Dell MU833 User Guide - Page 7
Basic Operations: Dell™ Wireless 355 Module with Bluetooth® 2.0 + EDR Technology User Guide - computers
View all Dell MU833 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 7 highlights
Back to Contents Page Basic Operations: Dell™ Wireless 355 Module with Bluetooth® 2.0 + EDR Technology User Guide Terminology Finding Bluetooth Devices Viewing My Bluetooth Services Making a Quick Connection Start/Stop the Bluetooth Device Terminology A Bluetooth security feature that is used to verify identity. During the initial authentication authentication process, the Bluetooth device that initiates the connection requires the remote device to supply a Bluetooth PIN code. BDA Bluetooth Device Address (assigned by the manufacturer) Bluetooth device Bluetooth enabled hardware such as a computer, printer, fax, mouse, keyboard, telephone, headset, headphones, camera, or PDA. The highest-level folder to which another Bluetooth device has access. Devices that have been granted access to a Bluetooth Exchange Folder also have access to all subfolders contained within that folder and all files in those subfolders. Bluetooth Exchange Folder NOTICE: By default, the Bluetooth Exchange Folder is placed in My Documents. If you relocate the Bluetooth Exchange Folder, do not place it in a root or system folder. Relocating the Bluetooth Exchange Folder to a root or system folder enables remote devices to harm the operating system on your computer. The Bluetooth Exchange Folder is shared by the PIM Item Transfer and the File Transfer services. The location of the folder can be specified from the Properties page of either of these services. If you change the location of the Bluetooth Exchange Folder for one of these services, the path is automatically updated for the other service. The Bluetooth Imaging service also uses this folder to store received images. Bluetooth An alphanumeric string up to 16 characters long that is typed to respond to a Bluetooth PIN security code Code Request. Also referred to as a passkey, password, passcode or PIN code. Bluetooth® wireless technology Bluetooth wireless technology allows short-range (within a distance of 10 meters) communication among Bluetooth enabled devices, eliminating the need for cables. When connected, one device can use or be used by the other, as specified by the user. Client Software applications on this computer that allow this computer to use the Bluetooth services Applications that are provided by remote Bluetooth devices. Dynamic Host Control A protocol used by a server to assign an Internet Protocol (IP) address to a connecting device. Protocol encryption Encryption translates data into an unreadable format using a secret key or password. Decrypting the data requires the same key or password that was used to encrypt it. hands - free audio device A wearable audio device that has a speaker and a microphone.