Search results
Jump to navigation
Jump to search
- {{r|Computer science}} {{r|Computer networking reference models }}874 bytes (108 words) - 14:36, 25 June 2024
- ...most certainly deserves to be recognized to be the first modern electronic computer. However, Zuse was in a chaotic German wartime environment and lacked offic ...ter was the first designer to propose [[pipelining]] the computations of a computer [[CPU|processor]]. In 1949, Zuse formed Zuse KG, where he worked until 1962 KB (226 words) - 08:25, 8 June 2009
- Prestigious award in [[computer science]], presented by the [[Association for Computing Machinery]]<ref>[ht240 bytes (31 words) - 15:36, 10 August 2020
- In computers and computer security, occurs when more data is written to a memory buffer than can fit160 bytes (25 words) - 23:56, 29 June 2009
- ...technology and consumer electronics. It was formerly called the European Computer Manufacturers Association (ECMA). Among other important standards, it is t ECMA manages many of the standards having to do with interoperability of computer software, including the standard specifications for various programming lan827 bytes (111 words) - 12:18, 17 April 2023
- {{r|Computer Go}} {{r|Computer}}823 bytes (105 words) - 11:04, 11 January 2010
- ...Finlay, J., Abowd, G., Beale, R., [http://www.hiraeth.com/books/hci/ Human Computer Interaction] , Prentice Hall, 1993 ...M. Baecker, J. Grudin, W. A. S. Buxton, S. Greenberg: ''Readings in Human-Computer Interaction: Towards the Year 2000.'' 1995, San Francisco, CA: Morgan Kaufm1 KB (193 words) - 01:04, 7 November 2013
- A computer industry organization that develops and promulgates architectures and inter255 bytes (27 words) - 10:37, 22 February 2009
- ...that facilitates [[symbolic mathematics]]. The core functionality of any computer algebra systems is manipulation of mathematical expressions in symbolic for Typical symbolic manipulations that can be performed by ''computer algebra systems'' include:1 KB (164 words) - 14:01, 18 January 2008
- An inexpensive subnotebook computer intended to be distributed to children in developing countries around the w195 bytes (26 words) - 09:57, 14 September 2009
- ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].176 bytes (22 words) - 16:46, 7 September 2010
- {{r|Computer networking media sharing protocols}} {{r|Computer networking reference models}}709 bytes (90 words) - 17:21, 11 January 2010
- The set of nasty things that an attacker installs on a computer system after he or she acquires administrator privileges, or in Unix terms190 bytes (29 words) - 19:07, 2 April 2009
- {{r|Relaxation (computer graphics)|In computer graphics}}414 bytes (48 words) - 11:46, 31 May 2009
- {{r|Computer network}} {{r|Computer networking application protocols}}680 bytes (84 words) - 19:33, 31 July 2008
- [[protocol (computer) | Protocol]] and administrative convention to manage the interaction of tw187 bytes (24 words) - 01:00, 15 July 2008
- Sub-field of computational linguistics that investigates the use of computer software to translate text or speech from one natural language to another.188 bytes (25 words) - 18:26, 12 September 2009
- {{r|Computer networking application protocols}} {{r|Protocol (computer)}}698 bytes (88 words) - 18:27, 11 January 2010
- The taking of a command (i.e., a directive from a computer program) and handing it to another command.139 bytes (22 words) - 19:56, 23 January 2009
- {{r|Computer network}} {{r|Server (computer)}}680 bytes (92 words) - 21:38, 11 January 2010