Where can users purchase wallpapers, apps and more?
The Chrome Web Store
The settings menu can be accessed by a point by clicking the gear at the bottom right of the screen
Chromebook settings
What gives a user the ability to interact with a computer strictly through text?
Command Line Interface
A security method used to block unauthorized access to a network or network
Firewall
The ability to interact with apps, icons and files on the computer
GUI, graphical user interface
What is a free email application that users get access to when they sign up with Google?
Gmail!
Feature designated to help people with disabilities
Accessibility feature
The method used to reverse the effects of an encrypted file
Decrypt
Known as 2FA, provides a second sense of security for users accounts.
2 factor authentication
A graphical interface that allows users to manage directories and files saved to the computer
File Manager
Whats Google web-based word processor application?
Google Docs!
A tool that is unique to Chrome OS, accesses a shell environment and can be accessed using ctrl+alt+t
Crosh
One of the three different channels available to Chrome users that allows more functionality with Chrome OS
Developer Mode
A certain thing that would be written by companies about security and highlighting physical security as well as online security for the company and it's users
Security policies
A method that enables a user to interact with the computing devi e. In other words, the interface that allows users to efficiently operate computers
User Interface (UI)
What is googles cloud based storage system?
Google Drive
A graphical interface that can be used to access saved files and directories saved on the computer
File manager
A software interface between the operating system and the firmware. Similar to BIOS
Unified extensible firmware interface (UEFI)
G force admins can implement advanced policies that can improve security
Policy enforcement
A Linux based tool for managing firewall rules
Iptables
What is Googles web based notepad application?
Google Keep
A windows specific command line shell used for advanced administrative tasks
Powershell (PSH)
Tranates coding into a type of code (encoding) that only allows authorized sources to decipher the code into readable text with an authorization (security) key
Encryption
Source code written in a computers firmware that verifies the boot sequence in order to successfully proceed
Verified boot
User accounts are created to manage the users that have access to certain computers or resources
User account