Chapter 12

123456789101112131415161718192021222324252627282930
Across
  1. 3. A proprietary operating system written in the C programming language.
  2. 6. Developer chooses not to publish the source code
  3. 9. Use to change user's password at the terminal
  4. 10. In iOS, it shows suggestions from many sources including Internet, App Store, movie show times, and nearby locations
  5. 12. Fix security problems or issues with hardware and software
  6. 14. The goal is to anticipate disk failure, allowing user to move the data to a healthy disk before the failing disk becomes inaccessible
  7. 16. Used on Android devices to gain privileged access for modifying code or installing software that is not intended for the device
  8. 19. Android apps run in a _______ and have only the privileges enabled by the user
  9. 21. Deletes all data from the device and returns it to a factory state
  10. 22. Use to change the owner and the group of a file or files
  11. 25. Used on iOS devices to remove manufacturer restrictions, allow running of arbitrary user-code, and grant full access to the file system
  12. 26. Configures the data rates between the device and the cell tower. Enable device to communicate with the tower at the correct rate
  13. 27. Used mostly for payments of good or services by waving the phone near the payment system
  14. 28. Configuration information that a cellular phone needs to communicate on networks other than its own
  15. 30. A sensor in the device that detects how it is being held and will change the screen orientation appropriately
Down
  1. 1. Responsible for allocating CPU time and memory to processes and manages the file system and communications in response to system calls
  2. 2. Operating system for Macintosh computers
  3. 4. Use to set and view their wireless settings
  4. 5. Developer chooses to provide the source code
  5. 7. Use to grant user root access without actually changing their profile
  6. 8. Use to install and manage software on Debian based Linux distributions
  7. 11. Third-party or custom programs are installed directly using an ______
  8. 13. Use to change the permissions of files that they own
  9. 15. Data on device is copied to the cloud storage using a backup app
  10. 17. Similar to the Windows ipconfig command
  11. 18. A navigation system that determines geolocation of the device through communication with the satellites
  12. 20. Interprets the commands from the keyboard and passes them to the operating system
  13. 23. A private network that uses a public network (usually internet) to connect remote sites or users together
  14. 24. Used in embedded-systems, wearable devices, smartwatches, cellphones, netbooks, PCs, servers and super computers
  15. 29. Allows user to lock the device with a passcode, so others cannot gain access to the data in the device