Search results

Jump to navigation Jump to search

Page title matches

  • ...r)|client]]. The client communicates with a server by using a [[protocol (computer)|protocol]] to request and receive information. Any computer can be a server, from a personal computer to a multi-thousand [[US dollar|dollar]] server. A server is primarily def
    6 KB (917 words) - 04:36, 2 March 2024
  • 28 bytes (3 words) - 15:49, 29 February 2008
  • ...icated example of a protocol is the set or "stack" of protocols used in [[computer networking reference models]], such as the [[Internet Protocol Suite]] or [
    737 bytes (104 words) - 05:43, 17 March 2024
  • A '''computer tower''' is the basic physical enclosure for [[modular computer system]]s used for desktop workstations and for servers with less than the ...[motherboard]], [[power supply (computer)]], [[disk bay]]s, [[cooling fan (computer)]] and possibly additional cooling components, and [[peripheral card]]s. Th
    2 KB (270 words) - 11:41, 22 February 2009
  • 32 bytes (3 words) - 13:41, 16 April 2007
  • In computer science, an '''interpreter''' is anything that turns one set of instruction ...s also a result of the fact that an interpreter is itself is a typically a computer program that runs in a loop of the form:
    4 KB (636 words) - 09:49, 20 August 2023
  • ...the academic discipline of [[electrical engineering]]. The field known as computer architecture may touch all aspects of how specific computers can be specifi This article will discuss the basics of computer organization, and related articles will expand on each basic part, since th
    25 KB (3,906 words) - 12:07, 22 February 2009
  • 87 bytes (11 words) - 09:31, 13 November 2008
  • #REDIRECT [[Computer#Academia_and_professional_societies]]
    58 bytes (6 words) - 20:14, 1 October 2008
  • '''Computer punctuation''' follows strict rules. Understanding these rules helps progra
    2 KB (305 words) - 08:48, 19 November 2011
  • ...ctionality of a computer system, but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer.<ref>[http://wearcam.o There are three new ways how a wearable computer and it's user may interact.
    6 KB (1,035 words) - 22:16, 15 September 2013
  • '''Computer science''' is an academic discipline which studies aspects of [[computer|computers]], computation and [[software]]. There are many areas of specialization within computer science. Some of these areas are:
    509 bytes (52 words) - 20:02, 19 April 2011
  • ...ng material. In this chapter we will cover all aspects that fall under '''Computer Science Foundation'''. The material covered here will get you prepared fo * [[Computer Organization]]
    1 KB (134 words) - 00:53, 18 February 2009
  • ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].
    176 bytes (22 words) - 16:46, 7 September 2010
  • A portable computer that is always on, always usable and is used while being in the personal sp
    147 bytes (24 words) - 18:17, 22 May 2010
  • 12 bytes (1 word) - 06:59, 26 September 2007
  • ...cially in the subfield of [[programming languages]], the '''syntax''' of a computer language is the set of allowed [[reserved word]]s and possible [[token_(par The syntax of computer languages is often at level-2 (ie, a [[context-free grammar]]) in the [[Cho
    2 KB (246 words) - 00:21, 15 November 2007
  • ...that facilitates [[symbolic mathematics]]. The core functionality of any computer algebra systems is manipulation of mathematical expressions in symbolic for Typical symbolic manipulations that can be performed by ''computer algebra systems'' include:
    1 KB (164 words) - 14:01, 18 January 2008
  • * [[/Pioneers|Computer industry pioneers]] * [[/Breakthroughs|Conceptual breakthroughs in computer science]]
    211 bytes (23 words) - 13:18, 27 October 2009
  • 12 bytes (1 word) - 07:00, 26 September 2007

Page text matches

  • A [[computer protocol]] [[protocol (computer)|message]] that is addressed to one and only one destination
    141 bytes (18 words) - 00:10, 5 August 2008
  • One who enters a computer or computer network without authorization by the owner or administrator, regardless of
    173 bytes (24 words) - 10:14, 7 February 2009
  • ...opposed to the methods by which it takes unauthorized actions inside that computer
    171 bytes (25 words) - 16:25, 22 February 2009
  • {{r|Computer}} {{r|Computer engineering}}
    353 bytes (42 words) - 12:12, 12 April 2011
  • ...Computer networking endpoints, or among routers and routers. A variety of Computer networking layer management protocols support them, including routing proto
    409 bytes (50 words) - 16:22, 30 March 2024
  • ...ter XT]], [[IBM PCjr]], [[IBM Portable Personal Computer]], [[IBM Personal Computer/AT]] and [[IBM PC Convertible]]. It was designed by IBM Entry Systems Divis
    747 bytes (113 words) - 12:10, 8 September 2020
  • ...ter that is emulated but the software inside thinks that it runs on a real computer.
    148 bytes (24 words) - 10:44, 8 August 2010
  • ...e" someone can be that the data stored on automations equipment (such as a computer or server) has not been maliciously tampered with or read by untrusted thir ...on, computer security is often more technical and mathematical than some [[computer science]] fields.
    2 KB (267 words) - 05:49, 8 April 2024
  • ...ems involve efficient and robust [[algorithm]]s which can be executed on a computer.
    210 bytes (28 words) - 19:05, 12 February 2008
  • ...] and much of networking, but dismissed the significance of the [[personal computer]]
    209 bytes (27 words) - 20:42, 28 July 2010
  • ...[[programming language]]. He is currently the Chair in [[Computer science|Computer Science]] at [[Texas A&M University]].
    190 bytes (26 words) - 15:31, 10 February 2008
  • {{rpl|Optimization (computer science)}} * [[List of compiler optimizations]] in [[computer science]]
    241 bytes (28 words) - 03:46, 24 September 2013
  • '''Amateur Computer Group of New Jersey''' (ACGNJ) is a computer user group (club) based in Scotch Plains, NJ. It was founded in May of 1975 ...b, with help from several other organizations, organizes the [[Tcf|Trenton Computer Festival]] every spring.
    415 bytes (64 words) - 02:19, 14 September 2013
  • * [http://www.cs.ualberta.ca/~emarkus/compgo_biblio/ Online Computer Go bibliography]. ...ComputerGo Computer Go] and [http://senseis.xmp.net/?ComputerGoProgramming Computer Go Programming] pages at [http://senseis.xmp.net Sensei's Library]
    3 KB (398 words) - 06:08, 9 June 2009
  • ...ch that they can be stored in a computer system or transmitted to a remote computer
    242 bytes (37 words) - 19:02, 16 August 2008
  • ...ters]], particularly when the crime is committed using the Internet or a [[computer network]]. # Crime that targets computer networks or devices
    631 bytes (86 words) - 06:33, 6 April 2010
  • Use of [[computer network]]s, especially the [[Internet]], to access computer resources, operated by a third party; access is on-demand and dynamically a
    283 bytes (38 words) - 15:04, 18 March 2010
  • ...ecurity''', is a broad term that includes both communications security and computer security, along with the appropriate administrative infrastructure for pers ==Computer security==
    2 KB (232 words) - 16:21, 30 March 2024
  • ...ed for a variety of consumer computer devices as well as the [[Macintosh]] computer (before they switched to the [[PowerPC]] architecture).
    258 bytes (35 words) - 12:07, 24 April 2010
  • ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]] {{r|Computer architecture}}
    1 KB (187 words) - 13:39, 29 April 2011
View ( | ) (20 | 50 | 100 | 250 | 500)