memory is a type of non-volatile software and its code is strictly designed for reading purposes.

Or known as. "R.O.M"

Read-only Memory 

400

what is the Google Keep application?

Google’s web-based notepad application.

500

Microprocessor architecture designed to run a set of less complex instructions and enable better performance.

Or known as: "R.I.S.C."

Reduced Instruction Set Computing

500

Google’s online web store where users can download applications, movies, music, books, and shop for Google products.


Google Play