Search results

Jump to navigation Jump to search

Page title matches

  • Command interpreters envelope a computer application, and provide an environment in which it is run.
    136 bytes (18 words) - 10:00, 22 July 2013
  • ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti
    562 bytes (83 words) - 09:13, 12 November 2007
  • In [[computer network|networks of computers]], a '''host''' is a term for computers, on a ...s|Windows]] (both workstation (aka [[Personal computer|PC]]) and [[Server (computer)|server]] roles)
    742 bytes (101 words) - 21:31, 2 February 2009
  • 12 bytes (1 word) - 06:56, 26 September 2007
  • ...8085A die.jpg | left | thumb | Die image of an Intel 8085A, a single chip computer]] [[File:Intel C8085.jpg | thumb | an 8085 single chip computer is mounted within this [[Dual in-line package]] from 1976.]]
    926 bytes (134 words) - 12:03, 6 March 2024
  • 81 bytes (10 words) - 06:17, 28 August 2009
  • 12 bytes (1 word) - 13:37, 13 November 2007
  • A computer whose price, size, and features make it suitable for personal use.
    113 bytes (16 words) - 08:21, 21 May 2008
  • In [[computer science]], a '''pointer''' is the [[memory]] address of some other data. M ...orm]] or [[C sharp (programming language)|C#]], all variables of [[object (computer science)|object type]] are actually implemented as pointers, though program
    5 KB (695 words) - 20:34, 21 January 2009
  • 3 KB (490 words) - 05:49, 8 April 2024
  • =='''Computer crime legislation around the world'''== *[http://www.austlii.edu.au/au/other/crime/125.html|Computer Misuse Act 1990] ([[United Kingdom|UK]]).
    4 KB (625 words) - 08:30, 24 September 2023
  • 12 bytes (1 word) - 15:45, 14 November 2007
  • 12 bytes (1 word) - 06:58, 26 September 2007
  • 30 bytes (3 words) - 15:36, 10 December 2008
  • 128 bytes (16 words) - 11:43, 22 February 2009
  • 81 bytes (10 words) - 09:45, 28 August 2009
  • 12 bytes (1 word) - 11:57, 12 April 2008
  • 12 bytes (1 word) - 06:58, 26 September 2007
  • ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].
    176 bytes (22 words) - 16:46, 7 September 2010
  • ...ng material. In this chapter we will cover all aspects that fall under '''Computer Science Foundation'''. The material covered here will get you prepared fo * [[Computer Organization]]
    1 KB (134 words) - 00:53, 18 February 2009

Page text matches

  • Section 5.2 "Routing Algorithms" in "Computer Networks", 4th ed, A.S. Tanenbaum, Prentice-Hall 2003. Section 4.2 "Routing" in "Computer Networks: A Systems Approach", 4th ed, L.L. Peterson, B.S. Davie, Morgann K
    486 bytes (63 words) - 04:33, 3 February 2011
  • ...)|protocol]] that has the absolutely minimal set of functions needed for a computer, with no local storage for executable code, to get its basic operating syst
    262 bytes (40 words) - 12:02, 23 August 2008
  • ...n of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into generally unde
    331 bytes (37 words) - 09:49, 20 September 2009
  • '''Computer networking media sharing protocols''' allow two or more computers to connec ...orking media attachment protocols, which manage the attachment of a single computer to a medium.
    720 bytes (100 words) - 07:28, 18 March 2024
  • ==Computer science==
    311 bytes (42 words) - 03:04, 21 March 2024
  • *Garbage (computer science): Unreferenced data in a computer's memory.
    436 bytes (61 words) - 05:56, 20 August 2013
  • {{r|Computer network|Computer networks}} {{r|computer}}
    761 bytes (100 words) - 09:48, 22 October 2010
  • {{r|Complement (computer architecture)}} {{r|Complement (computer languages)}}
    296 bytes (31 words) - 11:00, 31 May 2009
  • {{r|Computer proof}} {{r|Computer-aided proof}}
    498 bytes (61 words) - 20:25, 21 November 2009
  • In computer science: {{r|Character (computer)}}
    217 bytes (25 words) - 03:39, 8 August 2009
  • ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti
    562 bytes (83 words) - 09:13, 12 November 2007
  • ...early 1980s and released in 1984 by Apple Inc. (at the time known as Apple Computer).
    311 bytes (47 words) - 22:44, 23 September 2008
  • * Scott, A Hugh. Computer and Intellectual Property Crime: Federal and State Law. Washington DC: BNA * Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security (with CD-ROM). Indianapolis: Prentice Hall PTR, 2002.
    354 bytes (46 words) - 20:40, 12 September 2013
  • * [[Computer science]] * [[Computer vision]]
    326 bytes (32 words) - 12:58, 13 November 2014
  • == Computer Speech Recognition History and Survey == Robert D. Rodman (1999) ''Computer Speech Technology'' ISBN 0890062978 '''The best survey for non-expert read
    967 bytes (126 words) - 18:54, 29 August 2011
  • {{r|Bridge (computer network)}} {{r|Bridge (computer architecture)}}
    168 bytes (20 words) - 06:25, 28 August 2009
  • ...e interpretation in computer-mediated communication|journal=Social Science Computer Review|volume=19|pages=323–345}}
    375 bytes (44 words) - 23:13, 20 March 2008
  • Auto-populated based on [[Special:WhatLinksHere/Personal computer]]. Needs checking by a human. {{r|Computer architecture}}
    1 KB (150 words) - 19:28, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Server (computer)]]. Needs checking by a human. {{r|Host (computer network)}}
    518 bytes (67 words) - 20:18, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human. {{r|Personal computer}}
    520 bytes (66 words) - 17:17, 11 January 2010
View ( | ) (20 | 50 | 100 | 250 | 500)