Search results
Jump to navigation
Jump to search
Page title matches
- A '''computer network''' is a collection of [[computer]]s or digital devices ("nodes") connected In contrast to an ordinary computer network, where the user is aware of multiple computers, a '''[[distributed system]]15 KB (2,278 words) - 05:21, 8 March 2024
- ...erconnected by physical or wireless media. The emphasis on ''computer'' in computer network reflects an emphasis on their functional characteristics, rather than desig18 KB (2,994 words) - 14:55, 18 April 2010
- 81 bytes (10 words) - 06:17, 28 August 2009
- 124 bytes (15 words) - 09:26, 13 November 2008
- In [[computer network|networks of computers]], a '''host''' is a term for computers, on a network742 bytes (101 words) - 21:31, 2 February 2009
- 3 KB (490 words) - 05:49, 8 April 2024
- 646 bytes (91 words) - 12:50, 15 September 2008
- 12 bytes (1 word) - 19:20, 2 March 2009
- | pagename = Computer network | abc = Computer network788 bytes (74 words) - 08:00, 15 March 2024
- 12 bytes (1 word) - 06:59, 26 September 2007
- | pagename = Sinkhole (Computer network) | abc = Sinkhole (Computer network)2 KB (234 words) - 18:46, 5 March 2010
- Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed wit232 bytes (32 words) - 12:53, 15 September 2008
- | pagename = Host (computer network) | abc = Host (computer network)2 KB (230 words) - 21:32, 2 February 2009
- 181 bytes (23 words) - 06:17, 28 August 2009
- 932 bytes (116 words) - 11:20, 9 December 2009
- Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human.520 bytes (66 words) - 17:17, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.442 bytes (56 words) - 20:24, 11 January 2010
Page text matches
- The separation of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into gener331 bytes (37 words) - 09:49, 20 September 2009
- {{r|Computer network}} {{r|Bridge (computer network)}}331 bytes (41 words) - 22:45, 1 October 2009
- * [[Computer network|Computer networks]]509 bytes (52 words) - 20:02, 19 April 2011
- ==Computer network security== ...connaissance]]''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking t1 KB (176 words) - 04:40, 26 September 2013
- {{r|Computer network}}341 bytes (42 words) - 14:19, 1 December 2010
- {{r|Computer network}}388 bytes (44 words) - 15:18, 31 October 2008
- One who enters a computer or computer network without authorization by the owner or administrator, regardless of the moti173 bytes (24 words) - 10:14, 7 February 2009
- {{r|Computer network}}275 bytes (33 words) - 22:42, 13 July 2008
- #REDIRECT [[Computer network]]30 bytes (3 words) - 09:29, 16 March 2010
- #REDIRECT [[Talk:Sinkhole (Computer network)]]46 bytes (5 words) - 12:50, 15 September 2008
- ...architecture''', applicable to both [[telecommunications network]]s and [[computer network]]s as well as their continuing modern [[convergence of communications|conve607 bytes (83 words) - 09:46, 20 September 2009
- The process of sending stimuli to a computer network and analyzing the responses, which may be a legitimate operational function207 bytes (32 words) - 09:10, 4 February 2009
- {{r|Computer network|Computer networks}} {{r|Computer network}}761 bytes (100 words) - 09:48, 22 October 2010
- {{r|Computer network}}367 bytes (45 words) - 06:00, 17 March 2024
- {{r|Computer network}}413 bytes (50 words) - 11:59, 30 November 2008
- Rules for communication among devices in a computer network.60 bytes (9 words) - 08:20, 25 April 2023
- Use of [[computer network]]s, especially the [[Internet]], to access computer resources, operated by283 bytes (38 words) - 15:04, 18 March 2010
- *[[Computer network]]98 bytes (9 words) - 05:21, 8 March 2024
- Largest vendor of [[computer network]] equipment and software97 bytes (11 words) - 08:57, 5 August 2010
- Defines the method in which a computer network is architected; topologies can be either physical (meaning how the actual h262 bytes (37 words) - 00:06, 15 January 2009
- The class of devices that attach to a computer network90 bytes (13 words) - 14:45, 7 February 2009
- Currently working in computer network security for a large multinational corporation.298 bytes (41 words) - 03:59, 22 November 2023
- * Currently attending ITT-Tech on the CNS (Computer Network Systems) track.714 bytes (112 words) - 04:39, 22 November 2023
- In [[computer network|networks of computers]], a '''host''' is a term for computers, on a network742 bytes (101 words) - 21:31, 2 February 2009
- In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that ma1 KB (190 words) - 05:48, 8 April 2024
- {{r|Bridge (computer network)}}425 bytes (53 words) - 10:00, 20 September 2009
- * [[Computer network]]694 bytes (57 words) - 07:46, 13 September 2020
- {{r|Computer network}}715 bytes (90 words) - 11:54, 31 December 2022
- A major manufactured of equipment for [[computer network]]s; Advisory Committee, Congressional Internet Caucus146 bytes (17 words) - 11:37, 19 March 2024
- A [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders.166 bytes (20 words) - 13:05, 29 November 2008
- {{r|Computer network}}2 KB (248 words) - 05:56, 17 March 2024
- | pagename = Computer network | abc = Computer network788 bytes (74 words) - 08:00, 15 March 2024
- In [[computer network]]s and [[telecommunications network]]s, a '''relay''' is an abstract or rea980 bytes (148 words) - 09:37, 20 September 2009
- {{r|Computer network}}1 KB (167 words) - 14:59, 20 March 2024
- {{r|Bridge (computer network)}}1 KB (165 words) - 05:56, 17 March 2024
- {{r|Bridge (computer network)}}168 bytes (20 words) - 06:25, 28 August 2009
- {{r|Computer network}}775 bytes (97 words) - 11:55, 11 January 2010
- ...nce of communications]] is pushing the concepts of telecommunication and [[computer network]] to be interchangeable.1 KB (147 words) - 17:26, 8 January 2009
- ...ters]], particularly when the crime is committed using the Internet or a [[computer network]].631 bytes (86 words) - 06:33, 6 April 2010
- {{r|Computer network}}680 bytes (84 words) - 19:33, 31 July 2008
- {{r|Host (computer network)}}64 bytes (8 words) - 03:37, 10 June 2009
- | product = Computer network devices '''Cisco Systems''' is an American technology company specializing in computer network technologies and devices.1 KB (147 words) - 07:09, 14 September 2013
- Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed wit232 bytes (32 words) - 12:53, 15 September 2008
- {{r|Host (computer network)}}518 bytes (67 words) - 20:18, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human.520 bytes (66 words) - 17:17, 11 January 2010
- The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations se209 bytes (23 words) - 20:08, 7 June 2008
- A technique, in [[computer network]]s, where a group of "spoke" devices all connect to a common "hub", but the219 bytes (32 words) - 11:22, 15 September 2008
- {{r|Computer network}}1 KB (144 words) - 00:13, 21 January 2011
- ...al damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software272 bytes (38 words) - 15:30, 25 December 2010
- ...viding multiple communications paths among logical or physical points in [[computer network]]s, primarily for [[fault tolerance]] but also for [[load distribution]] or261 bytes (34 words) - 12:38, 30 May 2010
- {{r|Computer network}}790 bytes (101 words) - 14:59, 20 March 2024
- {{r|Computer network}}673 bytes (87 words) - 17:59, 11 January 2010
- {{r|Host (computer network)}}1 KB (150 words) - 19:28, 11 January 2010
- {{r|Computer network}}745 bytes (92 words) - 19:25, 11 January 2010
- * [[Computer network]]850 bytes (114 words) - 04:19, 22 November 2023
- {{r|Computer network}}576 bytes (73 words) - 19:05, 11 January 2010
- {{r|Computer network}}829 bytes (102 words) - 05:56, 17 March 2024
- {{r|Computer network}}697 bytes (85 words) - 11:30, 27 February 2010
- {{r|Computer network}}548 bytes (69 words) - 16:01, 11 January 2010
- In [[computer network]] [[protocol (computer)|protocols]], a unicast message, whether it be an ap622 bytes (96 words) - 00:05, 5 August 2008
- {{r|Computer network}}197 bytes (24 words) - 17:14, 19 March 2009
- ...License, except that it additionally covers the use of the software over a computer network, requiring that the complete source code be made available to any network u2 KB (251 words) - 03:44, 13 September 2009
- ...a Network+ professional certificates; as well as an Associate's degree in Computer Network Systems.649 bytes (83 words) - 03:38, 22 November 2023
- ...reconnaissance''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking t2 KB (356 words) - 05:49, 8 April 2024
- {{r|Computer network}}788 bytes (103 words) - 14:59, 20 March 2024
- {{r|Computer network|Computer networks}}3 KB (353 words) - 03:48, 24 September 2013
- Devices for [[computer network]]s involving applications that use multiple, variable TCP/UDP port numbers409 bytes (54 words) - 13:38, 7 May 2010
- ...s. I am one of the chief architects of the Livermore Laboratory's Octopus computer network. I have taught physics, mathematics, and computer science courses at the g904 bytes (133 words) - 04:06, 22 November 2023
- ...ted control]] levels. [[circuit switching|Circuit-switched]] and [[bridge (computer network)|bridged]] classified networks, however, can interconnect with the ATM back1 KB (151 words) - 10:20, 8 April 2024
- {{r|Computer network}}680 bytes (92 words) - 21:38, 11 January 2010
- {{r|Computer network}}830 bytes (103 words) - 14:41, 18 March 2024
- {{r|Computer network}}819 bytes (107 words) - 08:37, 4 May 2024
- {{r|Computer network}}3 KB (441 words) - 12:55, 13 November 2014
- {{r|Computer network}}349 bytes (42 words) - 16:26, 16 March 2010
- {{r|Computer network}}304 bytes (37 words) - 02:23, 12 February 2009
- I am a computer enthusiast. At home I use and maintain a small computer network with shared resources, including proxy internet services. I have built my1 KB (147 words) - 03:25, 22 November 2023
- {{r|Computer network}}222 bytes (31 words) - 20:31, 13 November 2011
- {{r|Bridge (computer network)}}300 bytes (36 words) - 05:38, 15 March 2024
- | pagename = Host (computer network) | abc = Host (computer network)2 KB (230 words) - 21:32, 2 February 2009
- {{r|Computer network}}328 bytes (46 words) - 17:33, 24 December 2009
- | pagename = Sinkhole (Computer network) | abc = Sinkhole (Computer network)2 KB (234 words) - 18:46, 5 March 2010
- {{r|Computer network}}1 KB (141 words) - 14:59, 20 March 2024
- 1 KB (149 words) - 04:51, 22 November 2023
- Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.442 bytes (56 words) - 20:24, 11 January 2010
- '''Frame relay''' is a transmission system used to support [[computer network]]s, operating in [[locality of networks|wide area network|Wide Area Network1 KB (161 words) - 19:22, 15 September 2008
- A '''personal area network (PAN)''' is a specialized type of [[computer network]], which benefits from extremely short range. Among its applications is rep4 KB (609 words) - 21:25, 23 May 2010
- {{r|Sinkhole (Computer network)}}484 bytes (61 words) - 17:16, 11 January 2010
- ...ciclomedia''' is a [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders and is planned to be963 bytes (132 words) - 10:50, 26 September 2007
- Layer 2 networks based on bridge (computer network)|bridging directly track active MAC addresses and make forwarding decisions3 KB (527 words) - 07:31, 18 March 2024
- {{r|Host (computer network)}}730 bytes (94 words) - 11:00, 11 January 2010
- ...effort was funded by [[Advanced Research Projects Agency|ARPA]], and the [[computer network]] that it produced was called the [[ARPANET]]. The technologies that made t7 KB (1,016 words) - 08:49, 22 April 2024
- ...can be loosely defined as "moving packets around" on a [[Computer network|computer network]], in order to allow various different sub-networks (or [[subnets]]) to com6 KB (985 words) - 12:34, 30 March 2024
- Originally a regional computer network for 54 colleges in Ohio, the OCLC gradually grew into an international netw3 KB (454 words) - 08:05, 22 April 2024
- In computer network and server security, a '''sinkhole''' is a network element to which suspect3 KB (432 words) - 07:36, 18 March 2024
- {{r|Sinkhole (Computer network)}}814 bytes (105 words) - 18:35, 11 January 2010
- The '''topology''' of a [[computer network]] defines how that network is "laid out." Topologies can be either physical6 KB (923 words) - 12:40, 11 June 2009
- *[[Computer_network|Computer network]]s3 KB (467 words) - 00:52, 28 August 2007
- {{r|Computer network}}965 bytes (125 words) - 15:51, 11 January 2010
- A '''session border controller (SBC)''' is a [[computer network]]ing device that provide [[firewall]] and [[proxy services]] principally fo3 KB (383 words) - 05:48, 8 April 2024
- {{r|Computer network}}1 KB (138 words) - 20:51, 11 January 2010