Across
- 1. A device that is portable.
- 8. A cloud backup service on the Internet that backs up data to the cloud.
- 15. An outdated wireless technology that has been replaced by Bluetooth to connect devices.
- 17. A website by Apple used to sync content on Apple devices in order to provide a backup of content.
- 18. An app installed on a smartphone to provide multifactor authentication.
- 19. An operating system for mobile devices that is based on the Linux OS and supported by Google.
- 20. An account that accesses multiple independent resources, systems, or applications after signing in one time to one account.
- 21. A process that backs up and restores everything on a device to a previous state.
- 23. A newer USB charging port.
- 24. A process that backs up and restores individual files.
- 25. A process to break through the restrictions that only allow apps for an iOS device to be downloaded from the iTunes Store.
- 26. An email service provided by Google.
- 29. A smartphone developed by Apple.
- 30. A handheld tablet developed by Apple.
- 32. Makes it so that the device can neither transmit nor receive the signals.
- 33. A unique number that identifies a mobile phone or tablet device worldwide.
- 34. The process of obtaining root or administrator privileges to an Android device.
- 35. a short-range wireless technology to connect two devices in a small PAN.
- 36. The older USB charging port a size above miniUSB.
- 37. A list of preferred service providers or radio frequencies your carrier wants a mobile device to use.
- 38. The proprietary Apple connector used on Apple mobile devices for power and communication.
- 39. To authenticate to a network, computer, or other computing device by means of biometric data.
Down
- 1. The smaller USB charging port.
- 2. The point when the manufacturer of software or hardware stops providing updates or patches for its product.
- 3. Software by Apple installed on a Mac or Windows computer to sync an iPhone or iPad to iOS updates.
- 4. A set of policies and procedures that restrict how a user can access, create, and edit a organization’s resources.
- 5. A wireless technology that creates a connection between two NFC devices that are within 4 inches.
- 6. Information published by the manufacturer of an operating system that describes what to expect from a published update.
- 7. The use of more than one method to authenticate access.
- 9. An operation that remotely erases all data.
- 10. An email service provided by Microsoft that is hosted on Microsoft servers.
- 11. A source for downloading software that is considered reliable.
- 12. A set of policies and procedures that define how a users profile settings are configured for security purposes.
- 13. Storage space at that can be synced with files stored on any Apple device.
- 14. Source code for an operating system or other software that is available for free.
- 16. The operating system owned and developed by Apple and used for their various mobile devices.
- 22. A process that encrypts all the stored data on a device.
- 27. A protocol that encrypts an outgoing email message and includes a digital signature (there is a "/" in its name).
- 28. An app on a mobile device that can be used to locate a device.
- 31. A unique number that identifies a cellular subscription for a device or subscriber.
- 35. A corporate policy that allows employees or students to connect their own devices to the corporate network.