Search results

Jump to navigation Jump to search
  • * [[pointer (computer science)]]
    100 bytes (11 words) - 20:43, 21 January 2009
  • professional librarian, computer scientist, and writer who won a 2013 artificial intelligence competition sp
    189 bytes (23 words) - 14:40, 22 January 2023
  • ...the name of an computer-based event recording service, and the [[protocol (computer)|protocol]] that delivers the event information to the server.<ref name=RFC For syslog, a computer that can generate a message is called a "device". A machine that can recei
    1 KB (171 words) - 15:12, 12 February 2009
  • ...prompt or shell is a place where textual commands can be entered into the computer, which then processes them and responds. The shells of which command lines
    673 bytes (108 words) - 21:19, 10 November 2009
  • ...g|thumb|right|180px| The [[iMac]] is an example of a modern-day all-in-one computer.]] ...puter keyboard|keyboard]] and [[mouse (computing)|mouse]], inside of the [[computer monitor|monitor]]'s case. However, AIOs have commonly included built-in key
    3 KB (383 words) - 11:35, 24 September 2007
  • ...ng asymptotic behaviour of functions, e.g. the complexity of algorithms in computer science.
    184 bytes (23 words) - 19:55, 5 August 2008
  • [[Computer architecture]]s that apply multiple tightly coupled processors, usually wit
    192 bytes (24 words) - 12:27, 28 July 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer]]. Needs checking by a human. {{r|Computer architecture}}
    3 KB (441 words) - 12:55, 13 November 2014
  • A physical, software, or abstract function that interconnects two or more computer or telecommunications networking domains
    159 bytes (19 words) - 09:39, 20 September 2009
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking media sharing protocols]]. Needs checking by a human. {{r|Computer networking media attachment protocols}}
    589 bytes (76 words) - 15:37, 11 January 2010
  • {{r|Computer}} {{r|Personal computer}}
    502 bytes (66 words) - 15:39, 11 January 2010
  • A method of abstracting machine code instructions for a computer into commands recognizable by a human.
    139 bytes (19 words) - 17:42, 30 November 2008
  • ...de>The name of the penguin, official logo and cartoon mascot for the Linux computer operating system.
    133 bytes (19 words) - 14:00, 15 May 2008
  • ...y a brilliant programmer. In popular usage, those who illegally break into computer systems.
    169 bytes (23 words) - 10:41, 25 July 2009
  • ...ng asymptotic behaviour of functions, e.g. the complexity of algorithms in computer science.
    190 bytes (24 words) - 04:42, 5 August 2008
  • In [[computer graphics]], an algorithm for constructing a 3D surface mesh from scalar 3D
    170 bytes (24 words) - 05:15, 5 February 2010
  • A nonprofit, membership, computer library service and research organization, founded in 1967 as the Ohio Coll
    165 bytes (20 words) - 00:31, 2 October 2009
  • '''Vernor Vinge''' (1944-2024) was a science-fiction writer, computer scientist and mathematician. As a sci-fi author, Vinge won [[Hugo Awards]] Vinge was also a professor of computer science at San Diego State University from 1972 until 2000. His first shor
    634 bytes (88 words) - 22:55, 25 March 2024
  • ...ite of the Day'' and ''Tip of the Day'' which are delivered to millions of computer users each day. Her radio program can also be heard on the web. Her websi
    1 KB (169 words) - 13:17, 2 February 2023
  • {{r|Computer architecture}} {{r|Pointer (computer science)}}
    669 bytes (88 words) - 17:27, 11 January 2010
  • General-purpose computer programming language that is frequently embedded within HTML pages on the W
    181 bytes (24 words) - 02:38, 3 June 2008
  • ...lemented in hardware are instead implemented using software on a personal computer or other embedded computing devices.
    229 bytes (29 words) - 09:41, 11 September 2009
  • ...ntrolled either by full-time manual [[telepresence]] or possibly with some computer-controlled autonomous operation
    198 bytes (24 words) - 14:13, 26 July 2010
  • A challenge encountered so commonly in object-oriented computer programming that its general solution is taught independently of any partic
    165 bytes (21 words) - 10:10, 11 October 2020
  • A collection of computer-readable records, at one or more location, that are organized in some meani
    180 bytes (25 words) - 13:45, 14 October 2008
  • Computer-assisted mathematical calculations of beam angles, intensities of radiation
    199 bytes (21 words) - 20:37, 15 August 2010
  • Auto-populated based on [[Special:WhatLinksHere/Closure (computer science)]]. Needs checking by a human. {{r|Computer science}}
    540 bytes (67 words) - 11:56, 11 January 2010
  • * [[Interpreter (computer)]]
    169 bytes (18 words) - 12:45, 31 May 2009
  • [[Open source software|Open source]] [[World Wide Web]] browser [[Computer program|application]].
    133 bytes (15 words) - 23:23, 5 July 2009
  • ...lled maintenance updates, since there is an implicit authorization, by the computer owner, to allow such updates to install and confuse resources. ...live" on their own. A biological virus must be a parasite inside a cell; a computer virus is a parasite to some other fully executable software.
    4 KB (577 words) - 05:48, 8 April 2024
  • A computer manufacturer which thrived during the early years of the first generation o
    143 bytes (19 words) - 20:50, 20 May 2008
  • A set of [[computer graphics]] techniques used to analyze the surface structure of the [[brain]
    133 bytes (18 words) - 16:03, 14 February 2010
  • ...that performs integer [[addition]] in the [[Arithmetic Logic Unit]] in a [[computer]].
    144 bytes (18 words) - 14:17, 8 December 2008
  • Early [[computer science]] and [[virtual reality]] researcher; invented [[hypertext]] while
    203 bytes (24 words) - 06:37, 19 April 2011
  • Set of interaction techniques which allow computer or mobile users to control graphical user interface with more than one fing
    204 bytes (29 words) - 03:33, 14 July 2010
  • {{r|Quine (computer program)}}
    79 bytes (11 words) - 11:48, 12 January 2009
  • An early single chip computer chip, from the 1970s, and a lineal ancestor of the Pentium
    124 bytes (19 words) - 14:12, 27 November 2008
  • A portable computer that is always on, always usable and is used while being in the personal sp
    147 bytes (24 words) - 18:17, 22 May 2010
  • High-performance computer chipsets, 32/64 bit-capable, intended for servers and high-performance work
    145 bytes (13 words) - 10:26, 22 February 2009
  • The main software of a computer system; controls the execution of applications and provides various service
    153 bytes (21 words) - 16:52, 20 May 2008
  • An early single chip computer chip, from the 1970s, and a lineal ancestor of the Pentium
    124 bytes (19 words) - 14:00, 27 November 2008
  • ...lude three volumes written by Donald Knuth collectively titled "The Art of Computer Programming" (ISBN 0201485419). *Ellis Horowitz and Sartaj Sahni (1978). Fundamentals of computer algorithms.
    1 KB (212 words) - 17:42, 20 February 2012
  • ...ere is an electrical or optical conversion between the signals seen on the computer interface, and those that are used in the larger transmission system. Some differences between the computer connections specification deal with installation convenience and interface
    2 KB (333 words) - 06:02, 31 May 2009
  • ...marketed as a floating point co-processor to the intel 80486sx single chip computer
    131 bytes (18 words) - 00:34, 28 November 2008
  • In computer science, the register that contains the memory address of the next instruct
    164 bytes (23 words) - 12:48, 14 June 2008
  • ...field overlaps heavily with the fields of [[electrical engineering]] and [[computer science]]. ==Examples of Computer Engineering==
    4 KB (608 words) - 13:08, 17 April 2013
  • ...y diverse situations, and is used in many academic fields from politics to computer science.
    226 bytes (32 words) - 12:59, 8 September 2008
  • A computer security expert who was awared the [[Wes Graham Award]] by his alma mater,
    161 bytes (23 words) - 20:35, 19 May 2022
  • ...design-related elements using special graphics and calculations intensive computer programs.
    226 bytes (26 words) - 22:24, 11 September 2009
  • A test for [[artificial intelligence]] proposed by [[Alan Turing]]; if a computer can handle conversation well enough to appear human, then it must be behavi
    210 bytes (29 words) - 23:19, 1 November 2008
  • ...r intelligence and includes parts of cognitive psychology, linguistics and computer science.
    165 bytes (21 words) - 08:36, 26 March 2009
  • ...e (file) or database type object that is stored in a router or a networked computer.
    138 bytes (21 words) - 22:04, 19 June 2008
  • ...lklore.org]- Anecdotes about the development of Apple's original Macintosh computer, and the people who created it
    151 bytes (22 words) - 21:44, 26 April 2008
  • ...most certainly deserves to be recognized to be the first modern electronic computer. However, Zuse was in a chaotic German wartime environment and lacked offic ...ter was the first designer to propose [[pipelining]] the computations of a computer [[CPU|processor]]. In 1949, Zuse formed Zuse KG, where he worked until 196
    2 KB (226 words) - 08:25, 8 June 2009
  • Prestigious award in [[computer science]], presented by the [[Association for Computing Machinery]]<ref>[ht
    240 bytes (31 words) - 15:36, 10 August 2020
  • In computers and computer security, occurs when more data is written to a memory buffer than can fit
    160 bytes (25 words) - 23:56, 29 June 2009
  • ...technology and consumer electronics. It was formerly called the European Computer Manufacturers Association (ECMA). Among other important standards, it is t ECMA manages many of the standards having to do with interoperability of computer software, including the standard specifications for various programming lan
    827 bytes (111 words) - 12:18, 17 April 2023
  • {{r|Computer networking reference models}} {{r|Computer network}}
    1 KB (167 words) - 14:59, 20 March 2024
  • {{r|Computer Go}} {{r|Computer}}
    823 bytes (105 words) - 11:04, 11 January 2010
  • ...Finlay, J., Abowd, G., Beale, R., [http://www.hiraeth.com/books/hci/ Human Computer Interaction] , Prentice Hall, 1993 ...M. Baecker, J. Grudin, W. A. S. Buxton, S. Greenberg: ''Readings in Human-Computer Interaction: Towards the Year 2000.'' 1995, San Francisco, CA: Morgan Kaufm
    1 KB (193 words) - 01:04, 7 November 2013
  • A computer industry organization that develops and promulgates architectures and inter
    255 bytes (27 words) - 10:37, 22 February 2009
  • ...that facilitates [[symbolic mathematics]]. The core functionality of any computer algebra systems is manipulation of mathematical expressions in symbolic for Typical symbolic manipulations that can be performed by ''computer algebra systems'' include:
    1 KB (164 words) - 14:01, 18 January 2008
  • An inexpensive subnotebook computer intended to be distributed to children in developing countries around the w
    195 bytes (26 words) - 09:57, 14 September 2009
  • ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].
    176 bytes (22 words) - 16:46, 7 September 2010
  • {{r|Computer networking media sharing protocols}} {{r|Computer networking reference models}}
    709 bytes (90 words) - 17:21, 11 January 2010
  • The set of nasty things that an attacker installs on a computer system after he or she acquires administrator privileges, or in Unix terms
    190 bytes (29 words) - 19:07, 2 April 2009
  • {{r|Computer networking media sharing protocols}} {{r|Bridge (computer network)}}
    1 KB (165 words) - 05:56, 17 March 2024
  • {{r|Relaxation (computer graphics)|In computer graphics}}
    414 bytes (48 words) - 11:46, 31 May 2009
  • {{r|Computer network}} {{r|Computer networking application protocols}}
    680 bytes (84 words) - 19:33, 31 July 2008
  • Computer-processable information with destination addresses that are unique only whe
    243 bytes (29 words) - 00:34, 2 February 2009
  • [[protocol (computer) | Protocol]] and administrative convention to manage the interaction of tw
    187 bytes (24 words) - 01:00, 15 July 2008
  • Sub-field of computational linguistics that investigates the use of computer software to translate text or speech from one natural language to another.
    188 bytes (25 words) - 18:26, 12 September 2009
  • {{r|Computer networking application protocols}} {{r|Protocol (computer)}}
    698 bytes (88 words) - 18:27, 11 January 2010
  • The taking of a command (i.e., a directive from a computer program) and handing it to another command.
    139 bytes (22 words) - 19:56, 23 January 2009
  • {{r|Computer network}} {{r|Server (computer)}}
    680 bytes (92 words) - 21:38, 11 January 2010
  • ...search engine, it requires knowledge of unambiguous or minimally ambiguous computer-friendly identifiers and relatively human-friendly identifiers. ...y. In most cases, only one name corresponds to a given telephone number or computer identifier. There are exceptions when calls are automatically forwarded fro
    2 KB (238 words) - 00:46, 28 October 2013
  • ...but room for only one set of KVM components, and, again, will use only one computer at a time. ...sible to use virtual terminal applications to take software control of one computer for another, that assumes a windowing operating system. If the computers be
    3 KB (475 words) - 15:05, 12 February 2009
  • ...cially in the subfield of [[programming languages]], the '''syntax''' of a computer language is the set of allowed [[reserved word]]s and possible [[token_(par The syntax of computer languages is often at level-2 (ie, a [[context-free grammar]]) in the [[Cho
    2 KB (246 words) - 00:21, 15 November 2007
  • The '''Motorola 6800''' is a [[single chip computer]] introduced by [[integrated circuit]] manufacturer [[Motorola]] in 1974.<r ...er]]s for its [[peripheral device]]s shared the same bus used to address [[computer memory|memory]].
    1 KB (140 words) - 21:58, 27 November 2008
  • {{r|Computer science}} {{r|Computer networking reference models }}
    932 bytes (116 words) - 11:20, 9 December 2009
  • In computer networks, the transmission of a frame, packet, or message, which has a dest
    175 bytes (27 words) - 13:43, 1 December 2008
  • An early single chip computer with 16-bit architecture, with a more extensive instruction set than the [[
    195 bytes (26 words) - 13:42, 22 February 2009
  • {{r|Host (computer network)}}
    64 bytes (8 words) - 03:37, 10 June 2009
  • ...d graphics coprocessor responsible for handling the graphics output of the computer, generally to the monitor.
    171 bytes (21 words) - 12:01, 1 June 2008
  • ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]] {{r|Computer architecture}}
    807 bytes (103 words) - 12:05, 6 March 2024
  • {{r|Computer network}} {{r|Computer science}}
    830 bytes (103 words) - 14:41, 18 March 2024
  • {{r|Common student exercises in computer science}} {{r|Computer network}}
    819 bytes (107 words) - 08:37, 4 May 2024
  • # [[Internet Key Exchange]], a computer protocol.
    183 bytes (24 words) - 04:31, 19 November 2008
  • ...ying and configuring of software, such that it can be executed on a target computer.
    173 bytes (26 words) - 02:50, 14 January 2024
  • ...deliberately generated electromagnetic signals, for human communications, computer control and monitoring, and noncommunications electronics such as radar and
    257 bytes (28 words) - 21:38, 2 February 2009
  • Computer information that has destination addresses unique only on a shared transmis
    225 bytes (30 words) - 09:12, 15 September 2009
  • ...anization]] for communications and computers, formerly called the European Computer Manufacturers Association, the source for the ECMAScript standard behind [[
    196 bytes (23 words) - 13:24, 15 April 2023
  • Short-range, high-speed, low-latency computer interconnect architecture used both at the level of interconnection within
    223 bytes (26 words) - 14:06, 28 July 2010
  • a computer program that runs by itself, as opposed to being directly controlled by a u
    145 bytes (22 words) - 14:46, 30 September 2009
  • A [[computer program]] that attempts to [[simulation|simulate]] an abstract [[model (abs
    162 bytes (20 words) - 20:51, 27 April 2010
  • Military computer workstation for the [[Force XXI Battle Command Brigade and Below]] command
    188 bytes (24 words) - 23:57, 27 July 2010
  • In computer science, a type of ordered collection in which each item contains a referen
    154 bytes (24 words) - 21:54, 30 October 2009
  • | title = CODE: The Hidden Language of Computer Hardware and Software
    227 bytes (27 words) - 14:05, 9 January 2010
  • Instances of server software hosted simultaneously on a single computer along with other instances of the same, or different, server operating syst
    187 bytes (25 words) - 05:58, 11 July 2010
  • {{r|Cell (computer architecture)}}
    96 bytes (12 words) - 05:32, 22 February 2010
  • ...puter to pass the 1-million-mark in January 1983, and was the best-selling computer of the year 1982 (with 800,000 units). ...handled all the sounds too. It was designed by Commodore to be a low-cost computer, with gaming and programming capabilities. However, that machine was a bit
    2 KB (384 words) - 15:51, 3 May 2008
  • ...least one [[edge]] with at least one neighbour; an essential element of [[computer graphics]].
    167 bytes (25 words) - 05:33, 5 February 2010
  • * [http://www.computerhistory.org/ The Computer History Museum]
    207 bytes (28 words) - 21:37, 26 April 2008
  • An attack on a computer or communications system that tries to prevent the system delivering its no
    162 bytes (24 words) - 19:43, 2 April 2009
  • The combination of [[computer security]], [[communications security]], [[auditing]] and administrative co
    234 bytes (24 words) - 14:55, 26 February 2010
  • A [[protocol (computer)|protocol model]] for networking, in which the client always initiates requ
    191 bytes (26 words) - 10:49, 3 August 2008
  • [[terrorism|Terrorist]] attacks on resources on computer and telecommunications networks, or use of Internet and other cyberspace to
    198 bytes (24 words) - 13:29, 13 September 2009
  • Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be anal
    232 bytes (32 words) - 12:53, 15 September 2008
  • In [[computer graphics]], '''topology correction''' refers to procedures that correct inc
    228 bytes (29 words) - 05:45, 8 September 2009
  • A computer server on a [[printed circuit board]] of a [[form factor]] that lets multip
    221 bytes (31 words) - 15:28, 17 March 2010
  • ...pes (such as integer or string) to variables at the time of execution of a computer program, rather than during the compilation phase.
    196 bytes (30 words) - 00:23, 2 October 2009
  • '''Jon Callas''' is a computer security expert best known for work related to PGP. He has a rather out-of- Callas worked for Digital Equipment, for Apple Computer, for PGP Incorporated, the company set up by Phil Zimmermann to commerciali
    744 bytes (121 words) - 07:31, 18 March 2024
  • (1948- ) Computer scientist and [[futurism|futurist]], one of the major proponents of the con
    177 bytes (21 words) - 02:18, 27 July 2011
  • A concept in computer science whereby an [[operating system]] can use alternate (usually slower)
    246 bytes (35 words) - 11:54, 4 July 2009
  • Moderately high-performance computer processors, in both 32-bit/64-bit and single core/[[multicore processor]] m
    246 bytes (29 words) - 10:18, 22 February 2009
  • The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and opera
    209 bytes (23 words) - 20:08, 7 June 2008
  • A very flexible [[protocol (computer)|protocol]] for running data over a wide range of media, which use a logica
    173 bytes (24 words) - 11:35, 26 August 2008
  • A technique, in [[computer network]]s, where a group of "spoke" devices all connect to a common "hub",
    219 bytes (32 words) - 11:22, 15 September 2008
  • In computer security, a program that a user is induced to run deliberately for some app
    207 bytes (32 words) - 22:58, 23 February 2009
  • ...rm for a [[marine navigation]] device that, at a minimum, links a display, computer-readable charts and a [[Global Navigation Satellite System]]
    229 bytes (28 words) - 22:31, 12 January 2011
  • ...artificial agent, usually an electro-mechanical machine which is guided by computer or electronic programming, and is thus able to do tasks on its own.
    210 bytes (30 words) - 07:14, 11 September 2009
  • *[[Computer graphics]]
    103 bytes (9 words) - 16:25, 17 February 2008
  • An early single chip computer chip, from the 1970s, derived from the [[Intel 8008]] but to some extent a
    174 bytes (25 words) - 13:27, 22 February 2009
  • {{r|Computer networking end-to-end protocols}} {{r|Computer networking session protocols}}
    847 bytes (104 words) - 21:34, 11 January 2010
  • ==Examples of Latency in Computer Networking==
    1 KB (209 words) - 06:39, 4 November 2007
  • {{r|Computer science}} {{r|Computer program}}
    888 bytes (123 words) - 17:03, 13 July 2008
  • *[[Computer algebra system]]
    250 bytes (30 words) - 11:48, 8 February 2009
  • ...ors optimized for the power consumption constraints of mobile and laptop [[computer]]s, but still offering [[multicore processor]] performance; higher performa
    255 bytes (32 words) - 01:33, 18 February 2010
  • ...d chairperson, [[PARSA Community Foundation]]; former executive, [[Oracle (computer software)|Oracle, Inc.]]
    256 bytes (31 words) - 12:37, 5 April 2024
  • A function that maps to and from human-readable names and computer-readable addresses, not intended to be a [[search engine]]
    161 bytes (22 words) - 02:16, 12 February 2009
  • ...ftware", used to describe undesirable or harmful software and changes to a computer.
    169 bytes (24 words) - 00:21, 7 February 2009
  • {{rpl|Syntax (computer science)}}
    124 bytes (15 words) - 07:14, 24 September 2013
  • {{rpl|Culture (computer programming)}}
    124 bytes (15 words) - 04:40, 26 September 2013
  • In telecommunications and computer networking, a location at which service providers can connect to one anothe
    206 bytes (28 words) - 08:19, 16 July 2009
  • Optical disc storage technology for video, audio, and computer data which holds high-quality digital video, better-than-CD audio, pictures
    206 bytes (25 words) - 23:22, 3 March 2010
  • ...ronic Charting System]] that may run on a dedicated device or a [[personal computer]]; typically accepts inputs, via [[NMEA 0183]] interface, from a wide range
    255 bytes (35 words) - 22:20, 12 January 2011
  • * [[Syndication (computers)]] - computer standards for allowing users to subscribe to regular updates on certain kin
    249 bytes (30 words) - 22:14, 1 October 2009
  • ...F) has existed since 1976, created by [[Sol Libes]] of the [[Acgnj|Amateur Computer Group of New Jersey]] and [[Allen Katz]] of [[The College of New Jersey]] (
    750 bytes (117 words) - 20:15, 2 December 2009
  • ...al damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software
    272 bytes (38 words) - 15:30, 25 December 2010
  • ...viding multiple communications paths among logical or physical points in [[computer network]]s, primarily for [[fault tolerance]] but also for [[load distribut
    261 bytes (34 words) - 12:38, 30 May 2010
  • ...ia]], [[California (U.S. state)]]. The device is a touchscreen tablet-form computer that runs the [[iPhone]] "touch" OS, as well as software designed for the i
    759 bytes (114 words) - 10:23, 27 March 2023
  • A set of procedures in [[computer graphics]] that correct inconsistencies in the [[topology (mathematics)|top
    222 bytes (30 words) - 05:47, 8 September 2009
  • | product = Computer and Consumer Products '''Dell Inc.''' (formerly known as Dell Computer Corporation) is an American electronic hardware manufacturing company prima
    3 KB (487 words) - 05:48, 28 September 2013
  • A computer operating system originally conceived and developed by a group of researche
    202 bytes (29 words) - 11:38, 1 June 2008
  • *.xyz: a computer file format for modelling molecules
    194 bytes (29 words) - 10:00, 28 May 2010
  • A '''computer tower''' is the basic physical enclosure for [[modular computer system]]s used for desktop workstations and for servers with less than the ...[motherboard]], [[power supply (computer)]], [[disk bay]]s, [[cooling fan (computer)]] and possibly additional cooling components, and [[peripheral card]]s. Th
    2 KB (270 words) - 11:41, 22 February 2009
  • ...nd transmits the [[angle]] of the pivot two or three [[dimensions]] to a [[computer]] or [[video game]] device.
    859 bytes (136 words) - 15:08, 19 May 2010
  • An interactive entertainment computer or electronic device that manipulates the video display signal of a display
    205 bytes (28 words) - 21:25, 12 July 2008
  • A field at the intersection of [[mathematics]] and [[computer science]] that is concerned with the [[security of information]], typically
    250 bytes (30 words) - 03:05, 21 May 2010
  • {{r|Computer science}} {{r|Computer}}
    978 bytes (131 words) - 18:06, 11 January 2010
  • ...r IP]] service that can be used to make calls from computer to computer or computer to telephone. In addition to the common functions of instant messaging (IM) ...ts contacts from email-based applications which have been installed on the computer.
    2 KB (296 words) - 08:58, 22 April 2024
  • ...heir apparent use of [[origin of language|language]] via [[lexigram]]s and computer-based keyboards.
    266 bytes (33 words) - 21:46, 14 September 2009
  • The component in an electronic computer that performs all the active processing of its programming directions, and
    273 bytes (36 words) - 18:25, 16 June 2008
  • ...ng material. In this chapter we will cover all aspects that fall under '''Computer Science Foundation'''. The material covered here will get you prepared fo * [[Computer Organization]]
    1 KB (134 words) - 00:53, 18 February 2009
  • ...eans, including one's complement, two's complements, and variants, used in computer memory and mass storage to differentiate positive from negative numbers
    204 bytes (27 words) - 13:21, 18 November 2008
  • [[Malware]] that overwhelms processing, memory, or network resources of a computer system by sending large numbers requests that appear legitimate, but at a h
    258 bytes (37 words) - 20:09, 22 February 2009
  • ...8085A die.jpg | left | thumb | Die image of an Intel 8085A, a single chip computer]] [[File:Intel C8085.jpg | thumb | an 8085 single chip computer is mounted within this [[Dual in-line package]] from 1976.]]
    926 bytes (134 words) - 12:03, 6 March 2024
  • ...[[operating system]]. The term dates back to the original [[IBM]] personal computer of the early 1980's. ...ten to a [[CMOS]] (complimentary metal oxide semiconductor) chip, and some computer enthusiasts used the terms "BIOS" and "CMOS" interchangeably.
    3 KB (483 words) - 14:23, 15 July 2008
  • (1944-2024) Science-fiction writer. computer scientist and mathematician who won five Hugo Awards, including for the nov
    229 bytes (30 words) - 22:55, 25 March 2024
  • Until quite recently, [[Intel]] computer chipsets were separated into very-high-speed "northbridge" components inclu
    281 bytes (31 words) - 09:45, 28 August 2009
  • An early single chip computer with 16-bit architecture, chosen by IBM for the 1979 introduction of the fi
    208 bytes (31 words) - 13:40, 22 February 2009
  • ...ation security]] functions that may or may not reside in a single physical computer. Large or fault-tolerant networks have multiple firewalls. The functions c *(necessarily) a single computer
    1 KB (190 words) - 05:48, 8 April 2024
  • ...would complete his degree in the mid 1980's long after the launch of Apple Computer. Wozniak's partnership with [[Steve Jobs]] began in 1970. Jobs supplied mar
    853 bytes (125 words) - 10:18, 27 March 2023
  • ...n called simply ISA, is the formal specification of a particular type of [[computer]], in the form of a full description of the instructions which the machine ...ISA falls within the [[computer science]] area of specialization called [[computer architecture]].
    2 KB (364 words) - 10:41, 4 January 2022
  • a first-person [[computer role-playing game]] for [[MS-DOS]], released in 1994 by [[Bethesda Softwork
    208 bytes (26 words) - 05:44, 9 December 2010
  • ...ta.org/main/news/stories/college_science.php?news_story_ID=47561&print=yes Computer Analogies], ''Journal of College Science Teaching'' '''32''' No. 3, p. 176- |align=center|'''Computer science'''
    2 KB (278 words) - 00:32, 1 April 2008
  • ....H., T.A. DeFanti, M.D. Brown (ed), Visualization in Scientific Computing, Computer Graphics Vol. 21, No. 6, November 1987.</ref>.
    2 KB (236 words) - 09:18, 18 February 2008
  • ...1, to a radical decision made by IBM when it introduced its first personal computer ([[x86]]-based). IBM published the [[BIOS|BIOS]] (Basic Input/Output Syste To be called IBM compatible, a computer's processor must be [[x86]]-based, and all the hardware components must adh
    2 KB (279 words) - 14:38, 7 July 2009
  • ...ttps://www.si.edu/object/log-book-computer-bug%3Anmah_334663 Log Book with Computer Bug], Smithsonian National Museum of American History
    317 bytes (44 words) - 13:02, 5 July 2022
  • *Computer generated summit panoramas [http://www.viewfinderpanoramas.org/panoramas/CE
    332 bytes (43 words) - 10:55, 24 January 2009
  • ...of study which provides useful procedures in the fields of mathematics and computer science.
    205 bytes (30 words) - 00:31, 10 September 2012
  • ...s wise to require that changing privileges be done from a separate, secure computer. ...rity Agency]], it should be able to access a Navy computer. Accessing that computer, however, does not mean a soldier in a tank can get into every application
    3 KB (397 words) - 20:52, 4 November 2008
  • ...December 28th, 1969 to Nils and Anna Torvalds, is a [[Finland|Finnish]] [[computer]] [[software engineer]] known for writing the initial versions of the [[ope ...studying at the [[University of Helsinki]] in 1988, where he majored in [[computer science]]. He and his wife Tove Monni Torvalds have three children, Patrici
    981 bytes (134 words) - 06:47, 14 September 2013
  • {{r|String (computer science)}}
    144 bytes (17 words) - 12:28, 4 July 2009
  • ...cs-animations.com/Physics/English/f02_tmp.htm |accessdate=2011-03-07 |work=Computer animations of physical processes |publisher=physics-animations.com }} Anima
    256 bytes (31 words) - 13:00, 7 March 2011
  • {{r|Computer}} {{r|Computer program}}
    880 bytes (140 words) - 18:36, 11 July 2010
  • ...and the public Internet. Some relay types are associated with layers in [[computer networking reference models]], such as [[router]]s at the Internetworking L
    980 bytes (148 words) - 09:37, 20 September 2009
  • ...tures. The precise shaping of dose distribution is achieved via the use of computer-controlled multileaf collimators.<noinclude>{{DefMeSH}}</noinclude>
    296 bytes (37 words) - 14:17, 22 June 2010
  • A means of human-to-computer interfacing, most commonly implemented over a voice [[telephone]] call, in
    231 bytes (33 words) - 16:49, 22 December 2008
  • {{rpl|Relay (computer controlled)}}
    184 bytes (21 words) - 05:05, 24 September 2013
  • ...produce a secure cipher that required the user neither to have access to a computer nor to carry anything that might be incriminating, such as a cipher machine The book includes a computer implementation, written in [[Perl]] by [[Ian Goldberg]]. There are other im
    949 bytes (145 words) - 23:50, 12 May 2011
  • Discussion of the many different computer programs developed worldwide that use mathematical algorithms to simulate h
    260 bytes (36 words) - 18:25, 24 May 2011
  • The process of sending stimuli to a computer network and analyzing the responses, which may be a legitimate operational
    207 bytes (32 words) - 09:10, 4 February 2009
  • ...an be either remote-controlled by human operators or operate under its own computer control, and can carry lethal or nonlethal payloads (i.e., weapons and sens
    249 bytes (37 words) - 13:20, 11 August 2009
  • A feature in some computer programming languages that allows a procedure to bind to its environment, s
    296 bytes (45 words) - 14:19, 30 April 2011
  • ...for [[Email|email]] which requires messages to be downloaded to a client's computer, phone or tablet for reading.
    184 bytes (25 words) - 16:09, 21 January 2023
  • Virtual worlds are computer-based simulations of environments where the users of such environments can
    216 bytes (29 words) - 20:44, 16 September 2008
  • ...a problem which is trivial for a human to solve, but very difficult for a computer program (see [[artificial intelligence]]). ...[[computer security|exploit]] those services will often attempt to write a computer program that can automatically register for and use said services. CAPTCHA
    3 KB (388 words) - 20:29, 22 March 2011
  • {{rpl|Program (software)|In computer science}}
    96 bytes (12 words) - 06:23, 26 September 2013
  • ...arch in the psychology of speech perception laid the groundwork for modern computer speech synthesis, and the understanding of critical issues in cognitive sci
    265 bytes (33 words) - 10:03, 12 September 2009
  • | title = The Best Laid Plans of Mice and Men: The Computer Mouse in the History of Computing
    259 bytes (34 words) - 21:58, 28 December 2008
  • The act of releasing computer security vulnerability details without first informing vendors or allowing
    267 bytes (38 words) - 17:09, 21 July 2010
  • Chairman of EDventure Holdings, a computer industry business group; board of directors, [[National Endowment for Democ
    298 bytes (36 words) - 18:24, 14 September 2009
  • ...//www.unicog.org/main/pages.php?page=NumberRace The Number Race] &mdash; a computer game designed to improve numerical processing in children with dyscalculia
    357 bytes (50 words) - 15:02, 11 August 2010
  • A hardened but isolated component of a network or computer, which is intended to be attractive to [[miscreant]]s and invite attacks, w
    249 bytes (38 words) - 10:11, 12 June 2009
  • ...osed of an ordered sequence of [[record]]s, is transferred from one source computer to one or more destination computers. The [[Trivial File Transfer Protocol|
    905 bytes (126 words) - 11:04, 11 July 2010
  • Associate Professor of Computer Science and Director of Laboratory for International Data Privacy; visiting
    316 bytes (35 words) - 17:09, 3 October 2009
  • ...e design and testing specifications, and reliable and timely [[programming|computer code]] is produced, so as to fit the needs of potential users and to be mai
    282 bytes (41 words) - 11:31, 29 April 2010
  • {{rpl|Closure (computer science)}}
    151 bytes (17 words) - 05:13, 26 September 2013
  • A reference in a computer document to a website document in another place; clicking on it brings the
    170 bytes (26 words) - 19:09, 1 March 2010
  • Military computer workstation and communications processing to interface to the [[Army Battle
    259 bytes (33 words) - 23:44, 27 July 2010
  • ...on board a computer. These circuits are fundamental to the operation of a computer and have an analog in traditional pencil-and-paper addition. ...trons represents a '''1''' and a lack of electrons represents a '''0'''. A computer's ALU (Arithmetic Logic Unit) consists of a variety of circuits that perfor
    2 KB (368 words) - 05:19, 17 March 2024
  • * [[computer role-playing game]]
    130 bytes (11 words) - 05:22, 27 February 2009
  • ...tters and receivers, [[Global Navigation Satellite System]] receivers, and computer control into a self-organizing, mobile network in which vessels are inform
    340 bytes (42 words) - 11:58, 15 April 2009
  • A '''role-playing video game''', sometimes called a '''computer role-playing game''' (abbreviated cRPG or CRPG), is a [[role-playing game] ...nct effects on game play. Particularly in recent years, the evolution of [[computer graphics]] has allowed game designers to lushly detail their imagined world
    2 KB (259 words) - 14:58, 19 May 2010
  • General-purpose military command and control laptop computer, using the [[Microsoft Windows]] operating system to run the U.S. Army [[Ma
    290 bytes (38 words) - 23:53, 27 July 2010
  • ...an integrated [[electronic warfare]] system which fires, manually or under computer control, [[flare (electronic warfare)|flares]], [[chaff (electronic warfare
    329 bytes (41 words) - 15:04, 27 November 2010
  • The '''P-versus-NP problem''' is a major unsolved problem in theoretical [[computer science]]. Basically, the issue is if every problem whose solution can be q
    215 bytes (31 words) - 17:03, 13 January 2024
  • A computer-assisted means of controlling a complex machine, such as an automobile or a
    301 bytes (46 words) - 17:01, 15 August 2008
  • Defines the method in which a computer network is architected; topologies can be either physical (meaning how the
    262 bytes (37 words) - 00:06, 15 January 2009
  • {{r|Operator (computer programming)}}
    182 bytes (18 words) - 11:06, 31 May 2009
  • ...nd [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend to people and t
    319 bytes (41 words) - 08:45, 13 September 2009
  • A variety of techniques in electronic engineering, computer science, and network engineering, the most basic of which being multiple l
    307 bytes (42 words) - 13:30, 26 February 2010
  • {{r|Translation (computer)}}
    160 bytes (16 words) - 15:30, 31 October 2014
  • A related, and often ambiguous, computer term is [[Synchronization]].
    282 bytes (34 words) - 10:36, 4 April 2024
  • ...electrical or optical, specification that defines the connection between a computer and the transmission medium, aspects or all details of the transmission me
    226 bytes (31 words) - 11:33, 14 September 2008
  • ...zed piece of software, which is an unauthorized consumer of resources on a computer; it may or may not propagate to other computers inside software sent to the
    266 bytes (43 words) - 10:08, 7 February 2009
  • ...social stratification, the nature of duty, and, interestingly, the role of computer technicians in a context that completely missed trends in the development o
    304 bytes (40 words) - 10:12, 26 June 2009
  • ...or the purpose of illustrating the steps involved in the installation of a computer program.
    319 bytes (47 words) - 09:53, 7 December 2022
  • {{r|Computer network}}
    197 bytes (24 words) - 17:14, 19 March 2009
  • *[[Computer algebra system]]
    119 bytes (12 words) - 08:32, 1 June 2008
  • ...Society for Modeling and Simulation International (Formerly the Society of Computer Simulation)] ...dCast/files/podcast29.mp3 Sabanci University School of Languages Podcasts: Computer Simulation by Prof. David M. Goldsman]
    2 KB (290 words) - 20:45, 1 May 2008
  • A hardware device that plugs into a common computer interface, such as a serial or [[USB]] port, which serves as an [[authentic
    387 bytes (53 words) - 11:23, 7 May 2010
  • | journal = Computer
    426 bytes (51 words) - 10:38, 29 August 2008
  • * In [[logic]] and [[computer science]]
    478 bytes (48 words) - 09:33, 31 December 2008
  • ...nt in the [[history of computing]] for having invented a viable mechanical computer equivalent to modern digital computers. ...y 1800's for the purpose of computing naval navigation charts. His second computer, also never quite finished, was called the Analytical Engine. It was gener
    2 KB (313 words) - 07:27, 14 February 2016
  • ...graphic Organization]], for a device that, at a minimum, links a display, computer-readable charts and a [[Global Navigation Satellite System]] such as [[GPS] ...a function that runs on a commercial [[personal computer]] or a dedicated computer. Chartplotter tends to imply that the device will accept real-time electron
    3 KB (369 words) - 22:52, 12 January 2011
  • [[Computer]]
    99 bytes (10 words) - 18:34, 17 October 2007
  • '''Grace Murray Hopper''' (-1992) was a pioneering [[computer science|computer scientist]] and a [[rear admiral]] in the [[United States Navy]]. In the te When computer speeds broke into the microsecond range, she commanded her staff to "bring
    4 KB (696 words) - 15:41, 8 April 2024
  • ...tication server in combination with a user ID; the code is manually into a computer session by the user
    263 bytes (37 words) - 11:15, 7 May 2010
  • ...ing, a broad term that usually refers to the abstraction of resources on a computer, using a container such as a "virtual machine" or several "virtual machines
    353 bytes (55 words) - 12:48, 4 July 2009
  • In computer science, anything that turns one set of instructions into another set of in
    367 bytes (49 words) - 20:43, 5 July 2009
  • ...ings, is the goal of having all types of human-to-computer and computer-to-computer communications '''converge onto''' (i.e., all run over) a common infrastruc ..., private branch exchange) on a purpose-built router, or a general-purpose computer.
    3 KB (351 words) - 04:39, 5 April 2024
  • The set of [[protocol (computer)|protocols]] and administrative conventions that let multiple computers or
    351 bytes (47 words) - 17:15, 28 August 2008
  • ...nsure interested parties are notified of a [[software]] issue, wherein the computer itself or one of its programs is not performing to expectations. Software i
    284 bytes (44 words) - 02:50, 13 January 2024
  • ...omputer operators by formally defining the threshold of criminal damage to computer systems. Nonmonetary damages, such as threats to safety, are also included # damage affecting a computer system used by or for a government entity in furtherance of the administrat
    2 KB (261 words) - 12:47, 22 November 2010
  • ...ds user application programs to create and read mail, but also [[protocol (computer)|protocols]] to transfer and deliver electronic envelopes. ...e, which is in the user application program that runs on the user's client computer.
    2 KB (279 words) - 05:12, 31 May 2009
  • ...ctionality of a computer system, but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer.<ref>[http://wearcam.o There are three new ways how a wearable computer and it's user may interact.
    6 KB (1,035 words) - 22:16, 15 September 2013
  • In computer and network security, the term '''miscreant''' is a preferred neutral term ...re rarely amused. Even if the hacker believed his acts were "ethical", the computer owner or user might not &mdash; there was a conflict of ethics.
    3 KB (448 words) - 05:48, 8 April 2024
  • In computer science, an '''interpreter''' is anything that turns one set of instruction ...s also a result of the fact that an interpreter is itself is a typically a computer program that runs in a loop of the form:
    4 KB (636 words) - 09:49, 20 August 2023
  • '''Computer networking media sharing protocols''' define the rules of attachment of a s
    325 bytes (47 words) - 12:38, 30 March 2024
  • Virtual worlds are computer based environments where the user can modify or control aspects of environm
    313 bytes (47 words) - 19:58, 16 September 2008
  • {{rpl|Myth (computer game)}}
    287 bytes (41 words) - 04:57, 24 September 2013
  • ...h as a [[cellular telephony|cell phone]] or larger device such as a laptop computer
    295 bytes (47 words) - 12:19, 21 March 2009
  • '''KANT''' is a [[computer algebra system]] for mathematicians interested in algebraic number theory, * [[Comparison of computer algebra systems]]
    1 KB (152 words) - 08:31, 14 September 2013
  • * For {{r|Protocol (computer)|computers|}}
    146 bytes (16 words) - 05:57, 2 January 2010
  • In mathematics or computer science, an '''algorithm''' is a sequence of steps for one particular metho ...thm consists of the steps to follow in solving a problem. When encoded in computer programs, algorithms operate on data values, preferably data maintained in
    2 KB (286 words) - 07:49, 10 February 2021
  • Devices for [[computer network]]s involving applications that use multiple, variable TCP/UDP port
    409 bytes (54 words) - 13:38, 7 May 2010
  • a first-person [[computer role-playing game]] (CRPG) for [[MS-DOS]], developed by [[Bethesda Softwork
    311 bytes (45 words) - 06:58, 26 September 2009
  • A [[single-player]] [[Computer role-playing game|role-playing]] [[video game]] developed by Bethesda Game
    343 bytes (44 words) - 20:50, 30 September 2009
View ( | ) (20 | 50 | 100 | 250 | 500)