Dell MU833 Troubleshooting Manual page 7

Wireless 355 module with bluetooth
Table of Contents

Advertisement

Back to Contents Page
Basic Operations: Dell
®
Bluetooth
Terminology
Finding Bluetooth Devices
Viewing My Bluetooth Services
Making a Quick Connection
Start/Stop the Bluetooth Device
Terminology
A Bluetooth security feature that is used to verify identity. During the initial authentication
authentication
process, the Bluetooth device that initiates the connection requires the remote device to supply
a Bluetooth PIN code.
BDA
Bluetooth Device Address (assigned by the manufacturer)
Bluetooth
Bluetooth enabled hardware such as a computer, printer, fax, mouse, keyboard, telephone,
device
headset, headphones, camera, or PDA.
The highest-level folder to which another Bluetooth device has access. Devices that have been
granted access to a Bluetooth Exchange Folder also have access to all subfolders contained
within that folder and all files in those subfolders.
NOTICE:
Bluetooth
relocate the Bluetooth Exchange Folder, do not place it in a root or system folder. Relocating
Exchange
the Bluetooth Exchange Folder to a root or system folder enables remote devices to harm
Folder
the operating system on your computer.
The Bluetooth Exchange Folder is shared by the PIM Item Transfer and the File Transfer
services. The location of the folder can be specified from the Properties page of either of these
services. If you change the location of the Bluetooth Exchange Folder for one of these services,
the path is automatically updated for the other service.
The Bluetooth Imaging service also uses this folder to store received images.
Bluetooth
An alphanumeric string up to 16 characters long that is typed to respond to a Bluetooth PIN
security code
Code Request. Also referred to as a passkey, password, passcode or PIN code.
®
Bluetooth wireless technology allows short-range (within a distance of 10 meters)
Bluetooth
communication among Bluetooth enabled devices, eliminating the need for cables. When
wireless
connected, one device can use or be used by the other, as specified by the user.
technology
Client
Software applications on this computer that allow this computer to use the Bluetooth services
Applications
that are provided by remote Bluetooth devices.
Dynamic Host
Control
A protocol used by a server to assign an Internet Protocol (IP) address to a connecting device.
Protocol
Encryption translates data into an unreadable format using a secret key or password.
encryption
Decrypting the data requires the same key or password that was used to encrypt it.
hands-free
A wearable audio device that has a speaker and a microphone.
audio device
2.0 + EDR Technology User Guide
By default, the Bluetooth Exchange Folder is placed in My Documents. If you
Wireless 355 Module with

Advertisement

Table of Contents
loading

This manual is also suitable for:

355

Table of Contents