Match the following terms to their meanings:

I. biometrics
II. firewall
III. proxy server
IV. password
V. username

A. code used to access resources
B. unique name on a network assigned to an authorized user
C. a program that blocks unwanted or unsafe data
D. body characteristics are used to access resources
E. a function of the gateway that hides IP addresses


D, C, E, A, B

Computer Science & Information Technology

You might also like to view...

An IMEI is a unique serial number given to any cell phone

Indicate whether the statement is true or false

Computer Science & Information Technology

Referring to the figure below, identify the letter of the choice that best matches the numbered area on the screen.

A. Visibility B. C. D. Clear E. Cursor F. Overflow G. Clip

Computer Science & Information Technology

How would you use a method that belongs to an object that is part of the array? Use an example and demonstrate with Java code.

What will be an ideal response?

Computer Science & Information Technology

When you embed fonts, the size of your presentation ____.

A. decreases B. increases C. remains the same D. doubles

Computer Science & Information Technology