1/13 | 16 | 17 | ||||||||||||||||||||||
2 | ||||||||||||||||||||||||
19 | ||||||||||||||||||||||||
3 | ||||||||||||||||||||||||
4 | ||||||||||||||||||||||||
5 | ||||||||||||||||||||||||
15 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
7 | ||||||||||||||||||||||||
8 | 18 | |||||||||||||||||||||||
9 | 10 | |||||||||||||||||||||||
11 | ||||||||||||||||||||||||
14 | ||||||||||||||||||||||||
12 | ||||||||||||||||||||||||
1. The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices.
2. The process of creating virtual versions of physical computing resources, such as servers, storage devices, or network resources.
3. A combination of two or more different network topologies, such as star-bus or ring-mesh.
4. Hypertext Markup Language, a standard system for tagging text files to achieve font, color, graphic, and hyperlink effects on the World Wide Web.
5. A network topology where all the devices or nodes can act as both clients and servers to each other.
6. A facility used to house computer systems and associated components, such as telecommunications and storage systems.
7. A data structure in a networking device that maps MAC addresses to physical ports.
8. The inclusion of duplicate components or systems to provide backup or failover protection in case of a hardware or software failure.
9. A protocol used for synchronizing the time between devices on a network.
10. A wireless network that uses satellites to provide coverage over large geographic areas, often used for communication in remote locations.
11. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
12. The higher-level domain from which the subdomain is created. It is often the main or primary domain.
13. A unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment.
14. A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network.
15. An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access.
16. The capacity of a network to transmit data
17. Software designed to detect and remove malicious software, such as viruses, from computer systems.
18. A database entry that provides information about a domain, such as its IP address.
19. The duration for which a DNS record is cached by a resolver.