Table of Contents
- 1 What will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?
- 2 Which device is used to convert personal characteristics in to digital code?
- 3 What are the characteristics of digital computer?
- 4 What is the term for a program that performs a repetitive task on a network quizlet?
- 5 Is a program that allows users to bypass security controls when accessing a program, computer or network?
What will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?
A biometric device authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Which device is used to convert personal characteristics in to digital code?
A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.
What is the term for a program that performs a repetitive task on a network?
bot. program that performs a repetitive task on a network. botnet.
Which of the following is a program or set of instructions in a program that allows users to bypass security controls group of answer choices?
CH5 Cyber Security Vocab
A | B |
---|---|
backdoor | program or set of instructions in program that allows users to bypass security controls when accessing program |
botnet | group of compromised computers or devices connected to network that are used to attack other networks |
What are the characteristics of digital computer?
A typical digital computer system has four basic functional elements: (1) input-output equipment, (2) main memory, (3) control unit, and (4) arithmetic-logic unit. Any of a number of devices is used to enter data and program instructions into a computer and to gain access to the results of the processing operation.
What is the term for a program that performs a repetitive task on a network quizlet?
Bot. A program that performs repetitive tasks on a network.
Is someone who accesses a computer or network illegally?
Unauthorized computer access, popularly referred to as hacking, describes a criminal action whereby someone uses a computer to knowingly gain access to data in a system without permission to access that data. Hacking is illegal under both California and federal law, and can result in heavy penalties.
What is an illegal act involving a computer?
Any illegal act involving the use of a computer or related devices generally is referred to as a crimeware.