is a protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person. The tag, called a transponder, consists of an antenna and a memory chip that contains the information to be transmitted via radio waves.
Disguises itself as or hides itself in a legitimate file and then causes damage to programs and data when opened
A navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver’s geographic location.
The method by which computers and devices are physically arranged on a network.
Devices communicating with one another over a short range (usually less than 30 feet/9 meters)
Network architecture in which one or more computers act as a server, and the other computers on the network request resources from the server.
All devices interconnect with one another. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.
connects personal digital devices within a range of approximately 30 feet, such as a smartwatch that connects to your cell phone. Devices on a personal area network typically are connected via Bluetooth, which can facilitate communication at a range of 30 feet/9 meters or less.
Tracks and transmits personal information from your computer or device without your knowledge
Sends signals and data through cables to connect to other network devices; tend to be more secure and transmit data faster than wireless networks.
is a private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers, etc. The main purpose of an extranet is to allow users to exchange data and applications, and share information.
Displays unwanted advertisements on your computer
are private networks where all the users are known. This is incredibly empowering for everyone on an ______ network. They can trust in the information that they are receiving, while also knowing that whoever views the information they share is controlled.