1/13 | 17 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
3 | 15 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | 16 | ||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. A signal sent by the receiver to inform the sender that data packets have been successfully received.
2. The absence of redundant copies of data, increasing the risk of permanent data loss in the event of a mishap.
3. A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
4. A residence that has connected devices and systems which can be remotely controlled and automated to enhance comfort, convenience, and energy efficiency.
5. The gradual loss of confidence and loyalty from customers due to data loss incidents, resulting in decreased sales and a damaged brand image.
6. A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources.
7. A technology that transmits data as light pulses in wired networks using thin strands of glass or plastic (fibers).
8. The period of time after which a sender assumes that a data packet has been lost and triggers retransmission.
9. The capability to share files, such as documents, images, or videos, through an instant messaging client.
10. A private IP address is an IP address that is used within a private network and is not directly accessible from the internet.
11. The process of verifying the identity of a user or device trying to connect to a network.
12. The process of securely exchanging keys between parties in asymmetric encryption.
13. A temporary and spontaneous wireless network formed between devices for a specific purpose without the need for a central infrastructure.
14. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
15. A cryptographic system that uses the same key for both encryption and decryption.
16. A small piece of data stored on the user's computer by the web browser while browsing a website.
17. The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components.