1 | 11 | ||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
3/9 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
13 | 14 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
1. a device that allows wireless devices to connect to a wired network
2. a device that forwards data packets between computer networks
3. A residence that has connected devices and systems which can be remotely controlled and automated to enhance comfort, convenience, and energy efficiency.
4. a unique identifier for a wireless network
5. The process of verifying the identity of a user or device trying to connect to a network.
6. the process of encoding information to make it secure from unauthorized access
7. a physical location where people can access the internet, typically using Wi-Fi
8. A weakness or flaw in a system that can be exploited by attackers.
9. the power of a Wi-Fi signal, typically measured in decibels
10. the maximum amount of data that can be transmitted over a network
11. The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats.
12. Devices that detect physical or environmental input such as temperature, pressure, motion, or light, and convert it into an electrical signal.
13. The process of breaking the encryption of a network to gain unauthorized access.
14. A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data.