FAQ Glossary

Title Definition
UPnP Stands for "Universal Plug and Play." Plug and Play describes devices that work with a computer system as soon as they are connected. Universal Plug and Play uses network protocols to allow a wide range of devices to be interconnected and work seamlessly with each other.
USB Stands for "Universal Serial Bus." USB is the most common type of computer port used in today's computers. It can be used to connect keyboards, mice, game controllers, printers, scanners, digital cameras, and removable media drives, just to name a few. With the help of a few USB hubs, you can connect up to 127 peripherals to a single USB port and use them all at once (though that would require quite a bit of dexterity).
VARI-FOCAL CAMERA A vari-focal camera has an adjustable lens that can be adjusted manually from the camera (zoom in and zoom out capability). These cameras are recommended for areas that need precise monitoring.
VGA Stands for "Video Graphics Array." It is the standard monitor or display interface used in most PCs. A standard VGA connection has 15 pins and is shaped like a trapezoid.
WAN Stands for "Wide Area Network." It is similar to a Local Area Network (LAN), but it's a lot bigger. Unlike LANs, WANs are not limited to a single location. Many wide area networks span long distances via telephone lines, fiber-optic cables, or satellite links. They can also be composed of smaller LANs that are interconnected. The Internet could be described as the biggest WAN in the world.
WEP WEP is a security protocol for Wi-Fi networks. Systems on a WEP-secured network can typically be authorized by entering a network password.
WiFi Short for "Wireless Fidelity." Wi-Fi refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal. Wi-Fi is the standard way computers connect to wireless networks.
WPA Stands for "Wi-Fi Protected Access." WPA is a security protocol designed to create secure wireless (Wi-Fi) networks. It is similar to the WEP protocol, but offers improvements in the way it handles security keys and the way users are authorized.