Menu Close

What will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?

What will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?

A biometric device authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Which device is used to convert personal characteristics in to digital code?

A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.

What is the term for a program that performs a repetitive task on a network?

bot. program that performs a repetitive task on a network. botnet.

Which of the following is a program or set of instructions in a program that allows users to bypass security controls group of answer choices?

CH5 Cyber Security Vocab

A B
backdoor program or set of instructions in program that allows users to bypass security controls when accessing program
botnet group of compromised computers or devices connected to network that are used to attack other networks

What are the characteristics of digital computer?

A typical digital computer system has four basic functional elements: (1) input-output equipment, (2) main memory, (3) control unit, and (4) arithmetic-logic unit. Any of a number of devices is used to enter data and program instructions into a computer and to gain access to the results of the processing operation.

What is the term for a program that performs a repetitive task on a network quizlet?

Bot. A program that performs repetitive tasks on a network.

Is someone who accesses a computer or network illegally?

Unauthorized computer access, popularly referred to as hacking, describes a criminal action whereby someone uses a computer to knowingly gain access to data in a system without permission to access that data. Hacking is illegal under both California and federal law, and can result in heavy penalties.

What is an illegal act involving a computer?

Any illegal act involving the use of a computer or related devices generally is referred to as a crimeware.

Is a program that allows users to bypass security controls when accessing a program, computer or network?