Operating Systems and Security
Across
- 3. - Google's mobile operating system used on smartphones, tablets, and wearable devices.
- 5. - To convert information into a code to prevent unauthorized access.
- 9. - Security vulnerability that prompts software companies to release emergency updates.
- 10. - System privilege that should only be granted to employees who require it.
- 11. - File system capability that tracks changes before execution to prevent data loss.
- 13. - The method by which users communicate and control their computer system.
- 18. - Microsoft's advanced file system that replaced the older FAT32 format for better performance
- 20. - Social media account settings that should be set to private for better security.
- 21. - Personal verification process needed before accepting social media friend requests.
Down
- 1. - File identifiers like .jpg or .docx that indicate the file type and format. FIRMWARE - Software that directly controls specific hardware devices connected to a computer system
- 2. - Internet software that should prioritize security features over convenience.
- 4. - System resource that the operating system must efficiently allocate to running programs.
- 6. - File system feature that reduces storage space but increases file opening time.
- 7. - Software program that may request excessive permissions to access personal data.
- 8. - Digital service that stores instant messages on their servers permanently.
- 12. - Computer environment that requires hard drive encryption and screen locking for security.
- 14. - Data collection practice that privacy-focused search engines avoid doing.
- 15. - A secret combination of characters used to authenticate a user’s identity.
- 16. - Internet software that should prioritize security features over convenience.
- 17. - Small data files stored by websites to remember user preferences and track activity.
- 19. - Security feature that only allows approved websites and applications to run.