Search results

Jump to navigation Jump to search
  • {{r|Computer network}}
    576 bytes (73 words) - 19:05, 11 January 2010
  • {{r|Computer network}}
    829 bytes (102 words) - 05:56, 17 March 2024
  • {{r|Computer network}}
    697 bytes (85 words) - 11:30, 27 February 2010
  • {{r|Computer network}}
    548 bytes (69 words) - 16:01, 11 January 2010
  • In [[computer network]] [[protocol (computer)|protocols]], a unicast message, whether it be an ap
    622 bytes (96 words) - 00:05, 5 August 2008
  • {{r|Computer network}}
    197 bytes (24 words) - 17:14, 19 March 2009
  • ...License, except that it additionally covers the use of the software over a computer network, requiring that the complete source code be made available to any network u
    2 KB (251 words) - 03:44, 13 September 2009
  • ...reconnaissance''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking t
    2 KB (356 words) - 05:49, 8 April 2024
  • {{r|Computer network}}
    788 bytes (103 words) - 14:59, 20 March 2024
  • {{r|Computer network|Computer networks}}
    3 KB (353 words) - 03:48, 24 September 2013
  • Devices for [[computer network]]s involving applications that use multiple, variable TCP/UDP port numbers
    409 bytes (54 words) - 13:38, 7 May 2010
  • ...ted control]] levels. [[circuit switching|Circuit-switched]] and [[bridge (computer network)|bridged]] classified networks, however, can interconnect with the ATM back
    1 KB (151 words) - 10:20, 8 April 2024
  • {{r|Computer network}}
    680 bytes (92 words) - 21:38, 11 January 2010
  • {{r|Computer network}}
    830 bytes (103 words) - 14:41, 18 March 2024
  • {{r|Computer network}}
    819 bytes (107 words) - 08:37, 4 May 2024
  • {{r|Computer network}}
    3 KB (441 words) - 12:55, 13 November 2014
  • {{r|Computer network}}
    349 bytes (42 words) - 16:26, 16 March 2010
  • {{r|Computer network}}
    304 bytes (37 words) - 02:23, 12 February 2009
  • {{r|Computer network}}
    222 bytes (31 words) - 20:31, 13 November 2011
  • {{r|Bridge (computer network)}}
    300 bytes (36 words) - 05:38, 15 March 2024
  • {{r|Computer network}}
    328 bytes (46 words) - 17:33, 24 December 2009
  • {{r|Computer network}}
    1 KB (141 words) - 14:59, 20 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.
    442 bytes (56 words) - 20:24, 11 January 2010
  • '''Frame relay''' is a transmission system used to support [[computer network]]s, operating in [[locality of networks|wide area network|Wide Area Network
    1 KB (161 words) - 19:22, 15 September 2008
  • A '''personal area network (PAN)''' is a specialized type of [[computer network]], which benefits from extremely short range. Among its applications is rep
    4 KB (609 words) - 21:25, 23 May 2010
  • {{r|Sinkhole (Computer network)}}
    484 bytes (61 words) - 17:16, 11 January 2010
  • ...ciclomedia''' is a [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders and is planned to be
    963 bytes (132 words) - 10:50, 26 September 2007
  • Layer 2 networks based on bridge (computer network)|bridging directly track active MAC addresses and make forwarding decisions
    3 KB (527 words) - 07:31, 18 March 2024
  • {{r|Host (computer network)}}
    730 bytes (94 words) - 11:00, 11 January 2010
  • ...can be loosely defined as "moving packets around" on a [[Computer network|computer network]], in order to allow various different sub-networks (or [[subnets]]) to com
    6 KB (985 words) - 12:34, 30 March 2024
  • Originally a regional computer network for 54 colleges in Ohio, the OCLC gradually grew into an international netw
    3 KB (454 words) - 08:05, 22 April 2024
  • In computer network and server security, a '''sinkhole''' is a network element to which suspect
    3 KB (432 words) - 07:36, 18 March 2024
  • {{r|Sinkhole (Computer network)}}
    814 bytes (105 words) - 18:35, 11 January 2010
  • The '''topology''' of a [[computer network]] defines how that network is "laid out." Topologies can be either physical
    6 KB (923 words) - 12:40, 11 June 2009
  • {{r|Computer network}}
    965 bytes (125 words) - 15:51, 11 January 2010
  • A '''session border controller (SBC)''' is a [[computer network]]ing device that provide [[firewall]] and [[proxy services]] principally fo
    3 KB (383 words) - 05:48, 8 April 2024
  • {{r|Computer network}}
    1 KB (138 words) - 20:51, 11 January 2010
  • ...priate mechanisms to prevent interferences. Such media are used both for [[computer network]]s and [[telephony]], although the communications mechanisms are converging
    988 bytes (146 words) - 14:42, 14 September 2008
  • ...rs, servers, routers for access outide the LAN, and other computer network|computer network devices, within a relatively close distance of one another. LANs may be on
    7 KB (1,023 words) - 07:32, 18 March 2024
  • ...s]], the computers in a distributed computer may be connected over large [[computer network|networks]], and may be owned by many people or institutions. Several distr ...s, the time necessary for the master and workers to communicate over the [[computer network|network]], and the time necessary for the workers to perform their tasks.
    11 KB (1,565 words) - 15:12, 10 June 2010
  • ...lf" (COTS) hardware such as [[personal computer|personal computers]] and [[Computer network|Ethernet switches]] to link the machines together so that they act as one,
    4 KB (669 words) - 21:10, 12 February 2010
  • 7 KB (953 words) - 16:34, 9 September 2020
  • A '''computer network''' is a collection of [[computer]]s or digital devices ("nodes") connected In contrast to an ordinary computer network, where the user is aware of multiple computers, a '''[[distributed system]]
    15 KB (2,278 words) - 05:21, 8 March 2024
  • {{r|Computer network}}
    1 KB (173 words) - 14:49, 4 April 2024
  • ...internetwork layer]] is the dominant technology, supplemented by [[bridge (computer network)|bridging]] and hybrid technologies such as [[Multi-Protocol Label Switchin
    2 KB (316 words) - 11:40, 10 February 2011
  • ...ch reduce the productivity of a computer or compromise the security of a [[computer network|networked]] system. A much rarer alternate term is "scumware", a comment on
    6 KB (904 words) - 10:41, 21 May 2024
  • While the phrase ''client-server'' is most common in [[computer network]] [[protocol (computer)|protocols]], it is quite applicable to single-compu
    5 KB (744 words) - 22:36, 8 June 2011
  • warfare, computer network operations, psychological operations, military deception, and ...sures''' (ECM). Purely electronic or #computer network operations|software/computer network actions are called '''soft kill''', while physical destruction of enemy ele
    10 KB (1,449 words) - 07:30, 18 March 2024
  • HP both cooperates and competes with the largest [[computer network|computer networking]] vendor, [[Cisco Systems]]. Cisco recently started off
    3 KB (466 words) - 15:33, 8 March 2023
  • ...y (private to one computer) is used for decrypting. This allows users on a computer network to send their public ''encrypt'' key to strangers, who can then use it to s
    5 KB (879 words) - 09:41, 28 September 2023
View ( | ) (20 | 50 | 100 | 250 | 500)