Back to Contents Page
Basic Operations: Dell
™
Wireless 355 Module with
Bluetooth
®
2.0 + EDR Technology User Guide
Terminology
Finding Bluetooth Devices
Viewing My Bluetooth Services
Making a Quick Connection
Start/Stop the Bluetooth Device
Terminology
authentication
A Bluetooth security feature that is used to verify identity. During the initial authentication
process, the Bluetooth device that initiates the connection requires the remote device to supply
a Bluetooth PIN code.
BDA
Bluetooth Device Address (assigned by the manufacturer)
Bluetooth
device
Bluetooth enabled hardware such as a computer, printer, fax, mouse, keyboard, telephone,
headset, headphones, camera, or PDA.
Bluetooth
Exchange
Folder
The highest-level folder to which another Bluetooth device has access. Devices that have been
granted access to a Bluetooth Exchange Folder also have access to all subfolders contained
within that folder and all files in those subfolders.
NOTICE:
By default, the Bluetooth Exchange Folder is placed in My Documents. If you
relocate the Bluetooth Exchange Folder, do not place it in a root or system folder. Relocating
the Bluetooth Exchange Folder to a root or system folder enables remote devices to harm
the operating system on your computer.
The Bluetooth Exchange Folder is shared by the PIM Item Transfer and the File Transfer
services. The location of the folder can be specified from the Properties page of either of these
services. If you change the location of the Bluetooth Exchange Folder for one of these services,
the path is automatically updated for the other service.
The Bluetooth Imaging service also uses this folder to store received images.
Bluetooth
security code
An alphanumeric string up to 16 characters long that is typed to respond to a Bluetooth PIN
Code Request. Also referred to as a passkey, password, passcode or PIN code.
Bluetooth
®
wireless
technology
Bluetooth wireless technology allows short-range (within a distance of 10 meters)
communication among Bluetooth enabled devices, eliminating the need for cables. When
connected, one device can use or be used by the other, as specified by the user.
Client
Applications
Software applications on this computer that allow this computer to use the Bluetooth services
that are provided by remote Bluetooth devices.
Dynamic Host
Control
Protocol
A protocol used by a server to assign an Internet Protocol (IP) address to a connecting device.
encryption
Encryption translates data into an unreadable format using a secret key or password.
Decrypting the data requires the same key or password that was used to encrypt it.
hands-free
audio device
A wearable audio device that has a speaker and a microphone.
Содержание 355
Страница 6: ...Back to Contents Page ...
Страница 33: ...Back to Contents Page ...