Search results

Jump to navigation Jump to search
  • {{r|Computer algebra system}}
    193 bytes (26 words) - 08:37, 1 June 2008
  • ...ecutives, and generate FUD to block the idea of going to a less well known computer. The hidden message was that "no one was ever fired for buying IBM" (i.e.,
    2 KB (392 words) - 17:07, 17 October 2008
  • ...SIWYG''' is an acronym that stands for "What you see is what you get." In computer lingo, this term is typically used to describe a 'drag and drop' [[IDE | In
    389 bytes (59 words) - 02:59, 7 October 2013
  • The Privacy Act was amended by the Computer Matching and Privacy Act of 1988<ref name=Amendments />. Congress later enacted the Computer Matching and Privacy Protection Amendments of 1990 (Pub. L. No. 101-508), w
    4 KB (578 words) - 11:13, 20 January 2023
  • *[http://aklyosov.home.comcast.net/~aklyosov/Science_in_the_USSR.html Computer Conferences on the Agenda] &mdash; a 1985 article on the history of interne
    518 bytes (83 words) - 06:51, 22 October 2010
  • ...at had previously been various support chips on a single chip, allowing a "computer on a chip".<ref name=thocp1974-75/> The 8052 was embedded in non-computer devices, like microwave ovens, and electronic fuel ignitions.
    2 KB (299 words) - 07:30, 18 March 2024
  • ...oved around on a flat surface. Those movements are transmitted back to the computer and move a pointer on the screen in the same direction. The mouse usually h
    2 KB (329 words) - 01:22, 12 February 2009
  • A computer aboard a protected vehicle, which both aids in [[situational awareness]] of
    410 bytes (55 words) - 13:59, 2 February 2011
  • ...erm most often used to describe the main system [[memory]] of a personal [[computer]]; there have been many types of memory devices called "RAM"; generally the
    395 bytes (58 words) - 21:18, 3 February 2010
  • {{r|computer}}
    172 bytes (21 words) - 09:08, 4 March 2010
  • {{r|Computer}}
    276 bytes (40 words) - 00:43, 3 September 2009
  • {{r|Protocol (computer)}}
    266 bytes (29 words) - 14:27, 8 January 2009
  • Games, and computer games:
    195 bytes (25 words) - 05:15, 2 November 2022
  • {{r|computer}}
    176 bytes (23 words) - 16:59, 7 October 2011
  • ...s (U.S. state)|Texas]]. It is home to the [[University of Texas]] and many computer and software technology companies. Austin is also the self-professed "Live
    288 bytes (47 words) - 04:24, 31 July 2023
  • {{r|Computer numerical control}}
    266 bytes (35 words) - 20:08, 30 May 2009
  • {{r|Computer program}}
    296 bytes (36 words) - 08:57, 15 September 2009
  • {{r|Computer}}
    226 bytes (27 words) - 21:42, 31 July 2009
  • ...]] at Project Xanadu in the 1960s and first deployed as [[Apple Inc.|Apple Computer]]'s product, [[Hypercard]]; ancestor of the [[Hypertext Markup Language]] a
    416 bytes (60 words) - 06:33, 19 April 2011
  • ...for [[Email|email]] which requires messages to be downloaded to a client's computer, phone or tablet for reading. The version now used is version 3, thus call
    346 bytes (50 words) - 16:12, 21 January 2023
  • ...[Richard Garriot]], it was the predecessor of the ''[[Ultima]]'' series of computer role-playing games published by [[Origin Systems]]. Due to its first-perso ...R. R. Tolkien]]. ''Akalabeth'' was an attempt to provide a single-player computer simulation of the pen-and-paper [[role-playing game]] experience and its ti
    3 KB (553 words) - 20:15, 14 February 2010
  • A type of communication system, commonly used in linguistics, computer science and other fields to refer to different systems, including 'natural
    406 bytes (62 words) - 09:22, 30 August 2020
  • ...ct in which [[Tursiops truncatus|Bottlenose Dolphins]] were presented with computer-generated sounds which they incorporated after a while into their own vocal
    660 bytes (77 words) - 07:46, 17 June 2010
  • {{r|computer}}
    160 bytes (20 words) - 18:52, 6 October 2011
  • *000 Computer science, information, and general works
    427 bytes (49 words) - 22:39, 26 September 2013
  • {{r|Computer algebra}}
    164 bytes (18 words) - 08:57, 27 July 2009
  • *[[Computer Graphics]]
    119 bytes (11 words) - 16:05, 17 February 2008
  • | product = Computer and Consumer Products '''Apple Inc.''' (formerly known as Apple Computer) is an American corporation that primarily specializes in the creation of s
    3 KB (494 words) - 04:47, 6 October 2011
  • In [[computer programming]], a '''variable''' is an [[identifier]] (usually a letter, wor
    367 bytes (55 words) - 03:07, 15 January 2010
  • {{r|Human-Computer Interaction}}
    272 bytes (35 words) - 22:54, 11 January 2009
  • Highly resilient [[protocol (computer)|protocol]] for messages sent across the internet, first by being broken in
    439 bytes (64 words) - 08:19, 25 April 2023
  • ...[computational fluid dynamics]]), illustrating the flow with the help of [[computer graphics]] has become a main branch of flow visualization. Flow visualizati ==Computer graphics==
    3 KB (511 words) - 19:14, 23 February 2008
  • | publisher = IEEE Computer Society Press
    449 bytes (50 words) - 16:57, 3 March 2010
  • ...puter programmed to recognize and react to specific [[arrythmia]]s. Such a computer may be external or internal to the body. Manual defibrillators most common ...al defibrillators (AED) are designed to be used by an untrained rescuer. A computer generates spoken instructions to place the electrodes, Only if the machine
    2 KB (321 words) - 10:43, 8 April 2024
  • '''The Oregon Trail''' was an educational computer game developed for the purpose of teaching grade school-aged students about
    443 bytes (65 words) - 15:13, 19 May 2010
  • =='''Computer crime legislation around the world'''== *[http://www.austlii.edu.au/au/other/crime/125.html|Computer Misuse Act 1990] ([[United Kingdom|UK]]).
    4 KB (625 words) - 08:30, 24 September 2023
  • {{r|Computer user rights}}
    241 bytes (30 words) - 09:19, 7 November 2010
  • ...prises several versions of an [[operating system]] for home and business [[computer]]s, [[tablet PC]]s and [[media center]]s, developed by [[Microsoft]] and fi
    464 bytes (67 words) - 03:28, 20 July 2009
  • {{r|Streaming (computer)}}
    206 bytes (23 words) - 15:03, 16 January 2010
  • ...gladesh ]]and advised UNOCAL Bangladesh on strategic planning; Director of Computer and Information Services, [[Corporation for Public Broadcasting]]
    478 bytes (59 words) - 01:44, 3 June 2010
  • {{r|Quantum computer}}
    178 bytes (19 words) - 07:08, 15 September 2013
  • In [[computer science]], '''register allocation''' is the assignment of variables or inte Since only a small percentage of the variables within a computer program are used at one time, there is an opportunity to place multiple var
    2 KB (347 words) - 00:34, 9 February 2010
  • {{r|Computer network}}
    341 bytes (42 words) - 14:19, 1 December 2010
  • {{r|Computer networking reference models}}
    263 bytes (31 words) - 13:05, 15 May 2008
  • | journal = Annual Symposium on Foundations of Computer Science
    697 bytes (79 words) - 18:34, 21 February 2009
  • {{r|Class (programming)|In computer programming}}
    204 bytes (28 words) - 11:34, 31 May 2009
  • ...om reconstruction of graphical representations from nuclear emissions in [[computer-aided tomography]] (CAT scans), to the compression algorithm for images suc
    1 KB (184 words) - 13:47, 27 July 2020
  • {{r|Theoretical computer science}}
    245 bytes (29 words) - 09:38, 18 June 2009
  • {{r|Computer networking reference models }}
    234 bytes (26 words) - 20:58, 13 July 2008
  • {{r|Computer science}}
    199 bytes (23 words) - 08:00, 15 March 2021
  • ...of information they transfer (e.g., self-contained messages, file transfer|computer files, remote procedure calls, spoken language, etc.). Note well that thes ...provide security, expect certain security services from the end-to-end or computer networking internetwork protocols over which they run, or both.
    3 KB (360 words) - 16:21, 30 March 2024
  • {{r|Computer science}}
    291 bytes (36 words) - 08:06, 19 August 2009
  • ** [[Computer Science Foundations]] ** [[Human Computer Interface Design]]
    3 KB (315 words) - 13:13, 7 February 2009
  • ...m) sends a message asking for some work to be done by a program on another computer (the ''server''). In a client-server relationship, the client always initia ...work]] [[protocol (computer)|protocols]], it is quite applicable to single-computer software architecture.
    5 KB (744 words) - 22:36, 8 June 2011
  • {{r|Computer simulation}}
    404 bytes (52 words) - 21:37, 27 November 2010
  • ...e same copyleft. Under this philosophy, the GPL grants the recipients of a computer program the rights of the free software definition and uses copyleft to ens ...License, except that it additionally covers the use of the software over a computer network, requiring that the complete source code be made available to any n
    2 KB (251 words) - 03:44, 13 September 2009
  • ...thm]]s. He is the James S. McDonnell Distinguished University Professor of Computer Science at [[Princeton University]], and is also a member of [[Hewlett-Pack | title = Out of Their Minds: The Lives and Discoveries of 15 Great Computer
    5 KB (696 words) - 22:43, 11 February 2010
  • {{r|Computer network}}
    349 bytes (42 words) - 16:26, 16 March 2010
  • {{r|Personal computer}}
    325 bytes (37 words) - 04:24, 11 November 2008
  • ...interface technologies. All share the characteristic that an input to the computer system generates an auditory response, either from synthesized or recorded ...[[speech recognition]] capability, from the user speaking directly to the computer.
    3 KB (457 words) - 16:46, 22 December 2008
  • {{r|Port (computer networking)}}
    279 bytes (38 words) - 12:47, 2 October 2020
  • {{r|Computer network}}
    304 bytes (37 words) - 02:23, 12 February 2009
  • ...define, and electrical engineering problems may involve [[mathematics]], [[computer science]], [[physics]], [[chemistry]], [[biomedical engineering]], [[mechan ** [[Computer engineering]]
    2 KB (213 words) - 17:53, 24 January 2023
  • ...nuth]] in the late 1970s. Despite its age, it remains at the forefront of computer typesetting technology, although by far the majority of its users elect to
    1 KB (233 words) - 12:21, 8 September 2020
  • {{r|Computer security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • {{r|Computer-assisted radiotherapy planning}}
    355 bytes (39 words) - 02:46, 21 March 2024
  • {{r|Computer science}}
    368 bytes (47 words) - 07:54, 13 July 2008
  • ...s intended to have the absolute minimum of functionality necessary for one computer, typically connected to another via a [[local area network]], to download t ...y of networks#scope of information|temporary link-local address]], and the computer may subsequently get an address that has greater scope.
    3 KB (431 words) - 15:32, 23 August 2008
  • * Recordings of Stallman's April 20, 2011 talk at the Univ. of Penn. Computer Science department are available in two parts: [http://harbormist.com/blogm
    780 bytes (107 words) - 14:52, 5 November 2020
  • Computer-processable information that has a destination address (name) that is uniqu
    506 bytes (70 words) - 06:27, 26 January 2009
  • {{r|Computer component interconnection}}
    342 bytes (46 words) - 08:32, 26 July 2009
  • {{r|Rate limiting (computer)}}
    322 bytes (42 words) - 20:55, 11 April 2009
  • {{r|Computer}}
    566 bytes (69 words) - 06:25, 28 September 2009
  • {{r|computer}}
    111 bytes (12 words) - 16:44, 27 July 2009
  • In [[computer science]], and in particular [[computer security]] and [[code generation]], the use of '''canary values''' is a str * [[computer security]]
    3 KB (380 words) - 05:48, 8 April 2024
  • {{r|Computer Science}}
    294 bytes (45 words) - 18:53, 22 February 2009
  • {{r|Computer network}}
    222 bytes (31 words) - 20:31, 13 November 2011
  • {{r|Pine (computer progam)}}
    170 bytes (20 words) - 20:33, 23 November 2009
  • {{r|Computer}}
    356 bytes (50 words) - 03:49, 3 March 2010
  • ...r. However, it is also quite a general description and many other types of computer are provably equivalent to a Turing machine. A device that can simulate the Any machine using the [[Von Neumann architecture]]—basically any computer with a single processor and memory—can be simulated by a Turing machine.
    3 KB (492 words) - 09:10, 22 May 2011
  • ...ng]] and other [[applied sciences]]. For example, a typical context use in computer science is to express the [[complexity of algorithms]].
    2 KB (283 words) - 06:18, 15 July 2008
  • *1981: ''[[Computer World]]'' (''Computerwelt'') *1981: ''Computerwelt'' (12" single remix version not on [[Computer World]])
    3 KB (335 words) - 10:26, 19 January 2008
  • {{r|Computer}}
    424 bytes (50 words) - 11:51, 18 November 2013
  • {{r|Computer proof}}
    236 bytes (31 words) - 11:34, 19 April 2010
  • is a history-based real-time strategy computer game released in 1997, by Ensemble Studios and published by Microsoft, the
    423 bytes (66 words) - 17:25, 8 March 2009
  • ...n''' is a challenge encountered so commonly, especially in object-oriented computer programming, that its general solution is taught independently of any parti
    479 bytes (64 words) - 20:40, 15 December 2020
  • {{r|Computer architecture}}
    363 bytes (47 words) - 09:37, 27 July 2009
  • * [[Data_structure#Tree|Tree (data structure)]]: In design of computer software
    627 bytes (86 words) - 21:50, 29 September 2020
  • {{r|Bridge (computer network)}}
    425 bytes (53 words) - 10:00, 20 September 2009
  • * [[Computer network]]
    694 bytes (57 words) - 07:46, 13 September 2020
  • {{r|Computer networking reference models}}
    462 bytes (55 words) - 13:43, 13 May 2008
  • {{r|Single chip computer}}
    495 bytes (61 words) - 12:03, 6 March 2024
  • ...S-boxes | journal = Advances in Cryptology - Crypto '85 (Lecture Notes in Computer Science) | date = 1985 }} </ref>. This is a strong version of the requireme | journal = Canadian Conference on Electrical & Computer Engineering
    1 KB (209 words) - 21:41, 26 November 2010
  • ...prises several versions of an [[operating system]] for home and business [[computer]]s and [[media center]]s, developed by [[Microsoft]] and first released in
    524 bytes (72 words) - 03:25, 20 July 2009
  • {{r|Single chip computer}}
    509 bytes (63 words) - 12:03, 6 March 2024
  • {{r|Bridge (computer network)}}
    300 bytes (36 words) - 05:38, 15 March 2024
  • ...of finding or approximating the solution to a mathematical problem using a computer. [[Differential equation]]s and [[linear algebra]] are two of the largest ...computers are asked to do calculations involving [[real numbers]], since a computer can only store a real number up to a finite number of [[significant figures
    1 KB (225 words) - 22:09, 3 September 2010
  • {{r|Computer networking reference models}}
    361 bytes (42 words) - 23:40, 13 September 2008
  • * In [[computer science]], the repeated application of some algorithm, code, program, using
    449 bytes (65 words) - 00:41, 10 July 2013
  • ...es, so that movements of the yoke or joystick, or equivalent in the flight computer, can produce a corresponding control surface deflection throughout the rang
    448 bytes (69 words) - 14:47, 3 March 2011
  • {{r|Quine (computer program)}}
    366 bytes (48 words) - 22:20, 13 August 2009
  • {{r|computer programming}}
    496 bytes (57 words) - 07:04, 7 August 2008
  • {{r|computer}}
    187 bytes (24 words) - 15:38, 28 June 2008
  • ...tional]] Ltd. introduced the '''Commodore 64'''. It was the first personal computer that had a built-in 3 channel sound device (SID Chip) with 16 color graphic ===Commodore SX-64 - Executive Computer===
    3 KB (484 words) - 18:03, 24 October 2007
  • '''Matt Blaze''' is a computer science researcher who has worked at Bell Labs and the University of Pennsy
    536 bytes (77 words) - 07:33, 18 March 2024
  • {{r|Computer network}}
    328 bytes (46 words) - 17:33, 24 December 2009
  • ...s concrete problems. These '''Scholary problems''' used for teaching '''in computer science''' are often not only intended as examples but also serve to light
    2 KB (269 words) - 12:04, 23 April 2009
  • ...require the user to [[wearable computer|wear the computer or interface]]. Computer interfaces, however, are everywhere in the physical space occupied by the u ...are effectively invisible in use. This is a challenge that affects all of computer science. Our preliminary approach: Activate the world. Provide hundreds of
    4 KB (705 words) - 09:44, 23 May 2010
  • In computer networking, '''routing''' is the process of receiving a [[packet]] on one i ...a special-purpose computer, although it is possible to program a personal computer to route.
    3 KB (398 words) - 12:35, 30 March 2024
  • ...niversity. As the author of the widely-cited, multi-volume ''[[The Art of Computer Programming]]'' <ref name="ArtCP"> |title="The Art of Computer Programming" (an overview of each volume)
    7 KB (1,029 words) - 07:21, 30 September 2007
  • {{r|Computer science}}
    605 bytes (77 words) - 14:41, 18 March 2024
  • {{r|Computer science}}
    669 bytes (79 words) - 06:17, 26 January 2010
  • ...typed in the Russian translation, asking for its English translation. The computer spit out, "The vodka is sweet but the meat is rotten." Possibly an [[Urban
    3 KB (452 words) - 02:35, 11 February 2010
  • {{r|Closure (computer science)|Closure}}
    219 bytes (26 words) - 08:04, 20 March 2024
  • ...[[computer science|computer scientist]]. He has been called "the father of computer science". ...at is still widely used, and used it to solve the [[halting problem]], the computer science analogue of [[Kurt Gödel]]'s [[Incompleteness Theorem]]. This, tog
    5 KB (782 words) - 05:57, 8 April 2024
  • In [[computer science]], the '''program counter''' (PC) is the [[register]] that contains After an instruction is fetched from computer memory by the [[Central processing unit|CPU]] (central processing unit), th
    2 KB (253 words) - 13:22, 27 July 2008
  • ...75. The following year, Gates penned a widely-published [[open letter]] to computer users who widely shared software in violation of [[copyright]], attacking t
    2 KB (336 words) - 09:44, 5 August 2023
  • {{r|Computer engineering}}
    438 bytes (51 words) - 16:08, 28 February 2010
  • ...or accepted guidelines exist. Full disclosure is the policy of releasing computer security vulnerability details (and associated exploit code) to the interne
    2 KB (274 words) - 05:48, 8 April 2024
  • {{r|Computer proof}}
    129 bytes (15 words) - 19:06, 29 January 2010
  • {{r|Computer Aided Optimization}}
    706 bytes (88 words) - 12:20, 2 September 2009
  • ==Computer-assisted radiotherapy== ...rary of Medicine |accessdate=2007-12-26 |format= |work=}}</ref> Methods of computer-assisted radiotherapy include:
    5 KB (653 words) - 14:16, 22 June 2010
  • {{r|Flow (computers)|In computer networks}}
    201 bytes (27 words) - 16:26, 23 October 2009
  • The '''Intel 4004''' is an early [[single chip computer chip]], from 1971, and a lineal ancestor of the [[Pentium microprocessor]]. The computer had separate data and memory spaces.
    2 KB (284 words) - 12:03, 6 March 2024
  • ...Soviet Union|Soviet]]-made DVK-2 computer (successor of the Elektronika 60 computer, using same with Elektronika 60 display and keyboard). Viewing the video re
    2 KB (334 words) - 17:43, 31 May 2010
  • {{r|Computer|Computers}}
    476 bytes (60 words) - 12:15, 17 June 2015
  • * [[Algorithm|Algorithms]] - Ways of solving problems with computer programs.
    495 bytes (65 words) - 03:16, 9 June 2008
  • }}</ref> The four letters of its name originally stood for ''Online Computer Library Center, Inc.'', but the expanded name is no longer in use because t ...OCLC was in the Main Library of the Ohio State University (OSU). Its first computer room was located in the OSU Research Center. The first President was Freder
    3 KB (454 words) - 08:05, 22 April 2024
  • {{r|Computer networking reference models}}
    385 bytes (43 words) - 00:44, 20 July 2008
  • ...puter role-playing game]]s: These are usually taken to mean single-player computer games. The player is represented in the game world by an avatar or charact ** [[Multi-User Dungeon]]s: These are computer role-playing games allowing for multiple players, as the name suggests. Th
    3 KB (410 words) - 13:06, 10 January 2009
  • ...ws waveforms and volume envelopes on the tablet, which are rendered by the computer. Once the waveforms have been stored, the user can compose with them by dra
    2 KB (252 words) - 04:36, 13 September 2013
  • In computer science, [[syndication]] is the act of providing automated feeds (including
    557 bytes (72 words) - 06:56, 9 May 2011
  • A '''moving map display''' is a computer-generated display that does away with the problems of paper maps having a f
    467 bytes (75 words) - 17:50, 31 January 2009
  • A '''hard disk''' or hard drive is one component of a modern [[computer]]. It is the physical device that holds data on a permanent basis, also kno #When you first start your computer, the [[operating system]] that starts after a few seconds [[boots]] from th
    2 KB (266 words) - 23:03, 19 February 2010
  • ...on the narrower sense, of asynchronous transmission of messages by using [[computer]]s and data-communication networks. ...spread out in various computer labs around [[campus]], to access a central computer using [[keyboard]] and monitor terminals. The geographic dispersion of the
    5 KB (732 words) - 11:46, 2 February 2023
  • {{r|Computer engineering}}
    824 bytes (92 words) - 13:01, 13 November 2014
  • * [[Clifford A. Pickover]], ed. ''Chaos and Fractals: A Computer Graphical Journey - A 10 Year Compilation of Advanced Research''. Elsevier, ...oppy. References a 1985 Scientific American article in [[A.K. Dewdney]]'s "Computer Recreations" that "...inspired countless programmers to write their own Man
    2 KB (297 words) - 13:37, 21 February 2009
  • Historically, at the beginning of the computer programming era, there was no software engineering. The problem solving po The next phase was to elaborate a system to teach computer science students this vast body of knowledge that software engineering has
    5 KB (775 words) - 06:07, 31 May 2009
  • Auto-populated based on [[Special:WhatLinksHere/Computer Science Foundations]]. Needs checking by a human.
    464 bytes (58 words) - 15:36, 11 January 2010
  • {{r|Personal computer}}
    436 bytes (56 words) - 10:49, 11 January 2010
  • {{r|Computer}}
    602 bytes (84 words) - 08:26, 23 February 2024
  • {{r|Computer engineering}}
    451 bytes (57 words) - 15:58, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.
    442 bytes (56 words) - 20:24, 11 January 2010
  • {{r|Computer architecture}}
    444 bytes (56 words) - 11:06, 11 January 2010
  • {{r|Computer Go}}
    427 bytes (56 words) - 15:53, 11 January 2010
  • {{r|Computer tower}}
    430 bytes (56 words) - 17:48, 11 January 2010
  • {{r|Computer engineering}}
    514 bytes (62 words) - 21:36, 5 January 2024
  • {{r|Personal computer}}
    452 bytes (58 words) - 13:12, 28 July 2010
  • ...architecture''', applicable to both [[telecommunications network]]s and [[computer network]]s as well as their continuing modern [[convergence of communicatio
    607 bytes (83 words) - 09:46, 20 September 2009
  • In [[computer science]]:
    486 bytes (71 words) - 12:37, 31 May 2009
  • {{r|Computer engineering}}
    477 bytes (61 words) - 19:57, 11 January 2010
  • {{r|Computer networking end-to-end protocols}}
    407 bytes (47 words) - 06:31, 17 March 2024
  • {{r|Personal computer}}
    450 bytes (59 words) - 20:09, 11 January 2010
  • {{r|Computer engineering}}
    465 bytes (60 words) - 21:27, 11 January 2010
  • ...r)|client]]. The client communicates with a server by using a [[protocol (computer)|protocol]] to request and receive information. Any computer can be a server, from a personal computer to a multi-thousand [[US dollar|dollar]] server. A server is primarily def
    6 KB (917 words) - 04:36, 2 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/Computer tower]]. Needs checking by a human.
    445 bytes (58 words) - 15:37, 11 January 2010
  • {{r|Computer science}}
    452 bytes (58 words) - 16:04, 11 January 2010
  • {{r|Computer architecture}}
    466 bytes (58 words) - 18:37, 11 January 2010
  • {{r|computer}}
    313 bytes (51 words) - 13:05, 8 December 2008
  • {{r|Computer}}
    448 bytes (57 words) - 16:50, 11 January 2010
  • {{r|Computer}}
    448 bytes (57 words) - 10:44, 11 January 2010
  • ...rtual machine''' (VM) is basically a software implementation of a physical computer. A characteristic trait of a VM is that it provides an isolated virtual env
    486 bytes (82 words) - 10:42, 8 August 2010
  • ...|C]], [[C++]], among others) into a binary file which can be executed by a computer. The Gnu Compiler Collection is included in most Linux distributions as the
    535 bytes (79 words) - 09:02, 2 March 2024
  • ...edded in a gadget such as a phone or a TV remote. Even defining the word ''computer'' may spark a debate, because so many different kinds of computers exist, a ...ver, this definition may only make sense to people who already know what a computer can do. Computers are extremely versatile. In fact, they are ''universal''
    9 KB (1,333 words) - 10:08, 28 February 2024
  • {{r|Personal computer}}
    490 bytes (64 words) - 16:58, 11 January 2010
  • {{r|Personal computer}}
    477 bytes (62 words) - 18:41, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Common student exercises in computer science]]. Needs checking by a human.
    510 bytes (66 words) - 15:34, 11 January 2010
  • {{r|Computer}}
    636 bytes (73 words) - 14:06, 28 May 2010
  • Steve Bellovin is a computer security expert who was at Bell Labs for many years and is currently (2010) | publisher = Department of Computer Science, Columbia University
    2 KB (259 words) - 07:37, 18 March 2024
  • ...rms often take up valuable memory and network bandwidth, which can cause a computer to stop responding, and can also allow attackers to gain unauthorized remot | publisher = Department of Computer Sciences, Purdue University
    5 KB (812 words) - 05:48, 8 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Optimization (computer science)]]. Needs checking by a human.
    500 bytes (62 words) - 03:47, 24 September 2013
  • ...tware download or install in the local computer, user can access it on any computer anywhere. While users want to collaborate editing, they don’t have to be ...e threatened with virus or get threatened during the transfer into another computer.
    3 KB (530 words) - 22:41, 19 February 2010
  • ...pg|thumb|450px|Runa Sandvik and Michael Auger demonstrated that the aiming computer of theTrackingPoint XS1 [[precision guided firearm]] was vulnerable to thir The $13,000 [[Tracking Point sniper rifle]] came equipped with computer aided optics.<ref name=Motherboard2017-03-27/><ref name=Wired2017-07-29/><r
    6 KB (769 words) - 21:56, 25 August 2022
  • {{r|Complement (computer languages)}}
    487 bytes (60 words) - 19:57, 11 January 2010
  • {{r|Computer security||***}}
    558 bytes (70 words) - 14:29, 26 February 2010
  • | publisher = Computer Science Department, Boston University}}</ref>
    784 bytes (106 words) - 10:25, 7 February 2009
  • {{r|Computer simulation}}
    504 bytes (64 words) - 16:06, 11 January 2010
  • ...ondon/model/ The University of Virginia's IATH] has an excellent site with computer-generated models and 3-D walkthroughs of the Palace's original form in Hyde
    946 bytes (137 words) - 17:14, 27 September 2007
  • Auto-populated based on [[Special:WhatLinksHere/Interpreter (computer)]]. Needs checking by a human.
    467 bytes (58 words) - 17:31, 11 January 2010
  • | occupation = Computer Scientist ...y of projects related to the [[Semantic Web]]. He is also the Chair of the Computer Science department at the [[University of Southampton]] in [[England]].
    4 KB (584 words) - 08:50, 30 June 2023
  • ...whether that information be generated by computers or not. It complements computer security, which protects information in computers.
    650 bytes (95 words) - 16:22, 30 March 2024
  • ...ory swapping are, for the most part, transparent to users, who may use the computer as if it really had the larger amount of virtual memory rather than the sma ...d cache memory implementations may be regarded as seminal in the growth of computer technology. By the 1990's, virtual memory had become commonplace in person
    8 KB (1,334 words) - 18:04, 20 March 2009
  • Auto-populated based on [[Special:WhatLinksHere/Syntax (computer science)]]. Needs checking by a human.
    499 bytes (63 words) - 20:45, 11 January 2010
  • ...sed by [[Antony Gormley]]. 2,400 members of the public, chosen randomly by computer from over 30,000 applicants, each occupied the square's usually vacant 'fou
    621 bytes (95 words) - 11:32, 23 September 2013
  • ...tel (manufacturer)|intel]]'s [[intel 80286|80286]] models of [[single chip computer]].<ref name=CBROnline1990-08-22> | publisher=Computer Business Review
    3 KB (378 words) - 12:03, 6 March 2024
  • {{r|Computer networking application protocols}}
    557 bytes (70 words) - 16:33, 11 January 2010
  • {{r|Sinkhole (Computer network)}}
    484 bytes (61 words) - 17:16, 11 January 2010
  • {{r|Computer}}
    546 bytes (72 words) - 17:47, 11 January 2010
  • {{r|Protocol (computer)}}
    523 bytes (65 words) - 20:16, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Pointer (computer science)]]. Needs checking by a human.
    505 bytes (65 words) - 19:36, 11 January 2010
  • Marcus Ranum is a computer security expert. As of mid-2010, he is at [[Tenable Security]].
    596 bytes (83 words) - 05:48, 8 April 2024
  • {{r|Personal computer}}
    479 bytes (62 words) - 20:40, 11 January 2010
  • '''Eldon Spickerhoff''' is a [[Canadian people|Canadian]] [[computer security]] expert.<ref name=cbc2018-10-04/> ...a key role in forging ties between the University and leading firms in the computer industry.
    5 KB (583 words) - 20:43, 19 May 2022
  • {{r|Computer Science Foundations}}
    504 bytes (62 words) - 20:28, 11 January 2010
  • ...nguage is a language modeled after mathematical functions. Non-functional computer programs allow state changes. the efforts of software engineers and computer scientists. <ref>{{citation
    2 KB (268 words) - 15:18, 25 January 2011
  • {{r|Computer networking reference models}}
    576 bytes (76 words) - 11:34, 11 January 2010
  • # Bergman LG, Fors UG, Computer-aided DSM-IV-diagnostics – acceptance, use and perceived usefulness in re # Kunnamo I, et al, 2005, National Decision support database based on computer-readable guidelines and using structured data from electronic patient recor
    2 KB (263 words) - 15:37, 26 April 2008
  • {{r|Computer network}}
    576 bytes (73 words) - 19:05, 11 January 2010
  • ...r 5 seconds to get the file - .5 seconds for the request to reach the host computer, .5 for the first pieces of the file to arrive after being sent, and 4 seco
    2 KB (295 words) - 16:54, 24 January 2008
  • {{r|computer}}
    296 bytes (38 words) - 13:11, 18 February 2021
  • {{r|Protocol (computer)|Protocol}}
    589 bytes (74 words) - 06:31, 17 March 2024
  • {{r|Computer}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • In computer and communications security dependent on [[public key infrastructure]] (PKI
    646 bytes (92 words) - 05:48, 8 April 2024
  • | journal= 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '03) - Volume 2
    2 KB (299 words) - 16:09, 1 January 2010
  • {{r|Personal computer}}
    532 bytes (66 words) - 15:34, 11 January 2010
  • {{r|Computer networking end-to-end protocols}}
    553 bytes (70 words) - 06:31, 17 March 2024
  • ...ch reduce the productivity of a computer or compromise the security of a [[computer network|networked]] system. A much rarer alternate term is "scumware", a co ...he user or the user's computer to take action to the detriment of the user computer. [[Phishing]], for example, is a scheme where a user is induced to go to an
    6 KB (907 words) - 05:49, 8 April 2024
  • {{r|Computer Go}}
    520 bytes (67 words) - 19:24, 11 January 2010
  • {{r|Computer}}
    581 bytes (76 words) - 17:22, 11 January 2010
  • {{r|Pointer (computer science)}}
    566 bytes (76 words) - 15:51, 11 January 2010
  • In computer programming, '''source code''' is the code which a [[compiler]] turns into ...Amendment, which has been vital for hackers and those with an interest in computer security ([[Dan Bernstein]], [[2600 Magazine]] and [[DeCSS]]).
    2 KB (353 words) - 12:47, 22 March 2009
  • {{r|Computer role-playing game}}
    474 bytes (60 words) - 18:42, 11 January 2010
  • {{r|Protocol (computer)}}
    565 bytes (72 words) - 21:06, 11 January 2010
  • ...TA events include industrial accidents as well as terrorist incidents. Its computer systems, complemented by meteorological information and signature informati
    2 KB (294 words) - 13:09, 27 July 2010
  • {{r|Computer}}
    567 bytes (74 words) - 18:39, 11 January 2010
  • {{r|Computer sciences||**}}
    1,000 bytes (115 words) - 13:19, 29 March 2010
  • {{r|Computer algebra system}}
    626 bytes (80 words) - 18:22, 11 January 2010
  • {{r|Personal computer}}
    560 bytes (73 words) - 17:14, 11 January 2010
  • ...ciclomedia''' is a [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders and is plann
    963 bytes (132 words) - 10:50, 26 September 2007
  • {{r|Personal computer}}
    593 bytes (77 words) - 15:34, 11 January 2010
  • {{r|Computer science}}
    585 bytes (76 words) - 15:39, 11 January 2010
  • {{r|Computer architecture}}
    573 bytes (75 words) - 19:45, 11 January 2010
  • {{r|Computer network}}
    697 bytes (85 words) - 11:30, 27 February 2010
  • {{r|Computer networking session protocols}}
    626 bytes (78 words) - 20:18, 11 January 2010
  • {{r|Computer addiction}}
    928 bytes (114 words) - 21:45, 19 September 2009
  • ...dicine]] due to its exercise of higher brain function. [[Computer science|Computer scientists]] have been engaged in the study of human languages for the purp ===Formal, mathematical, and computer languages===
    6 KB (964 words) - 13:48, 18 February 2024
  • ...lly targeted at people with a high degree of computer literacy, especially computer professionals.
    2 KB (271 words) - 21:16, 20 July 2008
  • {{r|Common student exercises in computer science}}
    619 bytes (77 words) - 19:36, 11 January 2010
  • A [[computer]] '''relay''' is a machine or process that receives data and forwards it to
    588 bytes (98 words) - 12:29, 30 March 2024
  • ...is a list of people who have made major ''conceptual'' breakthroughs in [[computer science]]. This list should ''not'' include people just because they invented a new computer, operating system, or type of software, unless they devised an innovation w
    4 KB (515 words) - 09:39, 10 November 2008
  • ...s and practices, serving as a national resource in software engineering, [[computer security]], and [[process improvement]]. The SEI works closely with defense
    690 bytes (91 words) - 18:17, 14 November 2007
  • {{r|Computer science}}
    641 bytes (81 words) - 20:46, 11 January 2010
  • {{r|Computer}}
    684 bytes (92 words) - 19:43, 11 January 2010
  • ...n inherent advantages and disadvantages. HRM systems also require advanced computer hardware and software to store and analyze the manometry data.
    709 bytes (98 words) - 13:19, 3 November 2007
  • {{r|Computer}}
    613 bytes (79 words) - 16:50, 11 January 2010
  • {{r|single chip computer}}
    579 bytes (75 words) - 02:33, 20 February 2010
  • '''Maple''' is a commercial [[computer algebra system]] and a general purpose mathematics software. It is develope
    622 bytes (100 words) - 05:16, 25 January 2009
  • Auto-populated based on [[Special:WhatLinksHere/Computer role-playing game]]. Needs checking by a human.
    512 bytes (66 words) - 14:49, 19 May 2010
  • {{r|Computer networking media sharing protocols}}
    663 bytes (84 words) - 16:38, 11 January 2010
  • ...ogical cell, the cell a computationally-enabled information-processing bio-computer, designed basically to live and reproduce itself, self-assembling and self-
    873 bytes (115 words) - 21:38, 15 January 2010
  • ...ction series)/Catalogs/Characters#Holly|Holly]], a less-than-intelligent [[computer]] he played in the first two series of the programme (1988), and returned f
    632 bytes (86 words) - 09:46, 10 September 2011
  • *Crosby, Jack L. (1973), ''Computer Simulation in Genetics,'' John Wiley & Sons, London. *Fraser, Alex and Donald Burnell (1970), ''Computer Models in Genetics,'' McGraw-Hill, New York.
    4 KB (585 words) - 13:56, 26 September 2007
  • {{r|Computer simulation}}
    679 bytes (84 words) - 20:38, 11 January 2010
  • {{rpl|Bar (computer science)}}
    655 bytes (93 words) - 21:51, 27 September 2020
  • {{r|Personal computer}}
    763 bytes (99 words) - 02:28, 1 April 2024
  • {{r|Protocol (computer)}}
    638 bytes (80 words) - 20:46, 11 January 2010
  • [PnD07] L. Peterson, B. Davie (2007) "Computer Networks: A Systems Approach" 4th ed. Sect. 9.1.1 "Electronic Mail", ISBN 0
    792 bytes (105 words) - 12:56, 30 September 2009
  • ...ware]], there are conflicting definitions of closure within the field of [[computer science]]. According to [[Martin Fowler]]: "Some people say that the term o
    819 bytes (115 words) - 17:12, 6 January 2009
  • </ref> It is one of the only American PC-focused computer companies publicly traded under the [[New York Stock Exchange]]. HP both cooperates and competes with the largest [[computer network|computer networking]] vendor, [[Cisco Systems]]. Cisco recently started offering ser
    3 KB (466 words) - 15:33, 8 March 2023
  • {{r|Computer algebra system}}
    592 bytes (77 words) - 18:05, 11 January 2010
  • {{r|Personal computer}}
    636 bytes (81 words) - 14:59, 20 March 2024
  • ...internetwork layer]] is the dominant technology, supplemented by [[bridge (computer network)|bridging]] and hybrid technologies such as [[Multi-Protocol Label
    2 KB (316 words) - 11:40, 10 February 2011
  • {{r|Common student exercises in computer science}}
    645 bytes (85 words) - 17:08, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Single chip computer]]. Needs checking by a human.
    669 bytes (85 words) - 12:05, 6 March 2024
  • ...chance when predicting a jury verdict. This article pertains to the use of computer simulation (as an adjunct to human intuition) to make certain kinds of pred
    713 bytes (110 words) - 04:10, 7 October 2013
  • {{r|Computer algebra system}}
    763 bytes (99 words) - 17:28, 11 January 2010
  • In the context of computer [[malware]], '''malware polymorphism''', often phrased in the context of th
    776 bytes (117 words) - 05:48, 8 April 2024
  • ...number of hand and arm disorders from repeated keyboard, mouse, and other computer-related activities.
    802 bytes (110 words) - 19:55, 15 June 2010
  • {{r|Host (computer network)}}
    730 bytes (94 words) - 11:00, 11 January 2010
  • {{r|Optimization (computer science)}}
    661 bytes (87 words) - 17:04, 11 January 2010
  • ...t. '''Problem identification'''. '''Tools''' isn't as important, though '''computer use''' is logically subordinate to it. '''Engineering in a social context'
    906 bytes (109 words) - 04:12, 5 October 2007
  • | publisher=Computer Business Review
    1 KB (155 words) - 22:41, 27 November 2008
  • {{r|Interpreter (computer)}}
    762 bytes (105 words) - 19:27, 11 January 2010
  • {{r|Computer science}}
    729 bytes (96 words) - 20:02, 11 January 2010
  • He was born in Romania and started to create computer apps at a young age.
    940 bytes (113 words) - 20:25, 4 February 2016
  • ...standard interfaces for system manageability, which allow the ecosystem of computer architectures to move away from proprietary interfaces. Products compliant
    932 bytes (112 words) - 10:38, 22 February 2009
  • {{r|Computer networking end-to-end protocols}}
    662 bytes (82 words) - 20:00, 11 January 2010
  • {{r|Computer network}}
    788 bytes (103 words) - 14:59, 20 March 2024
  • ...ent [[Hiroshi Yamauchi]] realized that a video game system, like any other computer, is only as useful as the software available for it. Yamauchi prioritized t
    3 KB (466 words) - 08:57, 27 July 2010
  • ...not its location; the user need not be aware if information moves from one computer to another, because the database will be updated along with the move so tha
    831 bytes (126 words) - 19:40, 14 June 2009
  • ...actual transmitting-receiving circuitry is in one package, while a common computer, display, audio, and any required graphics are in a separate unit. This is ...JTRS project, is often in the power and mounting requirements; the control computer and software may be largely common between a radio clipped to a soldier's u
    5 KB (799 words) - 16:23, 30 March 2024
  • {{r|Computer}}
    810 bytes (100 words) - 11:00, 11 January 2010
  • |rowspan="2"| '''College of Computer Management and Information Technology (CCMIT)''', A. Mabini<br /> |Bachelor of Science in Computer Science (BSCS)<br />
    5 KB (746 words) - 01:55, 30 November 2007
  • * [http://www-cs-faculty.stanford.edu/~uno/taocp.html The Art of Computer Programming] - the description of volume contents posted by Donald Knuth, o
    732 bytes (103 words) - 10:24, 12 October 2007
  • ...first-out (LIFO)]] access to its contents. Stacks are used extensively in computer science. As was mentioned earlier, stacks are used extensively in computer programming. Nonetheless, here are some noteworthy uses of stacks:
    3 KB (537 words) - 00:36, 9 February 2010
  • ...erence''' is a commonly observed pattern in [[RAM|memory]] accesses by a [[computer program]] over time. The idea is, that memory accesses that happen close t Locality of reference can be exploited by a computer's [[memory controller]] for drastic improvements in memory access times. I
    4 KB (634 words) - 04:17, 9 March 2010
  • In computer and network security &mdash; the two are very hard to separate in this cont | journal = ACM Transactions on Computer Systems
    4 KB (641 words) - 05:48, 8 April 2024
  • {{r|Computer network}}
    790 bytes (101 words) - 14:59, 20 March 2024
  • ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]]
    794 bytes (107 words) - 13:40, 29 April 2011
  • In [[computer science]], a '''formal parameter''' is a name by which a subroutine refers
    643 bytes (101 words) - 12:58, 26 September 2007
  • {{r|Computer science}}
    747 bytes (98 words) - 16:44, 11 January 2010
  • ...lane"<ref>{{MeSH|Tomography}}</ref> and [[computed tomography]] in which a computer helps reconstruct the images.
    682 bytes (100 words) - 10:51, 19 September 2009
  • A '''software bug''' is an error in a computer program. The term comes from hardware engineering, where a design flaw in a ...uses a program to "hang" (stop working or responding) or causes the entire computer to "freeze". Recent versions of Windows have become able to detect unrespon
    4 KB (591 words) - 08:31, 13 September 2009
  • {{r|computer science}}
    683 bytes (107 words) - 14:13, 9 January 2010
  • | product = Computer and Consumer Products The '''Microsoft Corporation''' is a [[computer]] [[software]] company founded in 1975 by [[Bill Gates]]. Microsoft sells s
    3 KB (343 words) - 13:19, 2 February 2023
  • == Warhammer Fantasy Computer Games == Several computer games were set in the Warhammer Fantasy world:
    6 KB (951 words) - 08:16, 22 April 2023
  • {{r|Personal computer}}
    806 bytes (104 words) - 10:19, 27 March 2023
  • Several end-to-end data transfer [[protocol (computer)|protocols]] run in the [[Internet Protocol Suite]]:
    837 bytes (108 words) - 14:33, 16 January 2010
  • {{r|Sinkhole (Computer network)}}
    814 bytes (105 words) - 18:35, 11 January 2010
  • ...can be loosely defined as "moving packets around" on a [[Computer network|computer network]], in order to allow various different sub-networks (or [[subnets]] ...a special-purpose computer, although it is possible to program a personal computer to perform the same functions of a router. Minimally, a router contains a [
    6 KB (985 words) - 12:34, 30 March 2024
  • {{r|Computer crime}}
    944 bytes (125 words) - 16:28, 19 October 2013
  • ...= OmegaT+ web page}}</ref> is a software project that provides a set of [[Computer Assisted Translation]](CAT) tools. These tools are intended for use by tran
    1 KB (135 words) - 01:57, 8 February 2010
  • {{r|Computer}}
    769 bytes (94 words) - 16:32, 18 March 2009
  • ...ocessing unit is a part of all [[personal computer]]s, most [[workstation (computer)|workstation]]s, and some [[web server|servers]]. A graphics unit can be d ...urer, and often only work for a specific model or set of models of GPU. A computer program (such as a [[video game|game]]) will generally use either [[OpenGL]
    6 KB (939 words) - 08:24, 22 April 2023
  • ...only used as an introduction to [[algorithm|algorithms]] for students of [[computer science]]. ...selection, by merging, and by distribution.<ref>Donald Knuth, ''The Art of Computer Programming'' Addison-Wesley, 1973, ISBN 0-201-03803-X.</ref>
    3 KB (470 words) - 15:50, 19 December 2007
  • A state diagram is an fundamental concept in computer science. States are nodes that have arrows that leave them for other notes.
    837 bytes (122 words) - 13:30, 7 February 2009
  • ...no independent processing power, but instead relies on the power of other computer(s) or resources that it is connected to via a network. Dumb Terminals are m
    3 KB (387 words) - 15:56, 14 March 2010
  • {{r|Computer networking reference models}}
    920 bytes (113 words) - 11:07, 11 January 2010
  • {{r|Computer science}}
    859 bytes (116 words) - 21:38, 11 January 2010
  • {{rpl|imagery (computer graphics)}}
    988 bytes (132 words) - 08:31, 24 September 2013
  • {{r|Computer architecture}}
    941 bytes (125 words) - 11:34, 11 January 2010
  • ...describe the main system [[memory (computers)|memory]] of an electronic [[computer]]. There have been many types of memory devices called "RAM", most of whic ...integrated circuits]] designed for use as main system memory on a personal computer come mounted on some type of module ([[SIMM]], [[DIMM]], etc) that is desig
    2 KB (385 words) - 23:25, 14 February 2010
  • ...rs]] also assist in the process of image analysis by using engineering and computer science principles to interpret images. ...Gillan MG, Agbaje OF, Wallis MG, James J et al.| title=Single reading with computer-aided detection for screening mammography. | journal=N Engl J Med | year= 2
    4 KB (584 words) - 23:45, 25 July 2011
  • ...puter]]s, punch cards were a widely used media for inputing information to computer systems. Clerks would use [[keypunch machines]] to punch information onto
    3 KB (422 words) - 14:31, 19 March 2023
  • ...andestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combatant targets” ...nal groups or clandestine agents against information and computer systems, computer programs, and data that result in physical violence where the intended purp
    5 KB (710 words) - 07:27, 18 March 2024
  • {{r|Computer networking reference models}}
    842 bytes (109 words) - 14:59, 20 March 2024
  • ...acks possible states that a computer could be in; there may be a way for a computer in one state to reach a subsequent state, but no way to return from the sec
    3 KB (478 words) - 08:09, 8 June 2009
  • ...s. Three generations of electronic switches have been used in the digital computer industry. ...t electronic [[computer|computers]]. When used as an "on/off" switch in a computer, vacuum tubes were also sometimes called electron valves, or just valves<re
    5 KB (763 words) - 09:15, 4 May 2024
  • In [[computer science]], an '''actual parameter''' is a name or value passed to a subrout
    675 bytes (99 words) - 18:41, 16 March 2024
  • A [[single player]] [[computer role-playing game]] developed by Bethesda Game Studios, and published by [[
    903 bytes (133 words) - 09:35, 26 September 2009
  • {{r|Computer networking application protocols}}
    1 KB (129 words) - 13:51, 18 February 2024
  • ...me. Half-Life has been named "game of the year" several times by different computer gaming magazines. == Impact on the computer game industry ==
    4 KB (664 words) - 08:42, 15 July 2013
  • '''Mathematica''' is a commercial [[computer algebra system]] with own programming language that supports functional and
    901 bytes (119 words) - 20:25, 20 September 2013
  • This is a list of [[computer]] [[operating system|operating systems]]:
    1 KB (109 words) - 18:12, 11 December 2009
  • {{r|Computer network}}
    965 bytes (125 words) - 15:51, 11 January 2010
  • ...o connect directly to the computers. To allow the necessary flexibility in computer connection, there were two means of making the actual cable connection: ...many foul oaths from installation engineers than it received bits from the computer. While the standard never changed, the usual fasteners were machine screws.
    7 KB (1,105 words) - 07:29, 18 March 2024
  • ...ript kiddie''' is a person who uses computer scripts or programs to attack computer systems and networks. One definition from ''BBC News'' describes the term a | title = Hackers - Heroes of the Computer Revolution
    6 KB (882 words) - 05:49, 8 April 2024
  • ...ng 2004 Classification (SE2004)''' is a classification created by the IEEE Computer Society and the Association for Computing Machinery (ACM) that presents wha *[http://sites.computer.org/ccse/ The Software Engineering 2004 website]
    3 KB (477 words) - 20:17, 25 October 2013
  • ...ally complex, as it uses a "track via missile" technique. The fire control computer constantly merges data from an active radar in the missile, sent by data li
    800 bytes (125 words) - 18:08, 1 April 2024
  • | journal = Lecture Notes in Computer Science journal = Lecture Notes in Computer Science |
    3 KB (367 words) - 05:49, 8 April 2024
  • {{r|Computer network}}
    1 KB (144 words) - 00:13, 21 January 2011
  • ...r limited question about the predictability of the future operation of a [[computer program]]: whether it is possible to tell, from just examining a particular ...exist'', which can reliably predict this aspect of the behavior of ''all'' computer programs. Specific programs may be predictable, but there will always exist
    6 KB (988 words) - 00:43, 6 February 2010
  • {{r|Computer network}}
    1 KB (138 words) - 20:51, 11 January 2010
  • {{r|Syntax (computer science)}}
    1,018 bytes (132 words) - 20:29, 11 January 2010
  • ...with Hierarchical Features: An Application to Go] - From the Department of Computer Science at the University of Toronto.
    1 KB (226 words) - 12:48, 17 February 2008
  • ...or, Apple Computer, is a type of interconnection generally used between a computer and its peripherals; it is not a local area network. Its main competitor is
    2 KB (352 words) - 07:31, 18 March 2024
  • ...es (shown in blue) that connect the eight nodes to the master serve as a [[Computer#How_computers_work:_the_stored_program_architecture|bus]]]] ...lf" (COTS) hardware such as [[personal computer|personal computers]] and [[Computer network|Ethernet switches]] to link the machines together so that they act
    4 KB (669 words) - 21:10, 12 February 2010
  • ...priate mechanisms to prevent interferences. Such media are used both for [[computer network]]s and [[telephony]], although the communications mechanisms are co
    988 bytes (146 words) - 14:42, 14 September 2008
  • ...erm has come to mean criminals who illegally break into [[Computer network|computer networks]] and systems.<ref>{{cite web | title = Hackers - Heroes of the Computer Revolution
    6 KB (943 words) - 05:48, 8 April 2024
  • '''Full Authority Digital Electronic Control (FADEC)''' refers to a family of computer-assisted control systems for vehicle engines, aircraft flight control, etc.
    987 bytes (152 words) - 16:58, 15 August 2008
  • {{r|Computer program}}
    873 bytes (138 words) - 11:02, 12 January 2009
  • ...specification, together with a compiler which creates machine code for a [[computer]], constitutes a [[programming language]]. ...programmer of the [[History_of_computing#Harvard_Mark_I_.281943.29|Mark I computer]]. Hopper, a pioneer along with several other women working on [[History_o
    7 KB (933 words) - 16:53, 16 February 2010
  • '''Deep Fritz''' is a multi-processor version of the [[computer chess]] engine [[Fritz (chess)|Fritz]] written by [[Frans Morsch]] and [[Ma
    865 bytes (134 words) - 07:28, 14 September 2013
  • ...or other hardware, and stored in read-only memory in the hardware. When a computer containing that NIC initializes, the default behavior is for the BIA addres Layer 2 networks based on bridge (computer network)|bridging directly track active MAC addresses and make forwarding d
    3 KB (527 words) - 07:31, 18 March 2024
  • ...were connected to the circuit board, allowing the replacement of chips. [[computer memory|Memory]] chips can usefully be replaced with larger memory chips, wh
    900 bytes (139 words) - 14:02, 27 November 2008
  • ...company in 2005. The ThinkPad was first conceived as a [[dedicated tablet computer|dedicated tablet]] without a keyboard, but it emerged mainly as a notebook ...Portable Computer.jpg|left|170px|The IBM 5100, the world's first portable computer.}}
    11 KB (1,618 words) - 10:12, 28 February 2024
  • {{r|Computer}}
    878 bytes (140 words) - 15:05, 1 October 2009
  • ...ic usage, with appropriate security controls, a user could ask a networked computer for the "battalion-level map" or the "brigade-level map", and get a display ...the cramped interior of a tank or fighter aircraft, or even on a handheld computer.
    3 KB (407 words) - 16:22, 30 March 2024
  • ...Kheir>{{cite book|author=Naim A. Kheir (Editor)|title=Systems Modeling and Computer Simulation|edition=2nd Edition|publisher=CRC Press|year=1996|id=ISBN 0-8247 ...on of all possible states of the model would be prohibitive or impossible. Computer models were initially used as a supplement for other arguments, but their u
    14 KB (1,986 words) - 17:07, 22 March 2024
  • ...collect valuable information. Human beings are often more vulnerable than computer systems, mainly because of lack of education.
    1 KB (178 words) - 02:18, 7 April 2024
  • {{r|single chip computer}}
    934 bytes (147 words) - 20:36, 27 November 2008
  • In [[computer science]], '''distributed computing''' is a strategy for improving resource ...s]], the computers in a distributed computer may be connected over large [[computer network|networks]], and may be owned by many people or institutions. Sever
    11 KB (1,565 words) - 15:12, 10 June 2010
  • {{r|single chip computer}}
    950 bytes (106 words) - 12:03, 6 March 2024
  • ...nce of communications]] is pushing the concepts of telecommunication and [[computer network]] to be interchangeable.
    1 KB (147 words) - 17:26, 8 January 2009
  • *Computer aided design (CAD) / manufacture (CAM)
    1 KB (161 words) - 23:40, 1 September 2009
  • {{r|Computer graphics}}
    968 bytes (151 words) - 18:43, 27 February 2010
  • | url = http://s2017.siggraph.org/past-computer-animation-festival-award-winners.html | title = PAST COMPUTER ANIMATION FESTIVAL AWARD WINNERS
    4 KB (432 words) - 13:21, 25 March 2022
  • {{r|Computer program}}
    941 bytes (149 words) - 13:03, 5 July 2022
  • {{r|Computer}}
    1 KB (162 words) - 07:33, 20 April 2024
  • {{r|computer art}}
    943 bytes (149 words) - 18:50, 21 January 2009
  • * Communicating about technical or specialized topics, such as computer applications, medical procedures, or environmental regulations.
    1 KB (168 words) - 18:14, 18 April 2011
  • ...mically designed office furniture and equipment (such as office chairs and computer input devices) can drastically reduce work-related injuries and employee ab ...opics include mental workload, decision-making, skilled performance, human-computer interaction, human reliability, work stress and training as these may relat
    6 KB (822 words) - 08:44, 3 March 2024
  • {{r|Computer graphics}}
    998 bytes (154 words) - 16:45, 7 September 2010
  • {{r|Computer graphics}}
    982 bytes (154 words) - 07:27, 24 February 2010
  • ...nd. Instead each round uses eight copies of the same S-box, so that 32-bit computer instructions can do eight 4-bit operations in parallel. Each of the eight S
    903 bytes (147 words) - 05:49, 8 April 2024
  • ...age|Simple_Virtualization_Diagram.png|right|275px|A "computer running in a computer"}} ...' is a broad term that usually refers to the abstraction of resources on a computer. Usually this is accomplished using either a [[virtual machine]] or an [[o
    8 KB (1,301 words) - 10:56, 6 January 2024
  • ...riginally intended as a mathematical formalism and predates the electronic computer, it can be seen as the world's first formalized programming language. The
    3 KB (449 words) - 15:23, 12 August 2008
  • {{r|Computer graphics}}
    1,023 bytes (159 words) - 06:17, 8 February 2010
  • ...d history. According to their profile, the Center uses "digital media and computer technology to change the ways that people—scholars, students, and the gen
    1 KB (162 words) - 22:41, 6 December 2007
  • ...gs sniffing one another, the focus here is on self-organizing networks for computer-controlled networks. For example, two transportation safety systems, the [[
    1 KB (160 words) - 12:12, 1 May 2024
  • | series = Lecture Notes in Computer Science
    1 KB (118 words) - 06:04, 15 August 2010
  • ...alist.html What Makes a Journalist?], March 5, 2005. Comments on the Apple Computer case against bloggers
    2 KB (261 words) - 12:25, 4 May 2009
  • {{r|Computer graphics}}
    1 KB (160 words) - 04:18, 8 September 2010
  • === Computer science === {{main|List of publications in computer science}}
    13 KB (1,906 words) - 17:33, 25 October 2009
  • ::''This article is about the legendary wooden horse. For computer viruses, see [[malware]].'' ...terminology to describe [[malware]] which tricks a user to let into one's computer by appearing [[innocent]] but which causes damage afterwards.
    4 KB (633 words) - 09:39, 22 February 2023
  • ===Systems in information and computer science=== ...ence]] and [[information science]], '''system''' could also be a [[Method (computer science)|method]] or an [[algorithm]]. Again, an example will illustrate: T
    7 KB (1,049 words) - 22:04, 14 February 2010
  • ...3, followed by the breakthrough Macintosh in 1984, the first mass-produced computer with a GUI. ...ition, he helped to develop the visual effects industry when he funded the computer graphics division of George Lucas's Lucasfilm in 1986, named Pixar.
    7 KB (1,078 words) - 10:33, 26 July 2023
  • ...as been nicknamed [[Silicon Valley]] due to the large concentration of the computer and electronic industry in the valley. The northern end of San Jose's incor Many computer-industry companies have operations or headquarters in San Jose, including [
    3 KB (425 words) - 10:22, 27 March 2023
  • {{r|Computer network}}
    1 KB (141 words) - 14:59, 20 March 2024
  • == Use in Computer Science ==
    1 KB (232 words) - 03:30, 6 November 2009
  • ...cations in [[biotechnology]]. They can be used to dissipate heat from tiny computer chips. The strength and flexibility of carbon nanotubes makes them of poten ...act as a [[diode]], suggesting the possibility of constructing electronic computer circuits entirely out of nanotubes. Nanotubes have been shown to be [[super
    3 KB (427 words) - 10:31, 28 June 2023
  • ...ted control]] levels. [[circuit switching|Circuit-switched]] and [[bridge (computer network)|bridged]] classified networks, however, can interconnect with the
    1 KB (151 words) - 10:20, 8 April 2024
  • A '''fork''' of a [[computer software]] project is generally a version of the original software that mak
    1 KB (163 words) - 07:01, 14 September 2013
  • ...dicine]] due to its exercise of higher brain function. [[Computer science|Computer scientists]] have been engaged in the study of human languages for the purp ==Formal, mathematical, and computer languages==
    8 KB (1,346 words) - 09:48, 30 April 2024
  • '''Massively multiplayer online games''', or MMOG's, are [[video game|computer games]] in which many players are simultaneously inhabiting the same game e
    1 KB (163 words) - 04:46, 7 March 2024
  • '''Linux Mint''' is a [[linux]]-based computer operating system, based on the [[Debian]] and [[Ubuntu]] distributions. It
    1 KB (166 words) - 09:02, 2 March 2024
  • '''SNOBOL''' is a [[computer]] [[programming language]] especially meant for string manipulation. It evo
    1,014 bytes (156 words) - 06:09, 14 September 2013
  • {{r|Computer graphics}}
    1 KB (165 words) - 20:48, 9 February 2009
  • ...s produced with a [[pen]], but other ways include chisels (on stone) and [[computer]]s.}} ...uments and material, such as [[pen]] and [[paper]], chisel and stone, or [[computer]]s. The [[Language|language]] itself is either [[spoken language|spoken]] o
    3 KB (498 words) - 13:48, 18 February 2024
  • The 432 was not a [[single chip computer]].<ref name=Dvorak2006-11-25/>
    1 KB (193 words) - 03:26, 28 November 2008
  • {{r|Single chip computer}}
    1 KB (166 words) - 22:12, 27 November 2008
  • .... There are many other examples which can be found in the marketplace for computer- and internet-based technologies.
    1 KB (173 words) - 21:18, 2 February 2009
  • ...ither end of the network link may be using different operating systems and computer languages. Software systems that use (different) IDLs include Sun's ONC RP
    1 KB (157 words) - 01:14, 7 February 2010
  • ...A global consortium that develops data representation standards for use in computer software.
    1 KB (152 words) - 05:07, 9 October 2010
  • {{r|Computer}}
    1 KB (174 words) - 15:29, 7 October 2020
  • .... Steeb: ''Continuous Symmetries, Lie Algebras, Differential Equations and Computer Algebra'', second edition, World Scientific, 2007, ISBN 978-981-270-809-0
    1 KB (158 words) - 10:59, 27 November 2011
  • ...'''CT scan''' or '''CAT scan''') is a form of [[tomography]] that uses a computer algorithm to reconstruct the image. ...hy]]'''. This is defined as "tomography using [[x-ray]] transmission and a computer algorithm to reconstruct the image."<ref name="MeSH-CTX">{{cite web |url=ht
    6 KB (785 words) - 02:22, 15 May 2010
  • {{r|Computer program}}
    1 KB (180 words) - 06:34, 24 July 2009
  • ...heory]], an example is the ordering of massive [[number]]s of individual [[computer]]s via local interactions to achieve a global goal.<ref name=system/>
    1 KB (178 words) - 10:21, 25 November 2013
  • ...Spy agencies adapt social software, federated search tools"], ''Government Computer News'', September 25, 2006.
    2 KB (227 words) - 15:21, 21 January 2009
  • {{r|Computer graphics}}
    1 KB (181 words) - 06:14, 5 February 2010
  • ...www.gamasutra.com/features/20070411/barton_05.shtml |title= The History of Computer Role-Playing Games Part III: The Platinum and Modern Ages (1994-2004) |publ
    2 KB (216 words) - 06:22, 26 September 2009
  • ...er interface such as a digitised video image presented on the display of a computer.
    1 KB (199 words) - 19:29, 26 January 2008
  • ...xample, will typically include the ability to play [[music]] and display [[computer graphics|graphics]] quickly. A server, on the other hand, is intended to b ...M]] in 1983 introduced the [[IBM PC]]. This development prompted aspiring computer manufacturers such as Compaq to legally reverse engineer the IBM BIOS (the
    15 KB (2,382 words) - 08:45, 22 April 2024
  • ...g private key encryption is where, and how, to safely store the key on the computer so that intruders will not be able to obtain it, if they should gain access ...y (private to one computer) is used for decrypting. This allows users on a computer network to send their public ''encrypt'' key to strangers, who can then use
    5 KB (879 words) - 09:41, 28 September 2023
  • '''Frame relay''' is a transmission system used to support [[computer network]]s, operating in [[locality of networks|wide area network|Wide Area
    1 KB (161 words) - 19:22, 15 September 2008
  • ...mely short range. Among its applications is replacing the cables between a computer and its peripherals, so minimal range is desired to avoid interference with In the context of a single-person network, as with [[wearable computer]]s, <blockquote>The trick is to allow "wearable" electronic devices to exch
    4 KB (609 words) - 21:25, 23 May 2010
  • ...www.gamasutra.com/features/20070411/barton_05.shtml |title= The History of Computer Role-Playing Games Part III: The Platinum and Modern Ages (1994-2004) |publ
    2 KB (252 words) - 07:49, 26 September 2009
  • The case got extensive coverage in the computer industry press,<ref>http://www.wired.com/politics/law/news/2001/12/49272 <b
    2 KB (272 words) - 14:20, 8 March 2024
  • ...The series was notable for being one of the first to make exclusive use of computer-generated special effects for all space sequences.
    1 KB (157 words) - 01:21, 19 February 2010
  • ...lly in your web browser and the game web page can be saved locally on your computer for offline use. The game rules and [https://blog.jrheard.com/quinto-resu ...within 125 points of actually winning the game against the computer. The computer is so tough to beat because it can quickly do an exhaustive search of every
    7 KB (1,171 words) - 09:50, 20 August 2023
  • {{r|Single chip computer}}
    1 KB (182 words) - 12:05, 6 March 2024
  • ...most famous for being the author of one of the most importantant books in computer science and engineering called Cybernetics. Basically, it lays the mathemat
    1 KB (153 words) - 04:43, 24 February 2009
  • {{r|Single chip computer}}
    1 KB (185 words) - 12:03, 6 March 2024
  • ...rect; an attacker subverts a computer by whatever means and then uses that computer and its data to perform impersonations. Often taking over a machine gives t ...[[PGP]] is a partial defense against this &mdash; simply getting into your computer and email account does not allow an attacker either to read encrypted email
    6 KB (903 words) - 05:49, 8 April 2024
  • ...also used by hackers to break into other networks by simulating a trusted computer of the network.
    1 KB (203 words) - 01:48, 31 January 2009
  • {{r|Computer network}}
    1 KB (173 words) - 14:49, 4 April 2024
  • {{rpl|Computer}}
    2 KB (204 words) - 17:02, 3 January 2014
  • {{r|Computer chess}}
    1 KB (195 words) - 16:39, 17 March 2010
  • *Participation in developing new radiopharmaceuticals, microchips, computer software, original new designs for small cyclotrons, remote-controlled equi
    1 KB (184 words) - 21:20, 7 May 2010
  • ...L. (2004) [http://books.google.com/books?id=mEKfvtxmn9MC Automatic Quantum Computer Programming: A Genetic Programming Approach (Google Books Preview)]. Spring
    2 KB (216 words) - 19:42, 18 October 2013
  • There is no such thing as a SIPRNET computer or terminal. SIPRNET is a network, and its users typically connect their co ...eys, which allow secure dialup connections to SIPRNET. The user connects a computer to the secure telephone, which dials into a SIPRNET access server and the s
    9 KB (1,378 words) - 07:35, 18 March 2024
  • ...rs, servers, routers for access outide the LAN, and other computer network|computer network devices, within a relatively close distance of one another. LANs ma ...ts are connected by physical media, the typical maximum distance between a computer and a device connecting it to the LAN does not exceed 100 meters, although
    7 KB (1,023 words) - 07:32, 18 March 2024
  • {{r|Computer simulation}}
    1 KB (190 words) - 15:53, 4 April 2024
  • * A specialized computer (or group of computers - see [[cluster]]) whose main task is to host web si
    1 KB (186 words) - 14:41, 24 October 2007
  • In [[mathematics]] and [[theoretical computer science]], a '''partial function''' on a set is a function whose [[domain o
    1 KB (186 words) - 10:22, 19 June 2009
  • In [[computer science]], '''constant folding''' is a [[compiler]] [[optimization]] in whi Suppose that a computer program had an expression of the form <math>A \times X \times B</math>, whe
    3 KB (572 words) - 07:34, 26 September 2007
  • ...ithms]] integrated into the Co-Pilot electronic framework of the vehicle’s computer system. Using single or multiple [[processors]], the components run on sepa ...will find the car’s location and relay this information to the CarPC. The computer will use wireless communications to notify other cars of its location in re
    7 KB (1,090 words) - 08:23, 9 September 2020
  • ...n may very well be a software function in a [[router]], or general-purpose computer with routing and telephone switching software. ''Asterisk'' is a widely use
    1 KB (198 words) - 15:31, 26 May 2009
  • This is a list of '''seminal concepts in [[computer science]]'''. ...r instructions for faster throughput (invention of); but I don't know what computer actually did it first
    3 KB (490 words) - 10:26, 30 March 2024
  • ...nguage''' is a method of abstracting [[machine code]] instructions for a [[computer]] into commands recognizable by a human. Instead of dealing directly with
    1 KB (201 words) - 16:38, 9 January 2010
  • ...s) imagination or, less usually, by taking strings randomly generated by a computer. Example: Klingon.
    2 KB (210 words) - 13:56, 15 January 2015
  • ...monly included in free-to-play games, and some well-known battle passes on computer games include [[Fortnite]], [[Dota 2]] and [[VALORANT (video game)]].
    1 KB (218 words) - 01:32, 12 March 2024
  • ...s is the case, or i am misunderstanding you? When I go to print mode on my computer the URL is shown. For example: On the computer screen this will be viewed as:
    4 KB (663 words) - 13:50, 25 September 2008
  • ..."board" game chess. Chess is chess, whether it is played on a board, on a computer, or by heart. --[[User:Peter Schmitt|Peter Schmitt]] 23:34, 25 March 2010 ( ::*Chess played on a computer is a game.
    12 KB (2,140 words) - 00:16, 8 March 2024
  • ...ite for reasons other than monetary gain. The [[Personal computer|personal computer]], [[Word processing|word processing programs]], [[Print on demand|print o
    3 KB (493 words) - 14:47, 24 January 2014
  • ...DOS''' or '''DoS''', attack does not do that; it just tries to deny normal computer services to the authorised users. ...l, they are also easier to execute than an attack that aims at getting the computer to do something for the enemy.
    6 KB (1,051 words) - 05:48, 8 April 2024
  • '''Java''' is an [[object]]-oriented [[computer]] [[programming language]] now managed as [[Open_source_software|open sourc ...ent|publisher=The College Board|year=2007|accessdate=2007-05-17}}</ref> in Computer Science. See the [[Java_platform#Java_SE_Platform_Releases|Java release hi
    8 KB (1,209 words) - 18:49, 4 August 2010
  • ==Computer Help==
    5 KB (706 words) - 15:57, 17 August 2011
  • ...i'' or ''styluses'') is a [[writing utensil]]. The word is also used for a computer accessory ([[Personal digital assistant|PDAs]]). It usually refers to a nar ...natural oil from one's hands on the screen, or produces brushstrokes in a computer screen, respectively.
    3 KB (516 words) - 22:27, 14 November 2007
  • ...he domain http://www.turing.org.uk is dedicated to ALAN TURING, founder of computer science.
    2 KB (262 words) - 09:56, 23 June 2012
  • ...hide all the complexities of the underlying hardware from people using the computer. Even gadgets such as [[cell phones]] have an operating system, although t ...vers]] (a driver program is an expert on some piece of hardware within the computer, such as the disk drive or the mouse). The kernel also needs assistance fr
    16 KB (2,593 words) - 09:55, 19 August 2014
  • The site was begun in October, 2007, by computer programmer John Breen. It started with only the English Vocabulary game. Af
    1 KB (180 words) - 15:22, 18 March 2009
  • ...systems: methodologies and applications''. Volume 3464 of Lecture notes in computer science, State-of-the-art survey, Lecture notes in artificial intelligence.
    2 KB (245 words) - 20:04, 30 March 2010
  • Physics, Mathematics, Computer Science, Quantitative Biology, Quantitative Finance and Statistics).
    1 KB (210 words) - 05:33, 25 October 2009
  • warfare, computer network operations, psychological operations, military deception, and ...sures''' (ECM). Purely electronic or #computer network operations|software/computer network actions are called '''soft kill''', while physical destruction of e
    10 KB (1,449 words) - 07:30, 18 March 2024
  • {{r|Computer graphics}}
    1 KB (216 words) - 05:25, 20 April 2010
  • ...ieved. In the computer field, usability falls under the heading of [[human-computer interaction]]. In engineering, it is considered part of [[industrial design ...a principle of good human interface design, which goes back many years in computer science, often called "the principle of least astonishment."<ref name=Seeba
    8 KB (1,186 words) - 09:00, 28 April 2024
  • ...d weapon used in active combat. The definition does blur with some modern, computer-controlled mines that do not themselves explode, but release a [[guided mis ===Computer-controlled mines with complex sensors===
    7 KB (1,013 words) - 17:23, 8 February 2011
  • ...e iPhone, which includes elements of the camera, telephone, videorecorder, computer terminal, and audio recorder.
    3 KB (527 words) - 22:54, 24 January 2011
  • ...ience]], [[software engineering]], [[geographical information systems]], [[computer graphics]] and [[hazardous material]] (radiological, chemical, biological) ...rations center with uninterruptible power, backup power generators, robust computer systems and a staff on-duty or on-call 24 hours per day and 7 days a week.
    5 KB (746 words) - 10:43, 8 April 2024
  • ...blic School became the first school in the state of New South Wales to use computer-assisted learning.
    1 KB (217 words) - 20:32, 7 December 2010
  • In [[computer science|Computer Science]], '''register allocation by graph coloring''' is a [[graph theory| Since only a small percentage of the variables within a computer program are used at one time, there is an opportunity to place multiple var
    9 KB (1,338 words) - 10:00, 16 July 2013
  • ...angular measurement. Increasingly, manual drafting is being replaced by [[computer aided design]].
    1 KB (229 words) - 10:18, 18 May 2010
  • *[[modeFRONTIER]] - multidistciplinary design optimization software for computer-aided engineering.
    2 KB (239 words) - 06:44, 20 March 2008
  • ..., Inc.]], and has risen to prominence as an operating system for [[server (computer)|server]]s; [[Netcraft]] reported in September 2006 that seven of the ten m ...rs]] to [[mobile phone|mobile phones]], and has a foothold in the personal computer and business desktop markets.
    6 KB (950 words) - 21:13, 12 February 2010
  • ...o connect directly to the computers. To allow the necessary flexibility in computer connection, there were two means of making the actual cable connection: ...many foul oaths from installation engineers than it received bits from the computer. While the standard never changed, the usual fasteners were machine screws.
    6 KB (961 words) - 06:05, 17 March 2024
  • ...|Watson Jeopardy demo.jpg|right|300px|The set of Jeopardy! with Watson the computer between two Jeopardy! champions}} In February 2011, [[IBM]] had a computer called Watson play on Jeopardy! against Jeopardy! champions Ken Jennings an
    5 KB (891 words) - 02:10, 22 March 2024
  • ...oads, or [[data]]. The communications on the network follow a [[Protocol (computer)|protocol]] that determines how [[data encoding|data is encoded]], how [[me ...tion the networked devices are referred to as "devices" or "nodes". Today, computer networks also contain devices such as intelligent sensors or actuators that
    15 KB (2,278 words) - 05:21, 8 March 2024
  • Some [[virus (computers) | viruses]] make the victim computer part of a botnet. A famous example was the Storm botnet <ref>{{citation ...ts can also be built by actively '''scanning for insecure machines'''. Any computer can be attacked in this way, but one target is common enough and often inse
    5 KB (811 words) - 08:57, 22 April 2024
  • [[SQL]] injection is an attack mechanism used against computer applications. Using SQL injection attackers attempt to manipulate database
    2 KB (252 words) - 04:26, 7 October 2013
  • When passwords are stored on a computer, it is essential that they be kept secret. To do so, programmers apply ''' ...e transmitting it and appended to the file transmission, and the receiving computer can also hash the file, compare its computed hash with the transmitted hash
    4 KB (586 words) - 15:45, 8 April 2024
  • ...es taught, in universities, and has had enormous influence on the field of computer programming. Lisp derives some of its ideas from [[Alonzo Church]]'s [[lam ...p programming language, since it shows very few of its important features. Computer custom dictates that we write it down, however:
    9 KB (1,405 words) - 08:29, 2 March 2024
  • ...s an [[cryptography#two-way encryption|encrypted]] end-to-end [[protocol (computer)| protocol]] that runs between [[World Wide Web]] browsers (i.e., [[Hyperte
    1 KB (210 words) - 05:49, 8 April 2024
  • '''Unit testing''' of computer [[software]] ensures that a component of a [[computer program]] works as intended. For example, a [[square root]] function should ...risky venture into a valuable and risk-free process. The structure of the computer program can be changed radically, with no chance of introducing [[software
    5 KB (846 words) - 05:35, 23 July 2008
  • ...Yet another set of functions multipurpose internet mail extensions (MIME (computer), identifies the type of content inside the electronic envelope, such as te ...</ref> Next, the client needs to be able to identify the "language" that a computer must understand the content: the media type.<ref name=RFC2046>{{citation
    4 KB (596 words) - 16:23, 30 March 2024
  • A '''honeypot''' is a computer, attached to a network, intended to attract the malicious interest of [[mis
    1 KB (234 words) - 05:48, 8 April 2024
  • ...ience]]" by many authors. Certainly, ''AI'' has its strongest roots within computer science, but it also has an interdisciplinary character that both draws fro * [[Ontology (computer science)| Ontologies]]
    9 KB (1,250 words) - 19:40, 18 October 2013
  • A '''Hackintosh''' is a computer using non-Apple branded hardware that runs a version of OS X that has been ...le provided a supported method for end users to dual boot an Apple branded computer with OS X and Windows. However, Apple has continued to refuse to support th
    9 KB (1,488 words) - 17:15, 17 September 2020
  • ...ta to digital data. The digital data transmitter and receiver is usually a computer, but could be a specialized device such as a digital telephone.
    1 KB (230 words) - 20:22, 27 August 2008
  • * [[Computer algebra system]]
    2 KB (247 words) - 06:00, 7 November 2010
  • ...[Hawaii Pacific University]], and was designed for information systems and computer science courses.
    1 KB (187 words) - 19:28, 7 August 2009
  • Thankfully, there are some software programs that can scan your computer, identify and remove spyware. Some of the popular freely available antispyw
    2 KB (272 words) - 05:49, 8 April 2024
  • ...ural GOMS Language, it is a variation of the [[GOMS]] technique in [[human computer interaction]]. ...l GOMS model methodology for user interface design|title=Handbook of Human-Computer Interaction|editor=Martin Helander|publisher=Elsevier Science Publishers|ye
    4 KB (568 words) - 01:02, 7 November 2013
  • * <math>\bar{A} = \{x \in \Sigma^* ~|~ x \not\in A\}</math> ([[complement (computer language)]])
    2 KB (270 words) - 23:28, 22 October 2008
  • ...principally linked large time-sharing computers; there were no [[personal computer]]s, [[local area network]], or routing within organizations. "Classless Routing (CIDR)", Section 4.3.2 in Computer Networks, 4th ed., Peterson & Davie (2007).
    4 KB (587 words) - 14:57, 20 March 2024
  • A '''datagram''' is a self-contained packet of computer-readable information that uses the more common means of packet switching in
    1 KB (217 words) - 15:19, 28 September 2008
  • ...d, or to give examples of algorithms. Their use is pretty much limited to computer science articles. They are not used to supply the code for the articles th
    1 KB (229 words) - 14:44, 4 August 2008
  • ...dl=GUIDE&CFID=31545796&CFTOKEN=18757936 Telenet inaugurates service],''ACM Computer Communications Review,''Stuart L. Mathison, 1975</ref> ===Computer Access===
    6 KB (931 words) - 05:19, 31 May 2009
  • ...an "negative, positive, and 0". (It is, however, certainly possible for a computer to determine whether an integer value is truly positive.) ...s of integers, such as [[bignum]]s, can store any integer that fits in the computer's memory. Other integer datatypes are implemented with a fixed size, usual
    10 KB (1,566 words) - 08:34, 2 March 2024
  • ...nsus based and does not use a rigid [[computer networking reference models|computer networking reference model]] such as the [[Open Systems Interconnection Ref ...hard requirement to implement particular technical methods, there is no [[computer networking reference models|single required architectural reference model]]
    6 KB (843 words) - 03:23, 14 February 2010
  • Computer scientists Tom De Wolf and Tom Holvoet (2005) proposed the following "worki ...d crystal growth (Haken 2008) and perhaps the cosmos itself (Smolin 1998). Computer scientists have developed methodologies and applications for software with
    8 KB (1,083 words) - 17:39, 25 November 2013
  • In [[mathematics]] and [[computer science]] '''idempotence''' is the property of an operation that repeated a
    2 KB (242 words) - 13:20, 18 November 2022
  • ...ly funds and runs the company. John Carmack is a developer of interactive computer games. Games he has developed include [[Doom]] and [[Quake (game series)|Q ...: "Armadillo Aerospace is a small research and development team working on computer-controlled LOX/ethanol rocket vehicles, with an eye towards manned suborbit
    4 KB (559 words) - 10:19, 30 July 2023
  • ...t Protocol (SNMP)''' is the fundamental [[network management]] [[protocol (computer)|protoco]] of the [[Internet Protocol Suite]]. SNMP itself is indeed quite
    2 KB (241 words) - 10:26, 25 September 2008
  • ...und the patient to capture images at multiple positions along the arc. The computer is then used to reconstruct the transaxial, sagittal, and coronal images fr
    2 KB (244 words) - 05:45, 10 February 2011
  • The mortar carrier has a M32 Lightweight Handheld Mortar Ballistic Computer, [[VRC-91|AN/VRC-91F]] radio, [[FBCB2]] and [[EPLRS]] network computers, an
    2 KB (259 words) - 15:37, 8 April 2024
  • ...can be represented by fewer ''characters'' than in its original form. In [[computer science]] data compression is mainly used to reduce the memory needed to st
    2 KB (304 words) - 04:19, 29 December 2007
  • In [[computer science]], and particularly in [[Unix]]-like [[operating system]]s, the ''' :* '''/bin''' -- Stands for "[[computer program|binaries]]"; Contains some fundamental utilities needed by a system
    4 KB (692 words) - 19:24, 26 July 2008
  • '''Multi-core''' systems are computer systems in which two or more processors share the bus, memory and other per
    2 KB (248 words) - 17:18, 10 June 2010
  • ...ffer, overwriting other data. This error is the most commonly exploited [[Computer security]] flaw, and its prevalence is due to the common use of languages s A software execution [[stack]] exists for every process running on a computer. Parts of the stack contain program variables, and other parts contain info
    9 KB (1,329 words) - 05:48, 8 April 2024
  • * A [[Vatican]] computer was used to remove information proving a link between [[Northern Ireland]]
    2 KB (220 words) - 09:37, 14 September 2013
  • | journal = COMPUTER COMMUNICATION REVIEW
    2 KB (197 words) - 16:17, 23 September 2009
  • publisher=U.S. Air Force Academy, Department of Computer Science [http://www.usafa.af.mil/df/dfcs/ website]| ...a port of Ada to the Microsoft .NET Framework, free from the Department of Computer Science at the United States Air Force Academy under the terms of the GNU g
    11 KB (1,522 words) - 03:53, 17 March 2024
  • *702 Computer Systems Squadron, Tyndall AFB
    1 KB (210 words) - 01:55, 27 March 2024
  • ...ayer's main objectives are building a diverse economy and conquering every computer opponent. The player begins each map with a headquarters, that holds materi
    1 KB (239 words) - 08:16, 22 April 2023
  • *Weapons computer to Missile 4, here is your target... *Missile 4 to weapons computer: understood
    9 KB (1,278 words) - 07:32, 18 March 2024
  • In [[computer science]], a '''pointer''' is the [[memory]] address of some other data. M ...orm]] or [[C sharp (programming language)|C#]], all variables of [[object (computer science)|object type]] are actually implemented as pointers, though program
    5 KB (695 words) - 20:34, 21 January 2009
  • ...nction, then that value is never evaluated. It could (normally) cause your computer to crash and spew forth a couple of pages of diagnostics of the internal "c ...uter to track it for you. This is what static typing is about; getting the computer to keep track of the details of "what kind of value is this supposed to be?
    6 KB (958 words) - 22:25, 25 January 2011
  • ...n is studied in many fields, including [[psychology]], [[ethology]], and [[computer science]]. * Sholom Weiss and Casimir Kulikowski (1991) ''Computer Systems That Learn'', Morgan Kaufmann. ISBN 1-55860-065-5
    5 KB (628 words) - 15:27, 25 April 2008
  • *{{cite book|author=Allen B. Tucker|title=Computer Science Handbook|publisher=CRC Press|date=2004|isbn=158488360X|page=12.19}}
    2 KB (259 words) - 17:10, 28 October 2008
  • One of the means of carrying out a hostile attack against computers and computer networks is the '''amplification attack'''. In such an attack, the [[miscre
    2 KB (255 words) - 05:49, 8 April 2024
  • ...TCracker has been making a name for himself as a professional disc jockey, computer programmer, graphics designer and webmaster. ===Ties to the Computer "Underworld"===
    6 KB (942 words) - 08:21, 15 March 2023
  • ...ay have heard [[Douglas Engelbart]], a co-[[inventor]] of the mechanical [[computer mouse]], discuss the projected downscaling of [[integrated circuit]] size i ...for the rapid advance in computing power per [[unit cost]] in a variety of computer-related technologies, such as [[Hard Disk|hard disk]] storage cost per unit
    7 KB (1,038 words) - 17:26, 18 September 2010
  • ...rson at Harvard, APL started out as a compact pseudocode only on paper for computer
    2 KB (254 words) - 06:06, 28 December 2009
  • ...particular item &mdash; a character of text in a manual system, a byte or computer word in an electronic version. The receiver has an identical pad to use in ...arithmetic]]; each page was used only once, after which it was destroyed. Computer implementations typically use exclusive-or (XOR) to combine plaintext and p
    12 KB (1,878 words) - 05:48, 8 April 2024
  • ...or sequence. It is often used in particular applications in [[physics]], [[computer science]], [[engineering]] and other [[applied sciences]].
    2 KB (354 words) - 20:39, 20 February 2010
  • ...SBN 1884777805. An excellent Perl text that doubles as an introduction to computer programming--not that programmers widely recommend Perl as a first programm
    2 KB (209 words) - 06:11, 8 November 2010
  • *{{cite book | last=Halsall | first = Fred | title=Computer Networking and the Internet | edition = fifth edition | year = 2005 | origy
    2 KB (311 words) - 03:12, 2 December 2009
  • In [[computer science]], a '''stack frame''' is a [[memory management]] strategy used to ...ocated stack space in Mac OS X) in Apple Developer Network|publisher=Apple Computer|year=2005|
    10 KB (1,573 words) - 11:37, 6 February 2024
View ( | ) (20 | 50 | 100 | 250 | 500)