Java Games: Flashcards, matching, concentration, and word search.

CBIS 108 - Chapter 5 - User Management

Play the following games as a way of reviewing important terms for this chapter. Take a screenshot of your highest grade and paste it into your Google Docs.

AB
administrator accountThe type of user account that is made a member of the Administrators local group and has full rights to the system.
biometric authenticationAuthentication that is based on physical characteristics of the user such as a finger print or facial recognition.
default profileThe profile that is copied when new user profiles are created.
domain based networkA network where security information is stored centrally in Active Directory.
fast user switchingAllows multiple users to have applications running at the same time. However, only one user can be using the console at a time.
guest accountA built-in Windows 10 account with minimal privileges intended to give very limited access to Windows 10
local user accountA user account that is defined in the SAM database of a Windows 10 computer. Local user accounts are valid only for the local computer
ntuser.datThe file containing user-specific registry entries in a user profile.
pass-through authenticationAutomatic authentication to a remote resource when the local computer passes the local credentials to the remote computer.
peer-to-peer networkA network where all computers store their own security information and share data.
public profileA profile that is merged with all other user profiles.
roaming profileA user profile that is stored in a network location and is accessible from multiple computers. Roaming profiles move with users from computer to computer.
Security Accounts Manager (SAM) databaseThe database used by Windows 10 to store local user and group information.
user profileA collection of desktop and environment configurations for a specific user or group of users. By default, each user has a separate profile stored in C:\Users.
trusted platform module (TPM)A chip on the motherboard of a computer that is designed to securely store encryption keys and certificates.
pin authenticationAn authentication method where you enter a device specific PIN rather than a user name and password.
picture password authenticationAn authentication method where you trace gestures on a picture.


Associate Professor
Allan Hancock College
Santa Maria, CA

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities