Period 4 Chapter 12 - Lewis, E

1234567891011121314151617181920212223242526272829303132
Across
  1. 1. This command simulates a login as another user or to become a super-user.
  2. 2. A popular boot manager used on Linux operating systems.
  3. 3. This command copies files from source to destination.
  4. 5. This command allows you run commands as another user.
  5. 6. a private network established through a public network to remote sites.
  6. 9. Software providing low-level functionality for a device.
  7. 11. This command creates a directory under the current directory.
  8. 13. This command displays the files inside a directory.
  9. 15. A proprietary operating system written in the C programming language.
  10. 17. A file hosting service provided by Microsoft.
  11. 19. A cloud service provided by Apple.
  12. 20. A family of free and open-source software operating systems.
  13. 22. This contains sample of code used by viruses and malware.
  14. 23. This command lists the processes currently running in the system.
  15. 26. OS updates released periodically by the OS vendor to address new known vulnerabilities.
  16. 28. A location of the OS that keeps code isolated from other resources and other code.
  17. 32. The security credentials manager for macOS.
Down
  1. 1. This command shuts down the system.
  2. 2. A navigation system that finds the time and location of a device with satellites.
  3. 4. Programs that are executed on mobile devices.
  4. 7. This command sends a signal to a process.
  5. 8. A service that can be used to schedule tasks on Linux and macOS.
  6. 10. This command changes a user's password.
  7. 12. An open source, independently developed operating system.
  8. 14. The virtual assistant of an iOS device.
  9. 16. This command moves files or directories.
  10. 18. Use this to delete all data on an Android device and return it into a factory state.
  11. 19. This application stores iOS backups on a local PC.
  12. 21. Closed-source OS developed by apple.
  13. 24. A method of exploiting vulnerabilities on an iOS.
  14. 25. A method used on android devices to gain privileged or root level access for modifying code or installing software not meant for the device.
  15. 27. This command modifies the file and directory permissions.
  16. 29. This command copies data from an input to an output.
  17. 30. Use this to remotely lock an Android device using a passcode.
  18. 31. This command changes the ownership of a file.