IT120 Midterm Review S25

12345678910111213141516171819202122232425262728293031323334353637
Across
  1. 3. touch-enabled interface for managing user and system settings in Windows
  2. 4. Linux command that allows a user to use the root account or execute commands restricted to privileged users
  3. 5. macOS disk encryption product
  4. 7. number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion
  5. 9. Linux command to view and combine files
  6. 12. protocol used to locate the hardware address of the interface that owns an IP address
  7. 14. macOS feature for managing applications from the desktop; similar to the Windows taskbar
  8. 17. software that implements input and output for a command shell
  9. 22. proprietary OS developed by Google to run on specific laptops and PC hardware
  10. 23. deployment method where the target disk is written with an image of the new OS
  11. 24. used to modify text size and cursor indicators
  12. 26. command-line tool used to navigate the directory structure
  13. 29. Linux command for managing the account owner for files and directories
  14. 30. OS setup method where the target disk is repartitioned and formatted, removing any existing OS and/or data files
  15. 31. secure tunnel created between two endpoints connected via an unsecure transport network
  16. 34. command often used to help troubleshoot issues with naming resolution
  17. 35. command used to trace the path a packet takes to its destination
  18. 37. database on a Windows system that holds settings for all aspects of the system
Down
  1. 1. power-saving state where the contents of memory are saved to hard disk and the computer is powered off
  2. 2. touch-enabled app for configuring features such as firewall and antivirus
  3. 4. Windows System Protection feature that allows the configuration to be reverted to a restore point
  4. 6. Windows tool that creates a comprehensive report about the system's hardware and software
  5. 8. allows you to run software and scripts according to calendar or event triggers
  6. 10. file system object representing a Windows computer and the disk drives install to it
  7. 11. command-line utility used to configure disk partitions
  8. 13. console for reporting and recording resource utilization via counter data for object instances
  9. 15. group of hosts that is within the same namespace and administered by the same authority
  10. 16. macOS data backup utility
  11. 18. product life-cycle phase where mainstream vendor support is no longer available
  12. 19. boot type that allows an administrator to image computers over the network
  13. 20. Windows utility for removing temporary files to reclaim disk space
  14. 21. interactive Linux command for monitoring process information
  15. 24. Windows console related to viewing and exporting events in the Windows logging file format
  16. 25. authentication technology that enables a user to authenticate once and receive authorization for multiple services
  17. 27. command-line file copy utility recommended for use over the older xcopy
  18. 28. Windows stop error
  19. 32. applet used to modify User Account Control (UAC)
  20. 33. basic security principle that something is only allocated the minimum necessary rights, privileges, or information to perform its role
  21. 36. cross-platform command toll for testing IP packet transmission