1 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | 17 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
14 | 16 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
1. The process of verifying the identity of a user by requiring them to provide a password.
2. A system or architecture where resources and communication are distributed among multiple devices or nodes without a central authority.
3. A type of computer network that allows devices to connect and communicate wirelessly.
4. A unique identifier assigned to network interfaces for communications on the physical network segment.
5. Media Access Control Address, a unique identifier assigned to network interfaces for communications at the data link layer of a network segment.
6. The process of converting characters into a format that is suitable for use in a URL.
7. The optimization and effective utilization of resources in a system or network to achieve maximum output with minimal waste or redundancy.
8. A type of VPN that allows individual users to remotely access a private network over the internet.
9. A network that provides consolidated block-level data storage for servers.
10. The process of filtering and validating user input before using it in an application.
11. The process of forwarding data packets between networks or devices within a network.
12. The process of establishing uniform guidelines and specifications that ensure consistency and compatibility across different systems and technologies.
13. Software designed to detect and remove malicious software, such as viruses, from computer systems.
14. A file containing CSS code with a .css extension, used to define styles for HTML documents.
15. Communication that is protected from eavesdropping, tampering, or unauthorized access using encryption techniques.
16. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
17. An electronic document that confirms the credibility of a sender or receiver in a network communication.