Period 3 Chapter 12 - Aguilar G Moises

123456789101112131415161718192021222324252627282930313233
Across
  1. 1. Find a mobile device that has been lost or stolen.
  2. 4. scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware
  3. 12. Software that is created for free use by everyone
  4. 13. Remotely lock an iOS device using a passcode
  5. 14. Are built into the file system structure and provide a mechanism to define permission to every file and directory.
  6. 17. OS updates released periodically by OS vendor to address new known vulnerabilities.
  7. 18. a family of free and open-source software operating systems based on an operating system kernel
  8. 23. communicated with through the shell, responsible for allocating CPU time and memory to processes, manages file system and communications in response to system calls
  9. 24. a method of offsite data storage in which files, folders, or the entire contents of a hard drive are regularly backed up on a remote server or computer with a network connection. Helpful if main servers hardware are destroyed or attacked.
  10. 25. Configures the data rates between the device and the cell tower. This ensures that the device is able to communicate with the tower at the correct rate.
  11. 26. Changes the owner of a file
  12. 27. copies files from source to a destination.
  13. 28. Proprietary OS written in C programming language, macOS an iOS based on it.
  14. 30. Source for downloading Android Apps
  15. 31. Contains sample of code used by viruses and malware.
  16. 32. directly install applications without going through the storefront interface
Down
  1. 2. Requires that a four or six-digit numeric code be entered to unlock the mobile device.
  2. 3. Detects how devices is being held hand and flip screen accordingly.
  3. 5. Biometric screen lock can unlock a device by scanning the users fingerprint.
  4. 6. Software that is permanently stored in a chip (such as the BIOS on a motherboard).
  5. 7. Used only on Android devices to gain privileged or root level access for modifying code or installing software that is not intended for the device.
  6. 8. an open source, Linux based smartphone/tablet operating system
  7. 9. Runs command as another user
  8. 10. any proprietary software licensed under exclusive legal right of the copyright holder.
  9. 11. remotely controls smart phones and tablets, ensuring data security.
  10. 15. When a device copies its data to cloud storage using a backup app. If data needs to be restored, run the backup app and access the website to retrieve the data.
  11. 16. Shutsdown the system
  12. 19. a file hosting service and synchronization service operated by Microsoft.
  13. 20. GPS services allow apps vendors and websites to know the location of the devices for location-specific services.
  14. 21. OS updates released periodically by OS vendor to address new known vulnerabilities
  15. 22. needs line of sight to satellites, uses at least 4
  16. 29. A program included on Mac OS, much like the command line interface on Windows, which can be used to run Unix commands within the Mac OS or to access other machines.
  17. 33. closed source Unix based OS, 2007