Search results
Jump to navigation
Jump to search
Page title matches
- Command interpreters envelope a computer application, and provide an environment in which it is run.136 bytes (18 words) - 10:00, 22 July 2013
- ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti562 bytes (83 words) - 09:13, 12 November 2007
- In [[computer network|networks of computers]], a '''host''' is a term for computers, on a ...s|Windows]] (both workstation (aka [[Personal computer|PC]]) and [[Server (computer)|server]] roles)742 bytes (101 words) - 21:31, 2 February 2009
- 12 bytes (1 word) - 06:56, 26 September 2007
- ...8085A die.jpg | left | thumb | Die image of an Intel 8085A, a single chip computer]] [[File:Intel C8085.jpg | thumb | an 8085 single chip computer is mounted within this [[Dual in-line package]] from 1976.]]926 bytes (134 words) - 12:03, 6 March 2024
- 81 bytes (10 words) - 06:17, 28 August 2009
- 12 bytes (1 word) - 13:37, 13 November 2007
- A computer whose price, size, and features make it suitable for personal use.113 bytes (16 words) - 08:21, 21 May 2008
- In [[computer science]], a '''pointer''' is the [[memory]] address of some other data. M ...orm]] or [[C sharp (programming language)|C#]], all variables of [[object (computer science)|object type]] are actually implemented as pointers, though program5 KB (695 words) - 20:34, 21 January 2009
- 3 KB (490 words) - 05:49, 8 April 2024
- =='''Computer crime legislation around the world'''== *[http://www.austlii.edu.au/au/other/crime/125.html|Computer Misuse Act 1990] ([[United Kingdom|UK]]).4 KB (625 words) - 08:30, 24 September 2023
- 12 bytes (1 word) - 15:45, 14 November 2007
- 12 bytes (1 word) - 06:58, 26 September 2007
- 30 bytes (3 words) - 15:36, 10 December 2008
- 128 bytes (16 words) - 11:43, 22 February 2009
- 81 bytes (10 words) - 09:45, 28 August 2009
- 12 bytes (1 word) - 11:57, 12 April 2008
- 12 bytes (1 word) - 06:58, 26 September 2007
- ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].176 bytes (22 words) - 16:46, 7 September 2010
- ...ng material. In this chapter we will cover all aspects that fall under '''Computer Science Foundation'''. The material covered here will get you prepared fo * [[Computer Organization]]1 KB (134 words) - 00:53, 18 February 2009
Page text matches
- Section 5.2 "Routing Algorithms" in "Computer Networks", 4th ed, A.S. Tanenbaum, Prentice-Hall 2003. Section 4.2 "Routing" in "Computer Networks: A Systems Approach", 4th ed, L.L. Peterson, B.S. Davie, Morgann K486 bytes (63 words) - 04:33, 3 February 2011
- ...)|protocol]] that has the absolutely minimal set of functions needed for a computer, with no local storage for executable code, to get its basic operating syst262 bytes (40 words) - 12:02, 23 August 2008
- ...n of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into generally unde331 bytes (37 words) - 09:49, 20 September 2009
- '''Computer networking media sharing protocols''' allow two or more computers to connec ...orking media attachment protocols, which manage the attachment of a single computer to a medium.720 bytes (100 words) - 07:28, 18 March 2024
- ==Computer science==311 bytes (42 words) - 03:04, 21 March 2024
- *Garbage (computer science): Unreferenced data in a computer's memory.436 bytes (61 words) - 05:56, 20 August 2013
- {{r|Computer network|Computer networks}} {{r|computer}}761 bytes (100 words) - 09:48, 22 October 2010
- {{r|Complement (computer architecture)}} {{r|Complement (computer languages)}}296 bytes (31 words) - 11:00, 31 May 2009
- {{r|Computer proof}} {{r|Computer-aided proof}}498 bytes (61 words) - 20:25, 21 November 2009
- In computer science: {{r|Character (computer)}}217 bytes (25 words) - 03:39, 8 August 2009
- ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti562 bytes (83 words) - 09:13, 12 November 2007
- ...early 1980s and released in 1984 by Apple Inc. (at the time known as Apple Computer).311 bytes (47 words) - 22:44, 23 September 2008
- * Scott, A Hugh. Computer and Intellectual Property Crime: Federal and State Law. Washington DC: BNA * Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security (with CD-ROM). Indianapolis: Prentice Hall PTR, 2002.354 bytes (46 words) - 20:40, 12 September 2013
- * [[Computer science]] * [[Computer vision]]326 bytes (32 words) - 12:58, 13 November 2014
- == Computer Speech Recognition History and Survey == Robert D. Rodman (1999) ''Computer Speech Technology'' ISBN 0890062978 '''The best survey for non-expert read967 bytes (126 words) - 18:54, 29 August 2011
- {{r|Bridge (computer network)}} {{r|Bridge (computer architecture)}}168 bytes (20 words) - 06:25, 28 August 2009
- ...e interpretation in computer-mediated communication|journal=Social Science Computer Review|volume=19|pages=323–345}}375 bytes (44 words) - 23:13, 20 March 2008
- Auto-populated based on [[Special:WhatLinksHere/Personal computer]]. Needs checking by a human. {{r|Computer architecture}}1 KB (150 words) - 19:28, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Server (computer)]]. Needs checking by a human. {{r|Host (computer network)}}518 bytes (67 words) - 20:18, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human. {{r|Personal computer}}520 bytes (66 words) - 17:17, 11 January 2010