1 | 13 | ||||||||||||||||||||||||
2/3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. A network composed of interconnected cells that provide coverage for mobile communication.
2. The process of verifying the identity of a user or device trying to connect to a network.
3. The process of verifying the identity of a user or system.
4. A type of computer network that allows devices to connect and communicate wirelessly.
5. The process of breaking the encryption of a network to gain unauthorized access.
6. A gateway is a network node that acts as an access point to another network, often involving translation between different network protocols.
7. A wireless technology standard used for short-range communication between devices.
8. A networking device that forwards data packets between computer networks, typically by routing traffic between different IP networks.
9. the maximum amount of data that can be transmitted over a network
10. The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats.
11. The power level of a wireless signal, indicating the quality of communication between devices.
12. the process of encoding information to make it secure from unauthorized access
13. A set of rules and procedures for verifying the identity of a user or system.
14. A network that enables mobile devices to connect to the internet via wireless communication.
15. a physical location where people can access the internet, typically using Wi-Fi
16. A weakness or flaw in a system that can be exploited by attackers.