Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • The separation of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into gener
    331 bytes (37 words) - 09:49, 20 September 2009
  • {{r|Computer network}} {{r|Bridge (computer network)}}
    331 bytes (41 words) - 22:45, 1 October 2009
  • * [[Computer network|Computer networks]]
    509 bytes (52 words) - 20:02, 19 April 2011
  • ==Computer network security== ...connaissance]]''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking t
    1 KB (176 words) - 04:40, 26 September 2013
  • {{r|Computer network}}
    341 bytes (42 words) - 14:19, 1 December 2010
  • {{r|Computer network}}
    388 bytes (44 words) - 15:18, 31 October 2008
  • One who enters a computer or computer network without authorization by the owner or administrator, regardless of the moti
    173 bytes (24 words) - 10:14, 7 February 2009
  • {{r|Computer network}}
    275 bytes (33 words) - 22:42, 13 July 2008
  • #REDIRECT [[Computer network]]
    30 bytes (3 words) - 09:29, 16 March 2010
  • ...architecture''', applicable to both [[telecommunications network]]s and [[computer network]]s as well as their continuing modern [[convergence of communications|conve
    607 bytes (83 words) - 09:46, 20 September 2009
  • The process of sending stimuli to a computer network and analyzing the responses, which may be a legitimate operational function
    207 bytes (32 words) - 09:10, 4 February 2009
  • {{r|Computer network|Computer networks}} {{r|Computer network}}
    761 bytes (100 words) - 09:48, 22 October 2010
  • {{r|Computer network}}
    367 bytes (45 words) - 06:00, 17 March 2024
  • {{r|Computer network}}
    413 bytes (50 words) - 11:59, 30 November 2008
  • Rules for communication among devices in a computer network.
    60 bytes (9 words) - 08:20, 25 April 2023
  • Use of [[computer network]]s, especially the [[Internet]], to access computer resources, operated by
    283 bytes (38 words) - 15:04, 18 March 2010
  • Largest vendor of [[computer network]] equipment and software
    97 bytes (11 words) - 08:57, 5 August 2010
  • *[[Computer network]]
    98 bytes (9 words) - 05:21, 8 March 2024
  • Defines the method in which a computer network is architected; topologies can be either physical (meaning how the actual h
    262 bytes (37 words) - 00:06, 15 January 2009
  • The class of devices that attach to a computer network
    90 bytes (13 words) - 14:45, 7 February 2009
  • In [[computer network|networks of computers]], a '''host''' is a term for computers, on a network
    742 bytes (101 words) - 21:31, 2 February 2009
  • In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that ma
    1 KB (190 words) - 05:48, 8 April 2024
  • {{r|Bridge (computer network)}}
    425 bytes (53 words) - 10:00, 20 September 2009
  • * [[Computer network]]
    694 bytes (57 words) - 07:46, 13 September 2020
  • {{r|Computer network}}
    715 bytes (90 words) - 11:54, 31 December 2022
  • A major manufactured of equipment for [[computer network]]s; Advisory Committee, Congressional Internet Caucus
    146 bytes (17 words) - 11:37, 19 March 2024
  • A [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders.
    166 bytes (20 words) - 13:05, 29 November 2008
  • {{r|Computer network}}
    2 KB (248 words) - 05:56, 17 March 2024
  • In [[computer network]]s and [[telecommunications network]]s, a '''relay''' is an abstract or rea
    980 bytes (148 words) - 09:37, 20 September 2009
  • {{r|Computer network}}
    1 KB (167 words) - 14:59, 20 March 2024
  • {{r|Bridge (computer network)}}
    1 KB (165 words) - 05:56, 17 March 2024
  • {{r|Bridge (computer network)}}
    168 bytes (20 words) - 06:25, 28 August 2009
  • {{r|Computer network}}
    775 bytes (97 words) - 11:55, 11 January 2010
  • ...nce of communications]] is pushing the concepts of telecommunication and [[computer network]] to be interchangeable.
    1 KB (147 words) - 17:26, 8 January 2009
  • ...ters]], particularly when the crime is committed using the Internet or a [[computer network]].
    631 bytes (86 words) - 06:33, 6 April 2010
  • {{r|Computer network}}
    680 bytes (84 words) - 19:33, 31 July 2008
  • {{r|Host (computer network)}}
    64 bytes (8 words) - 03:37, 10 June 2009
  • | product = Computer network devices '''Cisco Systems''' is an American technology company specializing in computer network technologies and devices.
    1 KB (147 words) - 07:09, 14 September 2013
  • Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed wit
    232 bytes (32 words) - 12:53, 15 September 2008
  • {{r|Host (computer network)}}
    518 bytes (67 words) - 20:18, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human.
    520 bytes (66 words) - 17:17, 11 January 2010
  • The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations se
    209 bytes (23 words) - 20:08, 7 June 2008
  • A technique, in [[computer network]]s, where a group of "spoke" devices all connect to a common "hub", but the
    219 bytes (32 words) - 11:22, 15 September 2008
  • {{r|Computer network}}
    1 KB (144 words) - 00:13, 21 January 2011
  • ...al damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software
    272 bytes (38 words) - 15:30, 25 December 2010
  • ...viding multiple communications paths among logical or physical points in [[computer network]]s, primarily for [[fault tolerance]] but also for [[load distribution]] or
    261 bytes (34 words) - 12:38, 30 May 2010
  • {{r|Computer network}}
    790 bytes (101 words) - 14:59, 20 March 2024
  • {{r|Computer network}}
    673 bytes (87 words) - 17:59, 11 January 2010
  • {{r|Host (computer network)}}
    1 KB (150 words) - 19:28, 11 January 2010
  • {{r|Computer network}}
    745 bytes (92 words) - 19:25, 11 January 2010
  • {{r|Computer network}}
    576 bytes (73 words) - 19:05, 11 January 2010
  • {{r|Computer network}}
    829 bytes (102 words) - 05:56, 17 March 2024
  • {{r|Computer network}}
    697 bytes (85 words) - 11:30, 27 February 2010
  • {{r|Computer network}}
    548 bytes (69 words) - 16:01, 11 January 2010
  • In [[computer network]] [[protocol (computer)|protocols]], a unicast message, whether it be an ap
    622 bytes (96 words) - 00:05, 5 August 2008
  • {{r|Computer network}}
    197 bytes (24 words) - 17:14, 19 March 2009
  • ...License, except that it additionally covers the use of the software over a computer network, requiring that the complete source code be made available to any network u
    2 KB (251 words) - 03:44, 13 September 2009
  • ...reconnaissance''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking t
    2 KB (356 words) - 05:49, 8 April 2024
  • {{r|Computer network}}
    788 bytes (103 words) - 14:59, 20 March 2024
  • {{r|Computer network|Computer networks}}
    3 KB (353 words) - 03:48, 24 September 2013
  • Devices for [[computer network]]s involving applications that use multiple, variable TCP/UDP port numbers
    409 bytes (54 words) - 13:38, 7 May 2010
  • ...ted control]] levels. [[circuit switching|Circuit-switched]] and [[bridge (computer network)|bridged]] classified networks, however, can interconnect with the ATM back
    1 KB (151 words) - 10:20, 8 April 2024
  • {{r|Computer network}}
    680 bytes (92 words) - 21:38, 11 January 2010
  • {{r|Computer network}}
    830 bytes (103 words) - 14:41, 18 March 2024
  • {{r|Computer network}}
    3 KB (441 words) - 12:55, 13 November 2014
  • {{r|Computer network}}
    856 bytes (113 words) - 16:31, 11 January 2010
  • {{r|Computer network}}
    349 bytes (42 words) - 16:26, 16 March 2010
  • {{r|Computer network}}
    304 bytes (37 words) - 02:23, 12 February 2009
  • {{r|Computer network}}
    222 bytes (31 words) - 20:31, 13 November 2011
  • {{r|Bridge (computer network)}}
    300 bytes (36 words) - 05:38, 15 March 2024
  • {{r|Computer network}}
    328 bytes (46 words) - 17:33, 24 December 2009
  • {{r|Computer network}}
    1 KB (141 words) - 14:59, 20 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.
    442 bytes (56 words) - 20:24, 11 January 2010
  • '''Frame relay''' is a transmission system used to support [[computer network]]s, operating in [[locality of networks|wide area network|Wide Area Network
    1 KB (161 words) - 19:22, 15 September 2008
  • A '''personal area network (PAN)''' is a specialized type of [[computer network]], which benefits from extremely short range. Among its applications is rep
    4 KB (609 words) - 21:25, 23 May 2010
  • {{r|Sinkhole (Computer network)}}
    484 bytes (61 words) - 17:16, 11 January 2010
  • ...ciclomedia''' is a [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders and is planned to be
    963 bytes (132 words) - 10:50, 26 September 2007
  • Layer 2 networks based on bridge (computer network)|bridging directly track active MAC addresses and make forwarding decisions
    3 KB (527 words) - 07:31, 18 March 2024
  • {{r|Host (computer network)}}
    730 bytes (94 words) - 11:00, 11 January 2010
  • ...can be loosely defined as "moving packets around" on a [[Computer network|computer network]], in order to allow various different sub-networks (or [[subnets]]) to com
    6 KB (985 words) - 12:34, 30 March 2024
  • Originally a regional computer network for 54 colleges in Ohio, the OCLC gradually grew into an international netw
    3 KB (454 words) - 08:05, 22 April 2024
  • In computer network and server security, a '''sinkhole''' is a network element to which suspect
    3 KB (432 words) - 07:36, 18 March 2024
  • {{r|Sinkhole (Computer network)}}
    814 bytes (105 words) - 18:35, 11 January 2010
  • The '''topology''' of a [[computer network]] defines how that network is "laid out." Topologies can be either physical
    6 KB (923 words) - 12:40, 11 June 2009
  • {{r|Computer network}}
    965 bytes (125 words) - 15:51, 11 January 2010
  • A '''session border controller (SBC)''' is a [[computer network]]ing device that provide [[firewall]] and [[proxy services]] principally fo
    3 KB (383 words) - 05:48, 8 April 2024
  • {{r|Computer network}}
    1 KB (138 words) - 20:51, 11 January 2010
  • ...priate mechanisms to prevent interferences. Such media are used both for [[computer network]]s and [[telephony]], although the communications mechanisms are converging
    988 bytes (146 words) - 14:42, 14 September 2008
  • ...rs, servers, routers for access outide the LAN, and other computer network|computer network devices, within a relatively close distance of one another. LANs may be on
    7 KB (1,023 words) - 07:32, 18 March 2024
  • ...s]], the computers in a distributed computer may be connected over large [[computer network|networks]], and may be owned by many people or institutions. Several distr ...s, the time necessary for the master and workers to communicate over the [[computer network|network]], and the time necessary for the workers to perform their tasks.
    11 KB (1,565 words) - 15:12, 10 June 2010
  • ...lf" (COTS) hardware such as [[personal computer|personal computers]] and [[Computer network|Ethernet switches]] to link the machines together so that they act as one,
    4 KB (669 words) - 21:10, 12 February 2010
  • 7 KB (953 words) - 16:34, 9 September 2020
  • A '''computer network''' is a collection of [[computer]]s or digital devices ("nodes") connected In contrast to an ordinary computer network, where the user is aware of multiple computers, a '''[[distributed system]]
    15 KB (2,278 words) - 05:21, 8 March 2024
  • {{r|Computer network}}
    1 KB (173 words) - 14:49, 4 April 2024
  • ...internetwork layer]] is the dominant technology, supplemented by [[bridge (computer network)|bridging]] and hybrid technologies such as [[Multi-Protocol Label Switchin
    2 KB (316 words) - 11:40, 10 February 2011
  • ...ch reduce the productivity of a computer or compromise the security of a [[computer network|networked]] system. A much rarer alternate term is "scumware", a comment on
    6 KB (907 words) - 05:49, 8 April 2024
  • While the phrase ''client-server'' is most common in [[computer network]] [[protocol (computer)|protocols]], it is quite applicable to single-compu
    5 KB (744 words) - 22:36, 8 June 2011
  • warfare, computer network operations, psychological operations, military deception, and ...sures''' (ECM). Purely electronic or #computer network operations|software/computer network actions are called '''soft kill''', while physical destruction of enemy ele
    10 KB (1,449 words) - 07:30, 18 March 2024
  • HP both cooperates and competes with the largest [[computer network|computer networking]] vendor, [[Cisco Systems]]. Cisco recently started off
    3 KB (466 words) - 15:33, 8 March 2023
  • ...y (private to one computer) is used for decrypting. This allows users on a computer network to send their public ''encrypt'' key to strangers, who can then use it to s
    5 KB (879 words) - 09:41, 28 September 2023
  • ...y, however, the term has come to mean criminals who illegally break into [[Computer network|computer networks]] and systems.<ref>{{cite web
    6 KB (943 words) - 05:48, 8 April 2024
  • {{r|Computer network}}
    2 KB (205 words) - 12:38, 5 November 2009
  • '''Port scanning''' involves multiple [[computer network]] activities involving sending a stimulus to the Transmission Control Proto
    6 KB (1,008 words) - 05:48, 8 April 2024
  • {{r|Computer network}}
    2 KB (308 words) - 09:08, 19 April 2024
  • ...ap'' - Creates a map of a network by discovering hosts and services in the computer network. It further aids by detecting the OS that is running on a system. This wi
    11 KB (1,785 words) - 03:27, 5 November 2013
  • ===Computer network operations===
    8 KB (1,213 words) - 07:28, 18 March 2024
  • * Total dependency on [[computer network]] connection, usually to the [[Internet]]
    9 KB (1,384 words) - 03:56, 13 September 2009
  • The university features an ultra-modern computer network. 560 student computers, all of them fewer than 3 years old, are available
    4 KB (525 words) - 07:45, 26 March 2024
  • The '''Internet''' is a "network of [[computer network|networks]]" best known as the global network on which a wide range of appli
    17 KB (2,484 words) - 17:02, 22 March 2024
  • ...ures applied to information that traverses a telecommunications network or computer network, and continues into the computers themselves. There are a wide range of suc
    13 KB (2,000 words) - 16:21, 30 March 2024
  • ...tions allow for [[computer-mediated communication]], [[telegraphy]], and [[computer network]]s. ...e is also a vast array of networks that connect these devices, including [[computer network]]s, [[public telephone network]]s, [[radio network]]s and [[television netw
    15 KB (2,070 words) - 08:57, 22 April 2024
  • At the most basic, frame-level [[bridge (computer network)|bridges]] and packet-level [[router]]s can only make decisions about sendi
    10 KB (1,519 words) - 20:08, 10 June 2010
  • ''For the device used in [[computer network]]s, see [[router]]''<br />
    3 KB (546 words) - 14:31, 2 May 2010
  • ...computer happened to be one of the 15 [[Node (networking)|nodes]] on the [[computer network]] that would become the [[Internet]]. Hart believed that computers would on
    8 KB (1,290 words) - 10:48, 19 June 2023
  • The [[ARPANET]] [[computer network]] made a large contribution to the development of e-mail. There is one repo
    17 KB (2,760 words) - 11:50, 2 February 2023
  • ...ocuments containing information are delivered to individuals over a global computer network called the [[Internet]] and using a communications protocol called [[HTTP]]
    12 KB (1,802 words) - 08:48, 22 April 2024
  • ...for later retrieval; the second class is that of devices used to access [[computer network]]s. The ability to transfer data between computers has opened up a huge ran
    25 KB (3,906 words) - 12:07, 22 February 2009
  • ...g, the '''forwarding plane''' defines the part of the router (or bridge (computer network)|bridge architecture that decides what to do with frames arriving on an inb
    10 KB (1,511 words) - 07:30, 18 March 2024
  • ...ious network devices (such as [[Router|routers]]), in order to allow for [[Computer network|computer networks]] to effectively "move [[packets]] around" so to speak. O
    23 KB (3,713 words) - 12:20, 30 March 2024
  • ...nterventional, the radiologist will need to manipulate the controls over a computer network.
    9 KB (1,234 words) - 05:32, 31 May 2009
  • ...omputer science program in the USA. It is recognized for its programs in [[computer network security|network security]], [[information assurance]], [[digital cinema]]
    29 KB (4,140 words) - 09:54, 28 November 2022
  • ...only known "IPv6") is a method of addressing [[hosts]] or [[nodes]] on a [[computer network]], using 128 bit addresses. IPv6 was conceived as a "next generation" upgra
    39 KB (5,823 words) - 12:18, 30 March 2024
  • ...The major products included [[personal computer]]s, [[video game]]s, and [[Computer network|networking system]]s. The majority of these companies settled along a high
    35 KB (5,409 words) - 07:17, 28 March 2023
  • ...ine, includes psychological operations, electronic warfare, deception, and computer network operations; politicomilitary and civil-military operations are doctrinally
    84 KB (12,644 words) - 05:16, 31 March 2024