Search results

Jump to navigation Jump to search

Page title matches

  • This is a list of '''seminal concepts in [[computer science]]'''. ...r instructions for faster throughput (invention of); but I don't know what computer actually did it first
    3 KB (490 words) - 10:26, 30 March 2024
  • ...edded in a gadget such as a phone or a TV remote. Even defining the word ''computer'' may spark a debate, because so many different kinds of computers exist, a ...ver, this definition may only make sense to people who already know what a computer can do. Computers are extremely versatile. In fact, they are ''universal''
    9 KB (1,333 words) - 10:08, 28 February 2024
  • 87 bytes (11 words) - 09:31, 13 November 2008
  • ...the academic discipline of [[electrical engineering]]. The field known as computer architecture may touch all aspects of how specific computers can be specifi This article will discuss the basics of computer organization, and related articles will expand on each basic part, since th
    25 KB (3,906 words) - 12:07, 22 February 2009
  • #REDIRECT [[Computer#Academia_and_professional_societies]]
    58 bytes (6 words) - 20:14, 1 October 2008
  • '''Computer punctuation''' follows strict rules. Understanding these rules helps progra
    2 KB (305 words) - 08:48, 19 November 2011
  • ...ctionality of a computer system, but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer.<ref>[http://wearcam.o There are three new ways how a wearable computer and it's user may interact.
    6 KB (1,035 words) - 22:16, 15 September 2013
  • '''Computer science''' is an academic discipline which studies aspects of [[computer|computers]], computation and [[software]]. There are many areas of specialization within computer science. Some of these areas are:
    509 bytes (52 words) - 20:02, 19 April 2011
  • |Alwac III computer, 1959.jpg|Alwac III computer, 1959.jpg
    357 bytes (44 words) - 18:10, 7 June 2010
  • ...oads, or [[data]]. The communications on the network follow a [[Protocol (computer)|protocol]] that determines how [[data encoding|data is encoded]], how [[me ...tion the networked devices are referred to as "devices" or "nodes". Today, computer networks also contain devices such as intelligent sensors or actuators that
    15 KB (2,278 words) - 05:21, 8 March 2024
  • ...xample, will typically include the ability to play [[music]] and display [[computer graphics|graphics]] quickly. A server, on the other hand, is intended to b ...M]] in 1983 introduced the [[IBM PC]]. This development prompted aspiring computer manufacturers such as Compaq to legally reverse engineer the IBM BIOS (the
    15 KB (2,382 words) - 08:45, 22 April 2024
  • 29 bytes (3 words) - 21:20, 26 April 2008
  • 81 bytes (10 words) - 04:08, 22 February 2010
  • ...is the field of [[artificial intelligence]] (AI) dedicated to creating a [[computer program]] that plays [[Go (board game)|go]], an ancient [[board game]]. <br ...ert games or play against opponents across the internet are not considered computer go programs in this sense and will not be discussed in this page.
    26 KB (4,194 words) - 05:43, 13 March 2020
  • 29 bytes (3 words) - 21:21, 26 April 2008
  • 50 bytes (6 words) - 14:25, 14 October 2008
  • ...field overlaps heavily with the fields of [[electrical engineering]] and [[computer science]]. ==Examples of Computer Engineering==
    4 KB (608 words) - 13:08, 17 April 2013
  • ...e" someone can be that the data stored on automations equipment (such as a computer or server) has not been maliciously tampered with or read by untrusted thir ...on, computer security is often more technical and mathematical than some [[computer science]] fields.
    2 KB (267 words) - 05:49, 8 April 2024
  • ...Kheir>{{cite book|author=Naim A. Kheir (Editor)|title=Systems Modeling and Computer Simulation|edition=2nd Edition|publisher=CRC Press|year=1996|id=ISBN 0-8247 ...on of all possible states of the model would be prohibitive or impossible. Computer models were initially used as a supplement for other arguments, but their u
    14 KB (1,986 words) - 17:07, 22 March 2024
  • #REDIRECT [[Computer]]
    22 bytes (2 words) - 20:29, 8 January 2008
  • ...uch as text printed on a screen or sent to a printer). The main problem of computer programming is how to put simple operations together in a way that is effec ...urces of a computer. This ensures that several programs can coexist on one computer.
    2 KB (365 words) - 09:56, 16 July 2013
  • #REDIRECT [[Computer architecture]]
    35 bytes (3 words) - 21:36, 26 April 2008
  • 33 bytes (3 words) - 10:07, 28 April 2008
  • 12 bytes (1 word) - 06:54, 26 September 2007
  • #REDIRECT[[Personal computer]]
    30 bytes (3 words) - 13:44, 14 February 2007
  • 33 bytes (3 words) - 01:03, 29 April 2008
  • ...r)|client]]. The client communicates with a server by using a [[protocol (computer)|protocol]] to request and receive information. Any computer can be a server, from a personal computer to a multi-thousand [[US dollar|dollar]] server. A server is primarily def
    6 KB (917 words) - 04:36, 2 March 2024
  • 28 bytes (3 words) - 15:49, 29 February 2008
  • ...icated example of a protocol is the set or "stack" of protocols used in [[computer networking reference models]], such as the [[Internet Protocol Suite]] or [
    737 bytes (104 words) - 05:43, 17 March 2024
  • A '''computer tower''' is the basic physical enclosure for [[modular computer system]]s used for desktop workstations and for servers with less than the ...[motherboard]], [[power supply (computer)]], [[disk bay]]s, [[cooling fan (computer)]] and possibly additional cooling components, and [[peripheral card]]s. Th
    2 KB (270 words) - 11:41, 22 February 2009
  • In computer science, an '''interpreter''' is anything that turns one set of instruction ...s also a result of the fact that an interpreter is itself is a typically a computer program that runs in a loop of the form:
    4 KB (636 words) - 09:49, 20 August 2023
  • 32 bytes (3 words) - 13:41, 16 April 2007
  • 30 bytes (3 words) - 15:36, 10 December 2008
  • 12 bytes (1 word) - 06:58, 26 September 2007
  • 128 bytes (16 words) - 11:43, 22 February 2009
  • 81 bytes (10 words) - 09:45, 28 August 2009
  • 12 bytes (1 word) - 11:57, 12 April 2008
  • 12 bytes (1 word) - 06:58, 26 September 2007
  • ...ng material. In this chapter we will cover all aspects that fall under '''Computer Science Foundation'''. The material covered here will get you prepared fo * [[Computer Organization]]
    1 KB (134 words) - 00:53, 18 February 2009
  • ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].
    176 bytes (22 words) - 16:46, 7 September 2010
  • A portable computer that is always on, always usable and is used while being in the personal sp
    147 bytes (24 words) - 18:17, 22 May 2010
  • 12 bytes (1 word) - 06:59, 26 September 2007
  • ...that facilitates [[symbolic mathematics]]. The core functionality of any computer algebra systems is manipulation of mathematical expressions in symbolic for Typical symbolic manipulations that can be performed by ''computer algebra systems'' include:
    1 KB (164 words) - 14:01, 18 January 2008
  • ...cially in the subfield of [[programming languages]], the '''syntax''' of a computer language is the set of allowed [[reserved word]]s and possible [[token_(par The syntax of computer languages is often at level-2 (ie, a [[context-free grammar]]) in the [[Cho
    2 KB (246 words) - 00:21, 15 November 2007
  • * [[/Pioneers|Computer industry pioneers]] * [[/Breakthroughs|Conceptual breakthroughs in computer science]]
    211 bytes (23 words) - 13:18, 27 October 2009
  • 167 bytes (23 words) - 12:25, 16 May 2008
  • #REDIRECT [[Closure (computer science)]]
    40 bytes (4 words) - 17:12, 6 January 2009
  • 12 bytes (1 word) - 07:00, 26 September 2007
  • 32 bytes (3 words) - 12:27, 4 July 2009
  • ...ware]], there are conflicting definitions of closure within the field of [[computer science]]. According to [[Martin Fowler]]: "Some people say that the term o
    819 bytes (115 words) - 17:12, 6 January 2009
  • 12 bytes (1 word) - 07:01, 26 September 2007
  • In computer science, anything that turns one set of instructions into another set of in
    367 bytes (49 words) - 20:43, 5 July 2009
  • 80 bytes (8 words) - 07:01, 7 April 2010
  • ...s a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • A '''daemon''' is a computer program that runs automatically when a computer boots up, as opposed to being directly started by a user. Typically, there
    665 bytes (103 words) - 00:21, 19 October 2013
  • ...ting a Quine in various computer languages has been a popular challenge to computer programmers; this problem has been posed to readers in various magazines su
    853 bytes (140 words) - 11:13, 12 January 2009
  • 174 bytes (26 words) - 08:51, 19 November 2011
  • ...F) has existed since 1976, created by [[Sol Libes]] of the [[Acgnj|Amateur Computer Group of New Jersey]] and [[Allen Katz]] of [[The College of New Jersey]] (
    750 bytes (117 words) - 20:15, 2 December 2009
  • Rules for communication among devices in a computer network.
    60 bytes (9 words) - 08:20, 25 April 2023
  • A set of instructions to be executed by a computer.
    87 bytes (13 words) - 23:46, 16 December 2009
  • ...r hardware, the design and development of low-level computer software, and computer hardware-software integration.
    214 bytes (26 words) - 12:49, 17 April 2013
  • 909 bytes (134 words) - 09:56, 19 September 2009
  • Auto-populated based on [[Special:WhatLinksHere/Computer]]. Needs checking by a human. {{r|Computer architecture}}
    3 KB (441 words) - 12:55, 13 November 2014
  • A [[computer program]] that attempts to [[simulation|simulate]] an abstract [[model (abs
    162 bytes (20 words) - 20:51, 27 April 2010
  • 12 bytes (1 word) - 14:39, 12 November 2007
  • 46 bytes (5 words) - 13:53, 21 November 2011
  • 124 bytes (15 words) - 09:26, 13 November 2008
  • ...tional [[drafting board]]. But now it is the term often interchanged with "Computer-Aided Design" to reflect the fact that modern CAD tools do much more than j
    414 bytes (59 words) - 14:42, 6 December 2007
  • 799 bytes (111 words) - 22:10, 27 April 2010
  • Field of artificial intelligence dedicated to creating a computer program that plays the ancient board game ''go''.
    151 bytes (20 words) - 08:48, 23 January 2009
  • Command interpreters envelope a computer application, and provide an environment in which it is run.
    136 bytes (18 words) - 10:00, 22 July 2013
  • In [[computer network|networks of computers]], a '''host''' is a term for computers, on a ...s|Windows]] (both workstation (aka [[Personal computer|PC]]) and [[Server (computer)|server]] roles)
    742 bytes (101 words) - 21:31, 2 February 2009
  • ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti
    562 bytes (83 words) - 09:13, 12 November 2007
  • ...8085A die.jpg | left | thumb | Die image of an Intel 8085A, a single chip computer]] [[File:Intel C8085.jpg | thumb | an 8085 single chip computer is mounted within this [[Dual in-line package]] from 1976.]]
    926 bytes (134 words) - 12:03, 6 March 2024
  • 12 bytes (1 word) - 06:56, 26 September 2007
  • 12 bytes (1 word) - 13:37, 13 November 2007
  • A computer whose price, size, and features make it suitable for personal use.
    113 bytes (16 words) - 08:21, 21 May 2008
  • 81 bytes (10 words) - 06:17, 28 August 2009
  • 3 KB (490 words) - 05:49, 8 April 2024
  • In [[computer science]], a '''pointer''' is the [[memory]] address of some other data. M ...orm]] or [[C sharp (programming language)|C#]], all variables of [[object (computer science)|object type]] are actually implemented as pointers, though program
    5 KB (695 words) - 20:34, 21 January 2009
  • 12 bytes (1 word) - 15:45, 14 November 2007
  • =='''Computer crime legislation around the world'''== *[http://www.austlii.edu.au/au/other/crime/125.html|Computer Misuse Act 1990] ([[United Kingdom|UK]]).
    4 KB (625 words) - 08:30, 24 September 2023
  • 12 bytes (1 word) - 00:20, 15 November 2007
  • ...is a list of people who have made major ''conceptual'' breakthroughs in [[computer science]]. This list should ''not'' include people just because they invented a new computer, operating system, or type of software, unless they devised an innovation w
    4 KB (515 words) - 09:39, 10 November 2008
  • 86 bytes (12 words) - 15:37, 10 December 2008
  • 12 bytes (1 word) - 06:38, 15 November 2007
  • 120 bytes (13 words) - 08:39, 1 June 2008
  • 240 bytes (35 words) - 20:43, 5 January 2024
  • {{r|Computer science}} {{r|Computer networking reference models }}
    932 bytes (116 words) - 11:20, 9 December 2009
  • ...en Systems Interconnection Reference Model]], '''session-layer [[protocol (computer)|protocols]]''' have been found to be useful in specific functions, such as ...ls#Resource Reservation Protocol|Resource Reservation Protocol]] (RSVP), [[Computer networking session protocols#Remote Procedure Call|Remote Procedure Call (R
    8 KB (1,226 words) - 12:37, 30 March 2024
  • A feature in some computer programming languages that allows a procedure to bind to its environment, s
    296 bytes (45 words) - 14:19, 30 April 2011
  • Transformation of computer programs and compilers to decrease runtime.
    106 bytes (12 words) - 13:08, 14 March 2009
  • ...who have made major ''practical'' breakthroughs in the development of the computer industry. If unlinked, these are placeholders until an article can be writ This list should include people who have invented a significantly new computer, operating system, or type of software, or significant business or licensin
    2 KB (232 words) - 18:13, 8 November 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer program]]. Needs checking by a human. {{r|Computer Go}}
    934 bytes (121 words) - 15:37, 11 January 2010
  • 12 bytes (1 word) - 17:12, 6 January 2009
  • 108 bytes (16 words) - 11:49, 1 June 2008
  • Auto-populated based on [[Special:WhatLinksHere/Protocol (computer)]]. Needs checking by a human. {{r|Computer networking reference models}}
    2 KB (248 words) - 05:56, 17 March 2024
  • The memory address of some data in computer science.
    88 bytes (12 words) - 20:34, 21 January 2009
  • {{r|Computer network|Computer networks}} ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]]
    3 KB (353 words) - 03:48, 24 September 2013
  • 81 bytes (10 words) - 20:37, 15 August 2010

Page text matches

  • {{r|Computer}} {{r|Computer engineering}}
    459 bytes (59 words) - 12:02, 30 November 2008
  • '''Computer science''' is an academic discipline which studies aspects of [[computer|computers]], computation and [[software]]. There are many areas of specialization within computer science. Some of these areas are:
    509 bytes (52 words) - 20:02, 19 April 2011
  • ...ing]], as well as develop [[natural language processing]] to improve human-computer interaction.
    299 bytes (35 words) - 08:06, 22 February 2021
  • ...cords]] comprising a [[file]], from at least one computer, to at least one computer
    189 bytes (28 words) - 17:52, 21 July 2008
  • A communication protocol for computer to computer networking.
    97 bytes (11 words) - 13:54, 25 May 2008
  • ...|networked protocols]] and for [[interprocess communications]] on a single computer
    246 bytes (30 words) - 12:22, 31 May 2009
  • An acclaimed [[computer science|computer scientist]], [[mathematics|mathematician]], and professor emeritus at [[Sta
    171 bytes (17 words) - 17:20, 7 December 2008
  • {{r|Computer program}} {{r|Computer science}}
    463 bytes (60 words) - 12:07, 11 November 2009
  • {{Image|Doug Engelbart.png|right|350px|Doug Engelbart meets with other computer scientists}} ...ngelbart''' is an [[United States of America|American]] [[computer science|computer scientist]].
    501 bytes (62 words) - 11:53, 2 February 2023
  • * [[/Pioneers|Computer industry pioneers]] * [[/Breakthroughs|Conceptual breakthroughs in computer science]]
    211 bytes (23 words) - 13:18, 27 October 2009
  • ...|networked protocols]] and for [[interprocess communications]] on a single computer
    287 bytes (36 words) - 12:22, 31 May 2009
  • {{r|Computer}} {{r|Computer architecture}}
    413 bytes (50 words) - 11:59, 30 November 2008
  • ...tional [[drafting board]]. But now it is the term often interchanged with "Computer-Aided Design" to reflect the fact that modern CAD tools do much more than j
    414 bytes (59 words) - 14:42, 6 December 2007
  • American [[computer science|computer scientist]] and [[software engineering|software engineer]]; winner of the 1
    186 bytes (21 words) - 07:56, 15 March 2021
  • ...d wireless, intended for use in very limited areas, such as living bodies, computer to peripheral connections, or process control
    221 bytes (29 words) - 21:25, 23 May 2010
  • ...r hardware, the design and development of low-level computer software, and computer hardware-software integration.
    214 bytes (26 words) - 12:49, 17 April 2013
  • ...r systems, which justifies law enforcement attention; of wider use against computer crime than against terrorism alone
    210 bytes (29 words) - 12:47, 22 November 2010
  • * [http://www.old-computers.com/ Old Computers Museum] (all computer types) * [http://computer.howstuffworks.com/pc.htm Howstuffworks' article on "How PCs Work"]
    766 bytes (102 words) - 08:44, 28 September 2013
  • Auto-populated based on [[Special:WhatLinksHere/Computer program]]. Needs checking by a human. {{r|Computer Go}}
    934 bytes (121 words) - 15:37, 11 January 2010
  • ...s a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • A [[computer protocol]] [[protocol (computer)|message]] that is addressed to one and only one destination
    141 bytes (18 words) - 00:10, 5 August 2008
  • ...opposed to the methods by which it takes unauthorized actions inside that computer
    171 bytes (25 words) - 16:25, 22 February 2009
  • One who enters a computer or computer network without authorization by the owner or administrator, regardless of
    173 bytes (24 words) - 10:14, 7 February 2009
  • {{r|Computer}} {{r|Computer engineering}}
    353 bytes (42 words) - 12:12, 12 April 2011
  • ...Computer networking endpoints, or among routers and routers. A variety of Computer networking layer management protocols support them, including routing proto
    409 bytes (50 words) - 16:22, 30 March 2024
  • ...ter XT]], [[IBM PCjr]], [[IBM Portable Personal Computer]], [[IBM Personal Computer/AT]] and [[IBM PC Convertible]]. It was designed by IBM Entry Systems Divis
    747 bytes (113 words) - 12:10, 8 September 2020
  • ...ter that is emulated but the software inside thinks that it runs on a real computer.
    148 bytes (24 words) - 10:44, 8 August 2010
  • ...e" someone can be that the data stored on automations equipment (such as a computer or server) has not been maliciously tampered with or read by untrusted thir ...on, computer security is often more technical and mathematical than some [[computer science]] fields.
    2 KB (267 words) - 05:49, 8 April 2024
  • ...ems involve efficient and robust [[algorithm]]s which can be executed on a computer.
    210 bytes (28 words) - 19:05, 12 February 2008
  • ...] and much of networking, but dismissed the significance of the [[personal computer]]
    209 bytes (27 words) - 20:42, 28 July 2010
  • ...[[programming language]]. He is currently the Chair in [[Computer science|Computer Science]] at [[Texas A&M University]].
    190 bytes (26 words) - 15:31, 10 February 2008
  • {{rpl|Optimization (computer science)}} * [[List of compiler optimizations]] in [[computer science]]
    241 bytes (28 words) - 03:46, 24 September 2013
  • '''Amateur Computer Group of New Jersey''' (ACGNJ) is a computer user group (club) based in Scotch Plains, NJ. It was founded in May of 1975 ...b, with help from several other organizations, organizes the [[Tcf|Trenton Computer Festival]] every spring.
    415 bytes (64 words) - 02:19, 14 September 2013
  • * [http://www.cs.ualberta.ca/~emarkus/compgo_biblio/ Online Computer Go bibliography]. ...ComputerGo Computer Go] and [http://senseis.xmp.net/?ComputerGoProgramming Computer Go Programming] pages at [http://senseis.xmp.net Sensei's Library]
    3 KB (398 words) - 06:08, 9 June 2009
  • ...ch that they can be stored in a computer system or transmitted to a remote computer
    242 bytes (37 words) - 19:02, 16 August 2008
  • ...ters]], particularly when the crime is committed using the Internet or a [[computer network]]. # Crime that targets computer networks or devices
    631 bytes (86 words) - 06:33, 6 April 2010
  • Use of [[computer network]]s, especially the [[Internet]], to access computer resources, operated by a third party; access is on-demand and dynamically a
    283 bytes (38 words) - 15:04, 18 March 2010
  • ...ecurity''', is a broad term that includes both communications security and computer security, along with the appropriate administrative infrastructure for pers ==Computer security==
    2 KB (232 words) - 16:21, 30 March 2024
  • ...ed for a variety of consumer computer devices as well as the [[Macintosh]] computer (before they switched to the [[PowerPC]] architecture).
    258 bytes (35 words) - 12:07, 24 April 2010
  • ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]] {{r|Computer architecture}}
    1 KB (187 words) - 13:39, 29 April 2011
  • Section 5.2 "Routing Algorithms" in "Computer Networks", 4th ed, A.S. Tanenbaum, Prentice-Hall 2003. Section 4.2 "Routing" in "Computer Networks: A Systems Approach", 4th ed, L.L. Peterson, B.S. Davie, Morgann K
    486 bytes (63 words) - 04:33, 3 February 2011
  • ...)|protocol]] that has the absolutely minimal set of functions needed for a computer, with no local storage for executable code, to get its basic operating syst
    262 bytes (40 words) - 12:02, 23 August 2008
  • ...n of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into generally unde
    331 bytes (37 words) - 09:49, 20 September 2009
  • '''Computer networking media sharing protocols''' allow two or more computers to connec ...orking media attachment protocols, which manage the attachment of a single computer to a medium.
    720 bytes (100 words) - 07:28, 18 March 2024
  • ==Computer science==
    311 bytes (42 words) - 03:04, 21 March 2024
  • *Garbage (computer science): Unreferenced data in a computer's memory.
    436 bytes (61 words) - 05:56, 20 August 2013
  • {{r|Computer network|Computer networks}} {{r|computer}}
    761 bytes (100 words) - 09:48, 22 October 2010
  • {{r|Complement (computer architecture)}} {{r|Complement (computer languages)}}
    296 bytes (31 words) - 11:00, 31 May 2009
  • {{r|Computer proof}} {{r|Computer-aided proof}}
    498 bytes (61 words) - 20:25, 21 November 2009
  • In computer science: {{r|Character (computer)}}
    217 bytes (25 words) - 03:39, 8 August 2009
  • ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti
    562 bytes (83 words) - 09:13, 12 November 2007
  • ...early 1980s and released in 1984 by Apple Inc. (at the time known as Apple Computer).
    311 bytes (47 words) - 22:44, 23 September 2008
  • * Scott, A Hugh. Computer and Intellectual Property Crime: Federal and State Law. Washington DC: BNA * Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security (with CD-ROM). Indianapolis: Prentice Hall PTR, 2002.
    354 bytes (46 words) - 20:40, 12 September 2013
  • * [[Computer science]] * [[Computer vision]]
    326 bytes (32 words) - 12:58, 13 November 2014
  • == Computer Speech Recognition History and Survey == Robert D. Rodman (1999) ''Computer Speech Technology'' ISBN 0890062978 '''The best survey for non-expert read
    967 bytes (126 words) - 18:54, 29 August 2011
  • {{r|Bridge (computer network)}} {{r|Bridge (computer architecture)}}
    168 bytes (20 words) - 06:25, 28 August 2009
  • ...e interpretation in computer-mediated communication|journal=Social Science Computer Review|volume=19|pages=323&ndash;345}}
    375 bytes (44 words) - 23:13, 20 March 2008
  • Auto-populated based on [[Special:WhatLinksHere/Personal computer]]. Needs checking by a human. {{r|Computer architecture}}
    1 KB (150 words) - 19:28, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Server (computer)]]. Needs checking by a human. {{r|Host (computer network)}}
    518 bytes (67 words) - 20:18, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human. {{r|Personal computer}}
    520 bytes (66 words) - 17:17, 11 January 2010
  • {{r|Computer architecture}} {{r|Personal computer}}
    599 bytes (78 words) - 17:05, 11 January 2010
  • ...ing a [[computer]] [[program]] involves both the academic disciplines of [[computer science]] and [[linguistics]].
    670 bytes (92 words) - 06:16, 15 November 2007
  • {{r|Computer network|Computer networks}} ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]]
    3 KB (353 words) - 03:48, 24 September 2013
  • {{r|Computer science}} {{r|Computer}}
    695 bytes (94 words) - 13:35, 29 April 2011
  • ...who have made major ''practical'' breakthroughs in the development of the computer industry. If unlinked, these are placeholders until an article can be writ This list should include people who have invented a significantly new computer, operating system, or type of software, or significant business or licensin
    2 KB (232 words) - 18:13, 8 November 2008
  • * [[Internet bot]], a type of computer program to do automated tasks ** [[Video game bot]], a computer controlled player or opponent
    919 bytes (132 words) - 08:14, 22 April 2023
  • {{r|Computer networking reference models}} {{r|Computer network}}
    275 bytes (33 words) - 22:42, 13 July 2008
  • ...ence/post.cfm?id=the-computer-mouse-at-40-rememberin-2008-12-10 |title=The computer mouse at 40: Remembering history in the making |accessdate=2008-11-13 |last ...= |date= |year=2004 |month= |format= |work=Berkshire Encyclopedia of Human-Computer Interaction |publisher=Berkshire Publishing Group |pages= |language= |archi
    817 bytes (99 words) - 22:02, 28 December 2008
  • The application service presented may be by a physical computer, or an abstraction such as a [[Java virtual machine]] or a [[.NET]] [[commo ...stem or the control of a cardiac pacemaker is an application that serves a computer.
    1 KB (162 words) - 20:04, 6 June 2011
  • {{r|Recursion (computer science)|In computer science}}
    112 bytes (13 words) - 11:37, 31 May 2009
  • | journal = Annual Symposium on Foundations of Computer Science ...r]] stores bits (which can be either 1 or 0), a state (qubit) in a quantum computer can be simultaneously both 0 and 1 (this is called superposition of states)
    2 KB (307 words) - 17:00, 7 March 2024
  • Libraries of computer algorithms: ...Computer graphics algorithms]<span> - CGAL is a library of algorithms for computer graphics, e.g. algorithms handling triangle meshes for simplification, [[pa
    1 KB (150 words) - 07:48, 10 February 2021
  • In [[computer network|networks of computers]], a '''host''' is a term for computers, on a ...s|Windows]] (both workstation (aka [[Personal computer|PC]]) and [[Server (computer)|server]] roles)
    742 bytes (101 words) - 21:31, 2 February 2009
  • #REDIRECT [[Computer]]
    22 bytes (2 words) - 09:25, 11 March 2007
  • #REDIRECT [[Computer]]
    22 bytes (2 words) - 20:29, 8 January 2008
  • {{r|Computer}} {{r|Personal computer}}
    193 bytes (24 words) - 20:08, 3 August 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking session protocols]]. Needs checking by a human. {{r|Computer networking end-to-end protocols}}
    544 bytes (68 words) - 15:37, 11 January 2010
  • |Alwac III computer, 1959.jpg|Alwac III computer, 1959.jpg
    357 bytes (44 words) - 18:10, 7 June 2010
  • A '''softphone''' is a ToIP software installed on a computer to emulate a physical phone. Softphones have many advantages: * they enable telephony applications on a computer and can foster cost reductions for companies that do not have to buy phones
    510 bytes (77 words) - 00:38, 21 February 2010
  • #REDIRECT [[Computer#Academia_and_professional_societies]]
    58 bytes (6 words) - 20:14, 1 October 2008
  • #REDIRECT [[Computer architecture]]
    35 bytes (3 words) - 21:36, 26 April 2008
  • #REDIRECT[[Personal computer]]
    30 bytes (3 words) - 13:44, 14 February 2007
  • #Redirect [[Computer science]]
    30 bytes (3 words) - 11:00, 4 June 2008
  • #REDIRECT [[Personal computer]]
    31 bytes (3 words) - 21:47, 22 April 2008
  • #REDIRECT [[Computer network]]
    30 bytes (3 words) - 09:29, 16 March 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human. {{r|Computer science}}
    815 bytes (100 words) - 15:37, 11 January 2010
  • {{r|Computer architecture}} {{r|Computer engineering}}
    723 bytes (92 words) - 16:15, 11 January 2010
  • {{r|Computer architecture}} {{r|Computer systems management}}
    388 bytes (51 words) - 10:42, 22 February 2009
  • {{r|Computer networking end-to-end protocols}} {{r|Computer network}}
    673 bytes (87 words) - 17:59, 11 January 2010
  • ...address is used by computer software to unambiguously identify a remote [[computer]] (called a ''host'' in internet parlance) for information exchange by one ...the internet. So the above address refers, as of February 2009, to a host computer owned by Microsoft Corporation, and its corresponding domain name is:
    985 bytes (141 words) - 21:29, 10 March 2009
  • Computer scripting language
    63 bytes (6 words) - 12:03, 24 November 2009
  • #REDIRECT [[Closure (computer science)]]
    40 bytes (4 words) - 17:12, 6 January 2009
  • #REDIRECT [[Trenton Computer Festival]]
    39 bytes (4 words) - 13:41, 14 February 2007
  • * [http://www.tcf-nj.org/web/ Trenton Computer Festival]
    70 bytes (9 words) - 13:14, 15 February 2009
  • [[Computer]] [[programming language]].
    74 bytes (6 words) - 07:38, 3 October 2008
  • #REDIRECT [[Oracle (computer software)]]
    40 bytes (4 words) - 09:56, 19 September 2009
  • {{r|Computer networking end-to-end protocols}} {{r|Computer network}}
    715 bytes (90 words) - 11:54, 31 December 2022
  • ...r Interface]] (or GUI) as the sole means for the user to interact with the computer. The Macintosh is said to have kicked off several "revolutions" in the computer age, to include what became known as [[Desktop Publishing]].
    1 KB (223 words) - 22:33, 5 July 2008
  • #REDIRECT [[Pointer (computer science)/Definition]]
    51 bytes (5 words) - 20:34, 21 January 2009
  • <noinclude>{{Subpages}}</noinclude>wearable computer, incorporated into eyeglasses
    82 bytes (8 words) - 14:24, 27 February 2022
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)