IT Crossword puzzle 2

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 1. A device that is portable.
  2. 8. A cloud backup service on the Internet that backs up data to the cloud.
  3. 15. An outdated wireless technology that has been replaced by Bluetooth to connect devices.
  4. 17. A website by Apple used to sync content on Apple devices in order to provide a backup of content.
  5. 18. An app installed on a smartphone to provide multifactor authentication.
  6. 19. An operating system for mobile devices that is based on the Linux OS and supported by Google.
  7. 20. An account that accesses multiple independent resources, systems, or applications after signing in one time to one account.
  8. 21. A process that backs up and restores everything on a device to a previous state.
  9. 23. A newer USB charging port.
  10. 24. A process that backs up and restores individual files.
  11. 25. A process to break through the restrictions that only allow apps for an iOS device to be downloaded from the iTunes Store.
  12. 26. An email service provided by Google.
  13. 29. A smartphone developed by Apple.
  14. 30. A handheld tablet developed by Apple.
  15. 32. Makes it so that the device can neither transmit nor receive the signals.
  16. 33. A unique number that identifies a mobile phone or tablet device worldwide.
  17. 34. The process of obtaining root or administrator privileges to an Android device.
  18. 35. a short-range wireless technology to connect two devices in a small PAN.
  19. 36. The older USB charging port a size above miniUSB.
  20. 37. A list of preferred service providers or radio frequencies your carrier wants a mobile device to use.
  21. 38. The proprietary Apple connector used on Apple mobile devices for power and communication.
  22. 39. To authenticate to a network, computer, or other computing device by means of biometric data.
Down
  1. 1. The smaller USB charging port.
  2. 2. The point when the manufacturer of software or hardware stops providing updates or patches for its product.
  3. 3. Software by Apple installed on a Mac or Windows computer to sync an iPhone or iPad to iOS updates.
  4. 4. A set of policies and procedures that restrict how a user can access, create, and edit a organization’s resources.
  5. 5. A wireless technology that creates a connection between two NFC devices that are within 4 inches.
  6. 6. Information published by the manufacturer of an operating system that describes what to expect from a published update.
  7. 7. The use of more than one method to authenticate access.
  8. 9. An operation that remotely erases all data.
  9. 10. An email service provided by Microsoft that is hosted on Microsoft servers.
  10. 11. A source for downloading software that is considered reliable.
  11. 12. A set of policies and procedures that define how a users profile settings are configured for security purposes.
  12. 13. Storage space at that can be synced with files stored on any Apple device.
  13. 14. Source code for an operating system or other software that is available for free.
  14. 16. The operating system owned and developed by Apple and used for their various mobile devices.
  15. 22. A process that encrypts all the stored data on a device.
  16. 27. A protocol that encrypts an outgoing email message and includes a digital signature (there is a "/" in its name).
  17. 28. An app on a mobile device that can be used to locate a device.
  18. 31. A unique number that identifies a cellular subscription for a device or subscriber.
  19. 35. A corporate policy that allows employees or students to connect their own devices to the corporate network.