1 | 14 | 18 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | 6 | ||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
12/13 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. A wireless technology standard used for short-range communication between devices.
2. Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.
3. The process of verifying the identity of a user or system.
4. A very short-range wireless technology that enables communication between devices by bringing them close together.
5. A local area network that provides network connectivity to devices within a limited area.
6. The ability for a mobile device to maintain connectivity while moving between different wireless networks or cells.
7. The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats.
8. The power level of a wireless signal, indicating the quality of communication between devices.
9. A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data.
10. A public IP address is an IP address that is used to identify a device on the public internet.
11. A gateway is a network node that acts as an access point to another network, often involving translation between different network protocols.
12. A networking device that forwards data packets between computer networks, typically by routing traffic between different IP networks.
13. a device that forwards data packets between computer networks
14. the process of encoding information to make it secure from unauthorized access
15. A decentralized wireless network where each node cooperates to distribute network data, often used for increased coverage and improved reliability.
16. a physical location where people can access the internet, typically using Wi-Fi
17. a unique identifier for a wireless network
18. A weakness or flaw in a system that can be exploited by attackers.