1 | 16 | ||||||||||||||||||||
2 | |||||||||||||||||||||
3 | 19 | ||||||||||||||||||||
13 | |||||||||||||||||||||
4/5 | |||||||||||||||||||||
14 | |||||||||||||||||||||
6 | |||||||||||||||||||||
7 | 18 | ||||||||||||||||||||
8 | 9 | ||||||||||||||||||||
10 | |||||||||||||||||||||
15 | 17 | ||||||||||||||||||||
11 | |||||||||||||||||||||
12 | |||||||||||||||||||||
1. The capability of substituting one component or system with another that performs the same function.
2. A type of network topology in which each node is connected to every other node, forming a fully interconnected network.
3. The ability of a system or software to adapt over time to meet changing requirements.
4. A group of computers, servers, and devices joined together, enabling communication and the exchange of data.
5. The practice of connecting computers and other devices together to share information and resources.
6. The ability of a network to prioritize certain types of traffic or data, ensuring that critical applications or services receive higher priority and better performance.
7. The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components.
8. A protocol used for synchronizing the time between devices on a network.
9. A network protocol used for sending data packets between devices quickly, but without guaranteed reliability.
10. A hardware device that allows wireless devices to connect to a wired network using Wi-Fi.
11. The set of network protocols and software that enable communication between devices on a computer network.
12. A method used to scramble data using a secret code in order to protect it from unauthorized access.
13. The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz.
14. A network that links devices near an individual, usually employing wireless technologies like Bluetooth.
15. A protocol used for retrieving email from a server.
16. The layer responsible for transforming data into the suitable format for application processing, including encryption and compression.
17. Blocks of data contain source and destination IP addresses that are routed through a network.
18. A protocol used for secure communication over the internet, often used for virtual private networks (VPNs).
19. A utility used to test the reachability of a network host and measure the round-trip time for packets.