The_____ _____ Network is a wireless
network of wearable computing devices.
The devices may be embedded inside the
body, implants, or may be surface-mounted
on the body in a fixed position, wearable
technology, or may be accompanied
devices which humans can carry in different
positions, in clothes pockets, by hand or in
various bags.
The process of tagging a photo, video or
other types of media with coordinates such
as marking its location.
This term refers to encrypted online content that is not indexed by conventional search engines.
Technologies or computers integrated into
articles of clothing or accessories. The
most prominent example, the Apple watch. These are know as _____.
The Ability to enter a name and password only
once to get to several password protected
systems in one working period is know as _____
This kind of "wireless communication"is fundamental to IoT connectivity. Many IoT devices have RF transceiver chipsets to transmit data long distances using minimal power.
This technology, known as BTLE, offers low-cost, safe, wireless connectivity and solves many of the earlier Bluetooth's pairing and performance headaches. This is the least expensive way to add short range wireless connectivity to mobile and IoT devices.
____ is a worldwide network of servers used by people who want to greatly increase their privacy and internet freedom. After all, this browser ensures your data traffic passes through different servers (nodes) located all over the world. This makes it a lot more difficult for online entities to track users.
A general term for a program that secretly monitors your actions. While they are sometimes sinister, like a remote-control program used by a hacker, software companies have been known to use spyware to gather data about customers.
A form of internet fraud whereby a payment page on a website is compromised when malware is injected onto the page via compromising a third-party script service in order to steal payment information
A data _____is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.