Search results
Jump to navigation
Jump to search
Page title matches
- A '''computer network''' is a collection of [[computer]]s or digital devices ("nodes") connected In contrast to an ordinary computer network, where the user is aware of multiple computers, a '''[[distributed system]]15 KB (2,278 words) - 05:21, 8 March 2024
- 81 bytes (10 words) - 06:17, 28 August 2009
- 12 bytes (1 word) - 06:59, 26 September 2007
- 124 bytes (15 words) - 09:26, 13 November 2008
- In [[computer network|networks of computers]], a '''host''' is a term for computers, on a network742 bytes (101 words) - 21:31, 2 February 2009
- 3 KB (490 words) - 05:49, 8 April 2024
- 932 bytes (116 words) - 11:20, 9 December 2009
- Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed wit232 bytes (32 words) - 12:53, 15 September 2008
- 181 bytes (23 words) - 06:17, 28 August 2009
- Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human.520 bytes (66 words) - 17:17, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.442 bytes (56 words) - 20:24, 11 January 2010
Page text matches
- The separation of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into gener331 bytes (37 words) - 09:49, 20 September 2009
- {{r|Computer network}} {{r|Bridge (computer network)}}331 bytes (41 words) - 22:45, 1 October 2009
- * [[Computer network|Computer networks]]509 bytes (52 words) - 20:02, 19 April 2011
- ==Computer network security== ...connaissance]]''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking t1 KB (176 words) - 04:40, 26 September 2013
- {{r|Computer network}}341 bytes (42 words) - 14:19, 1 December 2010
- {{r|Computer network}}388 bytes (44 words) - 15:18, 31 October 2008
- One who enters a computer or computer network without authorization by the owner or administrator, regardless of the moti173 bytes (24 words) - 10:14, 7 February 2009
- {{r|Computer network}}275 bytes (33 words) - 22:42, 13 July 2008
- #REDIRECT [[Computer network]]30 bytes (3 words) - 09:29, 16 March 2010
- ...architecture''', applicable to both [[telecommunications network]]s and [[computer network]]s as well as their continuing modern [[convergence of communications|conve607 bytes (83 words) - 09:46, 20 September 2009
- The process of sending stimuli to a computer network and analyzing the responses, which may be a legitimate operational function207 bytes (32 words) - 09:10, 4 February 2009
- {{r|Computer network|Computer networks}} {{r|Computer network}}761 bytes (100 words) - 09:48, 22 October 2010
- {{r|Computer network}}367 bytes (45 words) - 06:00, 17 March 2024
- {{r|Computer network}}413 bytes (50 words) - 11:59, 30 November 2008
- Rules for communication among devices in a computer network.60 bytes (9 words) - 08:20, 25 April 2023
- Use of [[computer network]]s, especially the [[Internet]], to access computer resources, operated by283 bytes (38 words) - 15:04, 18 March 2010
- Largest vendor of [[computer network]] equipment and software97 bytes (11 words) - 08:57, 5 August 2010
- *[[Computer network]]98 bytes (9 words) - 05:21, 8 March 2024
- Defines the method in which a computer network is architected; topologies can be either physical (meaning how the actual h262 bytes (37 words) - 00:06, 15 January 2009
- The class of devices that attach to a computer network90 bytes (13 words) - 14:45, 7 February 2009
- In [[computer network|networks of computers]], a '''host''' is a term for computers, on a network742 bytes (101 words) - 21:31, 2 February 2009
- In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that ma1 KB (190 words) - 05:48, 8 April 2024
- {{r|Bridge (computer network)}}425 bytes (53 words) - 10:00, 20 September 2009
- * [[Computer network]]694 bytes (57 words) - 07:46, 13 September 2020
- {{r|Computer network}}715 bytes (90 words) - 11:54, 31 December 2022
- A major manufactured of equipment for [[computer network]]s; Advisory Committee, Congressional Internet Caucus146 bytes (17 words) - 11:37, 19 March 2024
- A [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders.166 bytes (20 words) - 13:05, 29 November 2008
- {{r|Computer network}}2 KB (248 words) - 05:56, 17 March 2024
- In [[computer network]]s and [[telecommunications network]]s, a '''relay''' is an abstract or rea980 bytes (148 words) - 09:37, 20 September 2009
- {{r|Computer network}}1 KB (167 words) - 14:59, 20 March 2024
- {{r|Bridge (computer network)}}1 KB (165 words) - 05:56, 17 March 2024
- {{r|Bridge (computer network)}}168 bytes (20 words) - 06:25, 28 August 2009
- {{r|Computer network}}775 bytes (97 words) - 11:55, 11 January 2010
- ...nce of communications]] is pushing the concepts of telecommunication and [[computer network]] to be interchangeable.1 KB (147 words) - 17:26, 8 January 2009
- ...ters]], particularly when the crime is committed using the Internet or a [[computer network]].631 bytes (86 words) - 06:33, 6 April 2010
- {{r|Computer network}}680 bytes (84 words) - 19:33, 31 July 2008
- {{r|Host (computer network)}}64 bytes (8 words) - 03:37, 10 June 2009
- | product = Computer network devices '''Cisco Systems''' is an American technology company specializing in computer network technologies and devices.1 KB (147 words) - 07:09, 14 September 2013
- Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed wit232 bytes (32 words) - 12:53, 15 September 2008
- {{r|Host (computer network)}}518 bytes (67 words) - 20:18, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human.520 bytes (66 words) - 17:17, 11 January 2010
- The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations se209 bytes (23 words) - 20:08, 7 June 2008
- A technique, in [[computer network]]s, where a group of "spoke" devices all connect to a common "hub", but the219 bytes (32 words) - 11:22, 15 September 2008
- {{r|Computer network}}1 KB (144 words) - 00:13, 21 January 2011
- ...al damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software272 bytes (38 words) - 15:30, 25 December 2010
- ...viding multiple communications paths among logical or physical points in [[computer network]]s, primarily for [[fault tolerance]] but also for [[load distribution]] or261 bytes (34 words) - 12:38, 30 May 2010
- {{r|Computer network}}790 bytes (101 words) - 14:59, 20 March 2024
- {{r|Computer network}}673 bytes (87 words) - 17:59, 11 January 2010
- {{r|Host (computer network)}}1 KB (150 words) - 19:28, 11 January 2010
- {{r|Computer network}}745 bytes (92 words) - 19:25, 11 January 2010