Professional Documents
Culture Documents
1. Access 4. Authentication
Points -
APs
a device, such as a wireless router, that allows the process of determining whether someone
wireless devices to connect to a network. Most or something is, in fact, who or what it is
of them have built-in routers, while others must declared to be.
be connected to a router in order to provide
5. blog
network access. Due to limited range, several of
them are needed to permit uninterrupted
wireless communication. Example in airports.
2. ad-ware
A way to quickly access a favorite website by Websites use these files to store information
saving it in your browser on your browser, such as log-in or
registration identification, user preferences,
8. Bridge
and online "shopping-cart" information. Your
browser saves the information and reuses it
when you return to those websites. You can
refuse to accept them or erase all of them
saved on your browser.
12. cyberbullying
...consists of the policies adopted to prevent and Illegally copying copyrighted software, music, or
monitor unauthorized access, misuse, movies
modification, or denial of a computer network
and network-accessible resources. It involves the 33. Printer
authorization of access to data in a network, servers
which is controlled by the network administrator.
30. pharming
A computer program that can destroy files it is a trademark name for the any product which
or make your computer "crash." is based on the IEEE 802.11 standard.
44. WAN 48. WLANS