Question: 1 Which computer terms (used in this chapter] are being described below? a a user is granted access only after successfully presenting two pieces of

1 Which computer terms (used in this chapter] are being described below?

a a user is granted access only after successfully presenting two pieces of evidence to verify or identify who they are b uses a cache to speed up access to web pages from a website c controls that are used on social networks and other websites to allow users to limit who can access data from their stored profile d protocol that is used to allow data to be sent securely over a network, such as the internet e software or hardware that sits between a computer and an external network which monitors and filters out all incoming and outgoing traffic f supplies domain names for internet hosts and is used to find IP addresses of domain names g use of unique human characteristics to identify a user as a form of authentication h made up of three types of identification:
- something you know - something you have - something you are i manipulation of people into breaking normal security procedures and best practices to gain illegal access to a user's computer system j malicious code stored on a user's hard drive or web server used to redirect a browser to a fake website without their knowledge

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Cambridge IGCSE Computer Science Coursebook Questions!