- wireless order
- Военный термин: приказ, передаваемый по радио
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Wireless energy transfer — or wireless power is the transmission of electrical energy from a power source to an electrical load without artificial interconnecting conductors. Wireless transmission is useful in cases where interconnecting wires are inconvenient, hazardous,… … Wikipedia
Wireless broadband — is a fairly new technology that provides high speed wireless internet and data network access over a wide area.The term broadbandAccording to the 802.16 2004 standard, broadband means having instantaneous bandwidth greater than around 1 MHz and… … Wikipedia
Wireless forensics — is a sub discipline of computer forensics. The term was coined by Marcus Ranum in 1997: the main goal of wireless forensics is to provide the methodology and tools required to collect and analyze (wireless) network traffic that can be presented… … Wikipedia
Wireless tools for Linux — is a package of Linux commands to facilitate the manipulation of the Linux Wireless Extension. It is a fundamental set of simple text based utilities/tools for configuring wireless devices. It is intended to support the full wireless extension [… … Wikipedia
Wireless Internet service provider — Wireless Internet Service Providers (WISPs) are Internet service providers with networks built around wireless networking. The technology used ranges from commonplace Wi Fi mesh networking or proprietary equipment designed to operate over open… … Wikipedia
Wireless POS — Wireless point of sale (wireless POS or WPOS) is the use of wireless devices to facilitate order taking or payment for products or services. As a rule, a wireless point of sale system consists of a base station directly connected to a central… … Wikipedia
Wireless Transport Layer Security — (WTLS) is a security protocol, part of the Wireless Application Protocol (WAP) stack. It sits between the WTP and WDP layers in the WAP communications stack.OverviewWTLS is derived from TLS. WTLS uses similar semantics adapted for a low bandwidth … Wikipedia
Wireless LAN — This notebook computer is connected to a wireless access point using a PC card wireless card … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Wireless mesh network — Animation showing self healing wireless mesh (Click to enlarge) … Wikipedia
Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… … Wikipedia