Search results

Jump to navigation Jump to search

Page title matches

  • This is a list of '''seminal concepts in [[computer science]]'''. ...r instructions for faster throughput (invention of); but I don't know what computer actually did it first
    3 KB (490 words) - 10:26, 30 March 2024
  • ...edded in a gadget such as a phone or a TV remote. Even defining the word ''computer'' may spark a debate, because so many different kinds of computers exist, a ...ver, this definition may only make sense to people who already know what a computer can do. Computers are extremely versatile. In fact, they are ''universal''
    9 KB (1,333 words) - 10:08, 28 February 2024
  • #REDIRECT [[Computer]]
    22 bytes (2 words) - 20:29, 8 January 2008
  • ...uch as text printed on a screen or sent to a printer). The main problem of computer programming is how to put simple operations together in a way that is effec ...urces of a computer. This ensures that several programs can coexist on one computer.
    2 KB (365 words) - 09:56, 16 July 2013
  • #REDIRECT [[Computer architecture]]
    35 bytes (3 words) - 21:36, 26 April 2008
  • 12 bytes (1 word) - 06:54, 26 September 2007
  • 33 bytes (3 words) - 10:07, 28 April 2008
  • #REDIRECT[[Personal computer]]
    30 bytes (3 words) - 13:44, 14 February 2007
  • 33 bytes (3 words) - 01:03, 29 April 2008
  • ...r)|client]]. The client communicates with a server by using a [[protocol (computer)|protocol]] to request and receive information. Any computer can be a server, from a personal computer to a multi-thousand [[US dollar|dollar]] server. A server is primarily def
    6 KB (917 words) - 04:36, 2 March 2024
  • 28 bytes (3 words) - 15:49, 29 February 2008
  • ...icated example of a protocol is the set or "stack" of protocols used in [[computer networking reference models]], such as the [[Internet Protocol Suite]] or [
    737 bytes (104 words) - 05:43, 17 March 2024
  • A '''computer tower''' is the basic physical enclosure for [[modular computer system]]s used for desktop workstations and for servers with less than the ...[motherboard]], [[power supply (computer)]], [[disk bay]]s, [[cooling fan (computer)]] and possibly additional cooling components, and [[peripheral card]]s. Th
    2 KB (270 words) - 11:41, 22 February 2009
  • 32 bytes (3 words) - 13:41, 16 April 2007
  • In computer science, an '''interpreter''' is anything that turns one set of instruction ...s also a result of the fact that an interpreter is itself is a typically a computer program that runs in a loop of the form:
    4 KB (636 words) - 09:49, 20 August 2023
  • ...the academic discipline of [[electrical engineering]]. The field known as computer architecture may touch all aspects of how specific computers can be specifi This article will discuss the basics of computer organization, and related articles will expand on each basic part, since th
    25 KB (3,906 words) - 12:07, 22 February 2009
  • 87 bytes (11 words) - 09:31, 13 November 2008
  • '''Computer punctuation''' follows strict rules. Understanding these rules helps progra
    2 KB (305 words) - 08:48, 19 November 2011
  • #REDIRECT [[Computer#Academia_and_professional_societies]]
    58 bytes (6 words) - 20:14, 1 October 2008
  • ...ctionality of a computer system, but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer.<ref>[http://wearcam.o There are three new ways how a wearable computer and it's user may interact.
    6 KB (1,035 words) - 22:16, 15 September 2013
  • '''Computer science''' is an academic discipline which studies aspects of [[computer|computers]], computation and [[software]]. There are many areas of specialization within computer science. Some of these areas are:
    509 bytes (52 words) - 20:02, 19 April 2011
  • ...oads, or [[data]]. The communications on the network follow a [[Protocol (computer)|protocol]] that determines how [[data encoding|data is encoded]], how [[me ...tion the networked devices are referred to as "devices" or "nodes". Today, computer networks also contain devices such as intelligent sensors or actuators that
    15 KB (2,278 words) - 05:21, 8 March 2024
  • |Alwac III computer, 1959.jpg|Alwac III computer, 1959.jpg
    357 bytes (44 words) - 18:10, 7 June 2010
  • ...xample, will typically include the ability to play [[music]] and display [[computer graphics|graphics]] quickly. A server, on the other hand, is intended to b ...M]] in 1983 introduced the [[IBM PC]]. This development prompted aspiring computer manufacturers such as Compaq to legally reverse engineer the IBM BIOS (the
    15 KB (2,382 words) - 08:45, 22 April 2024
  • 81 bytes (10 words) - 04:08, 22 February 2010
  • 29 bytes (3 words) - 21:20, 26 April 2008
  • ...is the field of [[artificial intelligence]] (AI) dedicated to creating a [[computer program]] that plays [[Go (board game)|go]], an ancient [[board game]]. <br ...ert games or play against opponents across the internet are not considered computer go programs in this sense and will not be discussed in this page.
    26 KB (4,194 words) - 05:43, 13 March 2020
  • 29 bytes (3 words) - 21:21, 26 April 2008
  • 50 bytes (6 words) - 14:25, 14 October 2008
  • ...field overlaps heavily with the fields of [[electrical engineering]] and [[computer science]]. ==Examples of Computer Engineering==
    4 KB (608 words) - 13:08, 17 April 2013
  • ...e" someone can be that the data stored on automations equipment (such as a computer or server) has not been maliciously tampered with or read by untrusted thir ...on, computer security is often more technical and mathematical than some [[computer science]] fields.
    2 KB (267 words) - 05:49, 8 April 2024
  • ...Kheir>{{cite book|author=Naim A. Kheir (Editor)|title=Systems Modeling and Computer Simulation|edition=2nd Edition|publisher=CRC Press|year=1996|id=ISBN 0-8247 ...on of all possible states of the model would be prohibitive or impossible. Computer models were initially used as a supplement for other arguments, but their u
    14 KB (1,986 words) - 17:07, 22 March 2024
  • ...s a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • A '''daemon''' is a computer program that runs automatically when a computer boots up, as opposed to being directly started by a user. Typically, there
    665 bytes (103 words) - 00:21, 19 October 2013
  • 174 bytes (26 words) - 08:51, 19 November 2011
  • ...F) has existed since 1976, created by [[Sol Libes]] of the [[Acgnj|Amateur Computer Group of New Jersey]] and [[Allen Katz]] of [[The College of New Jersey]] (
    750 bytes (117 words) - 20:15, 2 December 2009
  • ...ting a Quine in various computer languages has been a popular challenge to computer programmers; this problem has been posed to readers in various magazines su
    853 bytes (140 words) - 11:13, 12 January 2009
  • 909 bytes (134 words) - 09:56, 19 September 2009
  • Rules for communication among devices in a computer network.
    60 bytes (9 words) - 08:20, 25 April 2023
  • A set of instructions to be executed by a computer.
    87 bytes (13 words) - 23:46, 16 December 2009
  • ...r hardware, the design and development of low-level computer software, and computer hardware-software integration.
    214 bytes (26 words) - 12:49, 17 April 2013
  • A [[computer program]] that attempts to [[simulation|simulate]] an abstract [[model (abs
    162 bytes (20 words) - 20:51, 27 April 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer]]. Needs checking by a human. {{r|Computer architecture}}
    3 KB (441 words) - 12:55, 13 November 2014
  • 46 bytes (5 words) - 13:53, 21 November 2011
  • 12 bytes (1 word) - 14:39, 12 November 2007
  • ...tional [[drafting board]]. But now it is the term often interchanged with "Computer-Aided Design" to reflect the fact that modern CAD tools do much more than j
    414 bytes (59 words) - 14:42, 6 December 2007
  • 124 bytes (15 words) - 09:26, 13 November 2008
  • 799 bytes (111 words) - 22:10, 27 April 2010
  • Command interpreters envelope a computer application, and provide an environment in which it is run.
    136 bytes (18 words) - 10:00, 22 July 2013
  • Field of artificial intelligence dedicated to creating a computer program that plays the ancient board game ''go''.
    151 bytes (20 words) - 08:48, 23 January 2009
  • ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti
    562 bytes (83 words) - 09:13, 12 November 2007
  • In [[computer network|networks of computers]], a '''host''' is a term for computers, on a ...s|Windows]] (both workstation (aka [[Personal computer|PC]]) and [[Server (computer)|server]] roles)
    742 bytes (101 words) - 21:31, 2 February 2009
  • 12 bytes (1 word) - 06:56, 26 September 2007
  • ...8085A die.jpg | left | thumb | Die image of an Intel 8085A, a single chip computer]] [[File:Intel C8085.jpg | thumb | an 8085 single chip computer is mounted within this [[Dual in-line package]] from 1976.]]
    926 bytes (134 words) - 12:03, 6 March 2024
  • 12 bytes (1 word) - 13:37, 13 November 2007
  • A computer whose price, size, and features make it suitable for personal use.
    113 bytes (16 words) - 08:21, 21 May 2008
  • 81 bytes (10 words) - 06:17, 28 August 2009
  • In [[computer science]], a '''pointer''' is the [[memory]] address of some other data. M ...orm]] or [[C sharp (programming language)|C#]], all variables of [[object (computer science)|object type]] are actually implemented as pointers, though program
    5 KB (695 words) - 20:34, 21 January 2009
  • 3 KB (490 words) - 05:49, 8 April 2024
  • =='''Computer crime legislation around the world'''== *[http://www.austlii.edu.au/au/other/crime/125.html|Computer Misuse Act 1990] ([[United Kingdom|UK]]).
    4 KB (625 words) - 08:30, 24 September 2023
  • 12 bytes (1 word) - 15:45, 14 November 2007
  • 12 bytes (1 word) - 06:58, 26 September 2007
  • 30 bytes (3 words) - 15:36, 10 December 2008
  • 128 bytes (16 words) - 11:43, 22 February 2009
  • 81 bytes (10 words) - 09:45, 28 August 2009
  • 12 bytes (1 word) - 11:57, 12 April 2008
  • 12 bytes (1 word) - 06:58, 26 September 2007
  • ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].
    176 bytes (22 words) - 16:46, 7 September 2010
  • ...ng material. In this chapter we will cover all aspects that fall under '''Computer Science Foundation'''. The material covered here will get you prepared fo * [[Computer Organization]]
    1 KB (134 words) - 00:53, 18 February 2009
  • A portable computer that is always on, always usable and is used while being in the personal sp
    147 bytes (24 words) - 18:17, 22 May 2010
  • 12 bytes (1 word) - 06:59, 26 September 2007
  • ...cially in the subfield of [[programming languages]], the '''syntax''' of a computer language is the set of allowed [[reserved word]]s and possible [[token_(par The syntax of computer languages is often at level-2 (ie, a [[context-free grammar]]) in the [[Cho
    2 KB (246 words) - 00:21, 15 November 2007
  • ...that facilitates [[symbolic mathematics]]. The core functionality of any computer algebra systems is manipulation of mathematical expressions in symbolic for Typical symbolic manipulations that can be performed by ''computer algebra systems'' include:
    1 KB (164 words) - 14:01, 18 January 2008
  • * [[/Pioneers|Computer industry pioneers]] * [[/Breakthroughs|Conceptual breakthroughs in computer science]]
    211 bytes (23 words) - 13:18, 27 October 2009
  • 12 bytes (1 word) - 07:00, 26 September 2007
  • 167 bytes (23 words) - 12:25, 16 May 2008
  • #REDIRECT [[Closure (computer science)]]
    40 bytes (4 words) - 17:12, 6 January 2009
  • 32 bytes (3 words) - 12:27, 4 July 2009
  • ...ware]], there are conflicting definitions of closure within the field of [[computer science]]. According to [[Martin Fowler]]: "Some people say that the term o
    819 bytes (115 words) - 17:12, 6 January 2009
  • 12 bytes (1 word) - 07:01, 26 September 2007
  • In computer science, anything that turns one set of instructions into another set of in
    367 bytes (49 words) - 20:43, 5 July 2009
  • 80 bytes (8 words) - 07:01, 7 April 2010
  • 41 bytes (4 words) - 07:28, 7 April 2010
  • ...eans, including one's complement, two's complements, and variants, used in computer memory and mass storage to differentiate positive from negative numbers
    204 bytes (27 words) - 13:21, 18 November 2008
  • 12 bytes (1 word) - 09:56, 19 September 2009
  • ...Computer networking endpoints, or among routers and routers. A variety of Computer networking layer management protocols support them, including routing proto
    409 bytes (50 words) - 16:22, 30 March 2024
  • {{r|Computer}} {{r|Computer program}}
    526 bytes (60 words) - 21:40, 27 April 2010
  • 34 bytes (4 words) - 09:12, 3 February 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer tower]]. Needs checking by a human.
    445 bytes (58 words) - 15:37, 11 January 2010
  • * [http://www.cs.ualberta.ca/~emarkus/compgo_biblio/ Online Computer Go bibliography]. ...ComputerGo Computer Go] and [http://senseis.xmp.net/?ComputerGoProgramming Computer Go Programming] pages at [http://senseis.xmp.net Sensei's Library]
    3 KB (398 words) - 06:08, 9 June 2009
  • Auto-populated based on [[Special:WhatLinksHere/Server (computer)]]. Needs checking by a human. {{r|Host (computer network)}}
    518 bytes (67 words) - 20:18, 11 January 2010
  • ...design-related elements using special graphics and calculations intensive computer programs.
    226 bytes (26 words) - 22:24, 11 September 2009
  • 12 bytes (1 word) - 06:55, 26 September 2007
  • 12 bytes (1 word) - 20:34, 21 January 2009
  • 181 bytes (23 words) - 06:17, 28 August 2009
  • 123 bytes (13 words) - 09:56, 19 September 2009
  • 37 bytes (4 words) - 14:49, 19 May 2010
  • ...Society for Modeling and Simulation International (Formerly the Society of Computer Simulation)] ...dCast/files/podcast29.mp3 Sabanci University School of Languages Podcasts: Computer Simulation by Prof. David M. Goldsman]
    2 KB (290 words) - 20:45, 1 May 2008
  • 12 bytes (1 word) - 11:02, 12 January 2009
  • Auto-populated based on [[Special:WhatLinksHere/Personal computer]]. Needs checking by a human. {{r|Computer architecture}}
    1 KB (150 words) - 19:28, 11 January 2010
  • a computer program that runs by itself, as opposed to being directly controlled by a u
    145 bytes (22 words) - 14:46, 30 September 2009
  • 12 bytes (1 word) - 06:57, 26 September 2007
  • To varying extents, architectures for computer networking have used conceptual models into which their mechanisms are mapp ...working devices such as routers. OSI has the concept that, inside a single computer, layer (N) provides a defined set of ''abstract services'' to layer (N+1),
    18 KB (2,694 words) - 16:22, 30 March 2024
  • {{r|Computer}} {{r|Computer architecture}}
    413 bytes (50 words) - 11:59, 30 November 2008
  • * [http://www.old-computers.com/ Old Computers Museum] (all computer types) * [http://computer.howstuffworks.com/pc.htm Howstuffworks' article on "How PCs Work"]
    766 bytes (102 words) - 08:44, 28 September 2013
  • Until quite recently, [[Intel]] computer chipsets were separated into very-high-speed "northbridge" components inclu
    281 bytes (31 words) - 09:45, 28 August 2009
  • Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be anal
    232 bytes (32 words) - 12:53, 15 September 2008
  • Auto-populated based on [[Special:WhatLinksHere/Interpreter (computer)]]. Needs checking by a human.
    467 bytes (58 words) - 17:31, 11 January 2010
  • 12 bytes (1 word) - 00:20, 15 November 2007
  • ...is a list of people who have made major ''conceptual'' breakthroughs in [[computer science]]. This list should ''not'' include people just because they invented a new computer, operating system, or type of software, unless they devised an innovation w
    4 KB (515 words) - 09:39, 10 November 2008
  • 86 bytes (12 words) - 15:37, 10 December 2008
  • 240 bytes (35 words) - 20:43, 5 January 2024
  • 12 bytes (1 word) - 06:38, 15 November 2007
  • 120 bytes (13 words) - 08:39, 1 June 2008
  • {{r|Computer science}} {{r|Computer networking reference models }}
    932 bytes (116 words) - 11:20, 9 December 2009
  • ...en Systems Interconnection Reference Model]], '''session-layer [[protocol (computer)|protocols]]''' have been found to be useful in specific functions, such as ...ls#Resource Reservation Protocol|Resource Reservation Protocol]] (RSVP), [[Computer networking session protocols#Remote Procedure Call|Remote Procedure Call (R
    8 KB (1,226 words) - 12:37, 30 March 2024
  • A feature in some computer programming languages that allows a procedure to bind to its environment, s
    296 bytes (45 words) - 14:19, 30 April 2011
  • Transformation of computer programs and compilers to decrease runtime.
    106 bytes (12 words) - 13:08, 14 March 2009
  • ...who have made major ''practical'' breakthroughs in the development of the computer industry. If unlinked, these are placeholders until an article can be writ This list should include people who have invented a significantly new computer, operating system, or type of software, or significant business or licensin
    2 KB (232 words) - 18:13, 8 November 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer program]]. Needs checking by a human. {{r|Computer Go}}
    934 bytes (121 words) - 15:37, 11 January 2010
  • 12 bytes (1 word) - 17:12, 6 January 2009
  • 108 bytes (16 words) - 11:49, 1 June 2008
  • Auto-populated based on [[Special:WhatLinksHere/Protocol (computer)]]. Needs checking by a human. {{r|Computer networking reference models}}
    2 KB (248 words) - 05:56, 17 March 2024
  • 81 bytes (10 words) - 20:37, 15 August 2010
  • The memory address of some data in computer science.
    88 bytes (12 words) - 20:34, 21 January 2009
  • {{r|Computer network|Computer networks}} ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]]
    3 KB (353 words) - 03:48, 24 September 2013
  • 12 bytes (1 word) - 17:57, 23 December 2007
  • {{r|Computer}} {{r|Computer engineering}}
    459 bytes (59 words) - 12:02, 30 November 2008
  • 238 bytes (37 words) - 23:31, 22 October 2008
  • 245 bytes (28 words) - 15:30, 25 October 2010
  • 12 bytes (1 word) - 09:13, 12 November 2007
  • ...of information they transfer (e.g., self-contained messages, file transfer|computer files, remote procedure calls, spoken language, etc.). Note well that thes ...provide security, expect certain security services from the end-to-end or computer networking internetwork protocols over which they run, or both.
    3 KB (360 words) - 16:21, 30 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human. {{r|Computer science}}
    815 bytes (100 words) - 15:37, 11 January 2010
  • '''Computer networking media sharing protocols''' allow two or more computers to connec ...orking media attachment protocols, which manage the attachment of a single computer to a medium.
    720 bytes (100 words) - 07:28, 18 March 2024
  • '''Computer networking media sharing protocols''' define the rules of attachment of a s
    325 bytes (47 words) - 12:38, 30 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.
    442 bytes (56 words) - 20:24, 11 January 2010
  • * [http://www.tcf-nj.org/web/ Trenton Computer Festival]
    70 bytes (9 words) - 13:14, 15 February 2009
  • A communication protocol for computer to computer networking.
    97 bytes (11 words) - 13:54, 25 May 2008
  • {{r|Computer}}
    878 bytes (140 words) - 15:05, 1 October 2009
  • 46 bytes (5 words) - 14:49, 19 May 2010
  • 212 bytes (28 words) - 00:24, 19 October 2013
  • Auto-populated based on [[Special:WhatLinksHere/Optimization (computer science)]]. Needs checking by a human.
    500 bytes (62 words) - 03:47, 24 September 2013
  • Auto-populated based on [[Special:WhatLinksHere/Computer Science Foundations]]. Needs checking by a human.
    464 bytes (58 words) - 15:36, 11 January 2010
  • 474 bytes (62 words) - 19:14, 11 January 2010
  • {{r|Computer science}}
    368 bytes (47 words) - 07:54, 13 July 2008
  • Auto-populated based on [[Special:WhatLinksHere/Single chip computer]]. Needs checking by a human.
    669 bytes (85 words) - 12:05, 6 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/Pointer (computer science)]]. Needs checking by a human.
    505 bytes (65 words) - 19:36, 11 January 2010
  • Computer-assisted mathematical calculations of beam angles, intensities of radiation
    199 bytes (21 words) - 20:37, 15 August 2010
  • Auto-populated based on [[Special:WhatLinksHere/Closure (computer science)]]. Needs checking by a human. {{r|Computer science}}
    540 bytes (67 words) - 11:56, 11 January 2010
  • 31 bytes (4 words) - 09:33, 12 April 2010
  • {{r|Computer program}}
    873 bytes (138 words) - 11:02, 12 January 2009
  • #REDIRECT [[Common student exercises in computer science]]
    58 bytes (7 words) - 17:24, 13 March 2007
  • Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human. {{r|Personal computer}}
    520 bytes (66 words) - 17:17, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Syntax (computer science)]]. Needs checking by a human.
    499 bytes (63 words) - 20:45, 11 January 2010
  • 83 bytes (12 words) - 11:02, 12 January 2009
  • '''Amateur Computer Group of New Jersey''' (ACGNJ) is a computer user group (club) based in Scotch Plains, NJ. It was founded in May of 1975 ...b, with help from several other organizations, organizes the [[Tcf|Trenton Computer Festival]] every spring.
    415 bytes (64 words) - 02:19, 14 September 2013
  • A successful family of single chip computer, used in most home computers built in the early 2000s
    133 bytes (20 words) - 11:55, 12 July 2023
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking application protocols]]. Needs checking by a human. {{r|Computer networking reference models}}
    545 bytes (68 words) - 15:36, 11 January 2010
  • 54 bytes (6 words) - 14:49, 19 May 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking internetwork protocols]]. Needs checking by a human. {{r|Computer networking application protocols}}
    502 bytes (62 words) - 15:37, 11 January 2010
  • {{r|Computer network}} {{r|Computer networking application protocols}}
    680 bytes (84 words) - 19:33, 31 July 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking session protocols]]. Needs checking by a human. {{r|Computer networking end-to-end protocols}}
    544 bytes (68 words) - 15:37, 11 January 2010
  • ...s concrete problems. These '''Scholary problems''' used for teaching '''in computer science''' are often not only intended as examples but also serve to light
    2 KB (269 words) - 12:04, 23 April 2009
  • 12 bytes (1 word) - 06:42, 26 September 2007
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking media attachment protocols]]. Needs checking by a human. {{r|Computer networking media sharing protocols}}
    495 bytes (62 words) - 15:37, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking media sharing protocols]]. Needs checking by a human. {{r|Computer networking media attachment protocols}}
    589 bytes (76 words) - 15:37, 11 January 2010
  • 12 bytes (1 word) - 12:32, 24 September 2007
  • Auto-populated based on [[Special:WhatLinksHere/Common student exercises in computer science]]. Needs checking by a human.
    510 bytes (66 words) - 15:34, 11 January 2010
  • #REDIRECT [[Computer science/Catalogs/Breakthroughs]]
    53 bytes (5 words) - 18:12, 8 November 2008
  • * [http://www.tcf-nj.org/web/ Trenton Computer Festival]
    207 bytes (30 words) - 02:19, 14 September 2013
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking end-to-end protocols]]. Needs checking by a human. {{r|Computer networking application protocols}}
    642 bytes (79 words) - 15:37, 11 January 2010
  • 8 KB (1,172 words) - 16:22, 30 March 2024

Page text matches

  • {{r|Computer}} {{r|Computer engineering}}
    459 bytes (59 words) - 12:02, 30 November 2008
  • '''Computer science''' is an academic discipline which studies aspects of [[computer|computers]], computation and [[software]]. There are many areas of specialization within computer science. Some of these areas are:
    509 bytes (52 words) - 20:02, 19 April 2011
  • ...ing]], as well as develop [[natural language processing]] to improve human-computer interaction.
    299 bytes (35 words) - 08:06, 22 February 2021
  • ...cords]] comprising a [[file]], from at least one computer, to at least one computer
    189 bytes (28 words) - 17:52, 21 July 2008
  • A communication protocol for computer to computer networking.
    97 bytes (11 words) - 13:54, 25 May 2008
  • ...|networked protocols]] and for [[interprocess communications]] on a single computer
    246 bytes (30 words) - 12:22, 31 May 2009
  • An acclaimed [[computer science|computer scientist]], [[mathematics|mathematician]], and professor emeritus at [[Sta
    171 bytes (17 words) - 17:20, 7 December 2008
  • {{r|Computer program}} {{r|Computer science}}
    463 bytes (60 words) - 12:07, 11 November 2009
  • {{Image|Doug Engelbart.png|right|350px|Doug Engelbart meets with other computer scientists}} ...ngelbart''' is an [[United States of America|American]] [[computer science|computer scientist]].
    501 bytes (62 words) - 11:53, 2 February 2023
  • * [[/Pioneers|Computer industry pioneers]] * [[/Breakthroughs|Conceptual breakthroughs in computer science]]
    211 bytes (23 words) - 13:18, 27 October 2009
  • ...|networked protocols]] and for [[interprocess communications]] on a single computer
    287 bytes (36 words) - 12:22, 31 May 2009
  • {{r|Computer}} {{r|Computer architecture}}
    413 bytes (50 words) - 11:59, 30 November 2008
  • ...tional [[drafting board]]. But now it is the term often interchanged with "Computer-Aided Design" to reflect the fact that modern CAD tools do much more than j
    414 bytes (59 words) - 14:42, 6 December 2007
  • American [[computer science|computer scientist]] and [[software engineering|software engineer]]; winner of the 1
    186 bytes (21 words) - 07:56, 15 March 2021
  • ...d wireless, intended for use in very limited areas, such as living bodies, computer to peripheral connections, or process control
    221 bytes (29 words) - 21:25, 23 May 2010
  • ...r hardware, the design and development of low-level computer software, and computer hardware-software integration.
    214 bytes (26 words) - 12:49, 17 April 2013
  • ...r systems, which justifies law enforcement attention; of wider use against computer crime than against terrorism alone
    210 bytes (29 words) - 12:47, 22 November 2010
  • * [http://www.old-computers.com/ Old Computers Museum] (all computer types) * [http://computer.howstuffworks.com/pc.htm Howstuffworks' article on "How PCs Work"]
    766 bytes (102 words) - 08:44, 28 September 2013
  • Auto-populated based on [[Special:WhatLinksHere/Computer program]]. Needs checking by a human. {{r|Computer Go}}
    934 bytes (121 words) - 15:37, 11 January 2010
  • ...s a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • A [[computer protocol]] [[protocol (computer)|message]] that is addressed to one and only one destination
    141 bytes (18 words) - 00:10, 5 August 2008
  • One who enters a computer or computer network without authorization by the owner or administrator, regardless of
    173 bytes (24 words) - 10:14, 7 February 2009
  • ...opposed to the methods by which it takes unauthorized actions inside that computer
    171 bytes (25 words) - 16:25, 22 February 2009
  • {{r|Computer}} {{r|Computer engineering}}
    353 bytes (42 words) - 12:12, 12 April 2011
  • ...Computer networking endpoints, or among routers and routers. A variety of Computer networking layer management protocols support them, including routing proto
    409 bytes (50 words) - 16:22, 30 March 2024
  • ...ter XT]], [[IBM PCjr]], [[IBM Portable Personal Computer]], [[IBM Personal Computer/AT]] and [[IBM PC Convertible]]. It was designed by IBM Entry Systems Divis
    747 bytes (113 words) - 12:10, 8 September 2020
  • ...ter that is emulated but the software inside thinks that it runs on a real computer.
    148 bytes (24 words) - 10:44, 8 August 2010
  • ...e" someone can be that the data stored on automations equipment (such as a computer or server) has not been maliciously tampered with or read by untrusted thir ...on, computer security is often more technical and mathematical than some [[computer science]] fields.
    2 KB (267 words) - 05:49, 8 April 2024
  • ...ems involve efficient and robust [[algorithm]]s which can be executed on a computer.
    210 bytes (28 words) - 19:05, 12 February 2008
  • ...] and much of networking, but dismissed the significance of the [[personal computer]]
    209 bytes (27 words) - 20:42, 28 July 2010
  • ...[[programming language]]. He is currently the Chair in [[Computer science|Computer Science]] at [[Texas A&M University]].
    190 bytes (26 words) - 15:31, 10 February 2008
  • {{rpl|Optimization (computer science)}} * [[List of compiler optimizations]] in [[computer science]]
    241 bytes (28 words) - 03:46, 24 September 2013
  • '''Amateur Computer Group of New Jersey''' (ACGNJ) is a computer user group (club) based in Scotch Plains, NJ. It was founded in May of 1975 ...b, with help from several other organizations, organizes the [[Tcf|Trenton Computer Festival]] every spring.
    415 bytes (64 words) - 02:19, 14 September 2013
  • * [http://www.cs.ualberta.ca/~emarkus/compgo_biblio/ Online Computer Go bibliography]. ...ComputerGo Computer Go] and [http://senseis.xmp.net/?ComputerGoProgramming Computer Go Programming] pages at [http://senseis.xmp.net Sensei's Library]
    3 KB (398 words) - 06:08, 9 June 2009
  • ...ch that they can be stored in a computer system or transmitted to a remote computer
    242 bytes (37 words) - 19:02, 16 August 2008
  • ...ters]], particularly when the crime is committed using the Internet or a [[computer network]]. # Crime that targets computer networks or devices
    631 bytes (86 words) - 06:33, 6 April 2010
  • Use of [[computer network]]s, especially the [[Internet]], to access computer resources, operated by a third party; access is on-demand and dynamically a
    283 bytes (38 words) - 15:04, 18 March 2010
  • ...ecurity''', is a broad term that includes both communications security and computer security, along with the appropriate administrative infrastructure for pers ==Computer security==
    2 KB (232 words) - 16:21, 30 March 2024
  • ...ed for a variety of consumer computer devices as well as the [[Macintosh]] computer (before they switched to the [[PowerPC]] architecture).
    258 bytes (35 words) - 12:07, 24 April 2010
  • ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]] {{r|Computer architecture}}
    1 KB (187 words) - 13:39, 29 April 2011
  • Section 5.2 "Routing Algorithms" in "Computer Networks", 4th ed, A.S. Tanenbaum, Prentice-Hall 2003. Section 4.2 "Routing" in "Computer Networks: A Systems Approach", 4th ed, L.L. Peterson, B.S. Davie, Morgann K
    486 bytes (63 words) - 04:33, 3 February 2011
  • ...)|protocol]] that has the absolutely minimal set of functions needed for a computer, with no local storage for executable code, to get its basic operating syst
    262 bytes (40 words) - 12:02, 23 August 2008
  • ...n of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into generally unde
    331 bytes (37 words) - 09:49, 20 September 2009
  • '''Computer networking media sharing protocols''' allow two or more computers to connec ...orking media attachment protocols, which manage the attachment of a single computer to a medium.
    720 bytes (100 words) - 07:28, 18 March 2024
  • ==Computer science==
    311 bytes (42 words) - 03:04, 21 March 2024
  • *Garbage (computer science): Unreferenced data in a computer's memory.
    436 bytes (61 words) - 05:56, 20 August 2013
  • {{r|Computer network|Computer networks}} {{r|computer}}
    761 bytes (100 words) - 09:48, 22 October 2010
  • {{r|Complement (computer architecture)}} {{r|Complement (computer languages)}}
    296 bytes (31 words) - 11:00, 31 May 2009
  • {{r|Computer proof}} {{r|Computer-aided proof}}
    498 bytes (61 words) - 20:25, 21 November 2009
  • In computer science: {{r|Character (computer)}}
    217 bytes (25 words) - 03:39, 8 August 2009
  • ...zation''' is a transformation of computer programs that, when applied to a computer program P, produces an equivalent program P' which is in some way more opti
    562 bytes (83 words) - 09:13, 12 November 2007
  • ...early 1980s and released in 1984 by Apple Inc. (at the time known as Apple Computer).
    311 bytes (47 words) - 22:44, 23 September 2008
  • * Scott, A Hugh. Computer and Intellectual Property Crime: Federal and State Law. Washington DC: BNA * Pipkin, Donald L. Halting the Hacker: A Practical Guide to Computer Security (with CD-ROM). Indianapolis: Prentice Hall PTR, 2002.
    354 bytes (46 words) - 20:40, 12 September 2013
  • * [[Computer science]] * [[Computer vision]]
    326 bytes (32 words) - 12:58, 13 November 2014
  • == Computer Speech Recognition History and Survey == Robert D. Rodman (1999) ''Computer Speech Technology'' ISBN 0890062978 '''The best survey for non-expert read
    967 bytes (126 words) - 18:54, 29 August 2011
  • {{r|Bridge (computer network)}} {{r|Bridge (computer architecture)}}
    168 bytes (20 words) - 06:25, 28 August 2009
  • ...e interpretation in computer-mediated communication|journal=Social Science Computer Review|volume=19|pages=323&ndash;345}}
    375 bytes (44 words) - 23:13, 20 March 2008
  • Auto-populated based on [[Special:WhatLinksHere/Personal computer]]. Needs checking by a human. {{r|Computer architecture}}
    1 KB (150 words) - 19:28, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Server (computer)]]. Needs checking by a human. {{r|Host (computer network)}}
    518 bytes (67 words) - 20:18, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human. {{r|Personal computer}}
    520 bytes (66 words) - 17:17, 11 January 2010
  • {{r|Computer architecture}} {{r|Personal computer}}
    599 bytes (78 words) - 17:05, 11 January 2010
  • ...ing a [[computer]] [[program]] involves both the academic disciplines of [[computer science]] and [[linguistics]].
    670 bytes (92 words) - 06:16, 15 November 2007
  • {{r|Computer network|Computer networks}} ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]]
    3 KB (353 words) - 03:48, 24 September 2013
  • {{r|Computer science}} {{r|Computer}}
    695 bytes (94 words) - 13:35, 29 April 2011
  • ...who have made major ''practical'' breakthroughs in the development of the computer industry. If unlinked, these are placeholders until an article can be writ This list should include people who have invented a significantly new computer, operating system, or type of software, or significant business or licensin
    2 KB (232 words) - 18:13, 8 November 2008
  • * [[Internet bot]], a type of computer program to do automated tasks ** [[Video game bot]], a computer controlled player or opponent
    919 bytes (132 words) - 08:14, 22 April 2023
  • {{r|Computer networking reference models}} {{r|Computer network}}
    275 bytes (33 words) - 22:42, 13 July 2008
  • ...ence/post.cfm?id=the-computer-mouse-at-40-rememberin-2008-12-10 |title=The computer mouse at 40: Remembering history in the making |accessdate=2008-11-13 |last ...= |date= |year=2004 |month= |format= |work=Berkshire Encyclopedia of Human-Computer Interaction |publisher=Berkshire Publishing Group |pages= |language= |archi
    817 bytes (99 words) - 22:02, 28 December 2008
  • The application service presented may be by a physical computer, or an abstraction such as a [[Java virtual machine]] or a [[.NET]] [[commo ...stem or the control of a cardiac pacemaker is an application that serves a computer.
    1 KB (162 words) - 20:04, 6 June 2011
  • {{r|Recursion (computer science)|In computer science}}
    112 bytes (13 words) - 11:37, 31 May 2009
  • | journal = Annual Symposium on Foundations of Computer Science ...r]] stores bits (which can be either 1 or 0), a state (qubit) in a quantum computer can be simultaneously both 0 and 1 (this is called superposition of states)
    2 KB (307 words) - 17:00, 7 March 2024
  • Libraries of computer algorithms: ...Computer graphics algorithms]<span> - CGAL is a library of algorithms for computer graphics, e.g. algorithms handling triangle meshes for simplification, [[pa
    1 KB (150 words) - 07:48, 10 February 2021
  • In [[computer network|networks of computers]], a '''host''' is a term for computers, on a ...s|Windows]] (both workstation (aka [[Personal computer|PC]]) and [[Server (computer)|server]] roles)
    742 bytes (101 words) - 21:31, 2 February 2009
  • #REDIRECT [[Computer]]
    22 bytes (2 words) - 20:29, 8 January 2008
  • #REDIRECT [[Computer]]
    22 bytes (2 words) - 09:25, 11 March 2007
  • {{r|Computer}} {{r|Personal computer}}
    193 bytes (24 words) - 20:08, 3 August 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking session protocols]]. Needs checking by a human. {{r|Computer networking end-to-end protocols}}
    544 bytes (68 words) - 15:37, 11 January 2010
  • |Alwac III computer, 1959.jpg|Alwac III computer, 1959.jpg
    357 bytes (44 words) - 18:10, 7 June 2010
  • A '''softphone''' is a ToIP software installed on a computer to emulate a physical phone. Softphones have many advantages: * they enable telephony applications on a computer and can foster cost reductions for companies that do not have to buy phones
    510 bytes (77 words) - 00:38, 21 February 2010
  • #Redirect [[Computer science]]
    30 bytes (3 words) - 11:00, 4 June 2008
  • #REDIRECT [[Personal computer]]
    31 bytes (3 words) - 21:47, 22 April 2008
  • #REDIRECT [[Computer network]]
    30 bytes (3 words) - 09:29, 16 March 2010
  • #REDIRECT [[Computer architecture]]
    35 bytes (3 words) - 21:36, 26 April 2008
  • #REDIRECT [[Computer#Academia_and_professional_societies]]
    58 bytes (6 words) - 20:14, 1 October 2008
  • #REDIRECT[[Personal computer]]
    30 bytes (3 words) - 13:44, 14 February 2007
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human. {{r|Computer science}}
    815 bytes (100 words) - 15:37, 11 January 2010
  • {{r|Computer architecture}} {{r|Computer engineering}}
    723 bytes (92 words) - 16:15, 11 January 2010
  • {{r|Computer architecture}} {{r|Computer systems management}}
    388 bytes (51 words) - 10:42, 22 February 2009
  • {{r|Computer networking end-to-end protocols}} {{r|Computer network}}
    673 bytes (87 words) - 17:59, 11 January 2010
  • ...address is used by computer software to unambiguously identify a remote [[computer]] (called a ''host'' in internet parlance) for information exchange by one ...the internet. So the above address refers, as of February 2009, to a host computer owned by Microsoft Corporation, and its corresponding domain name is:
    985 bytes (141 words) - 21:29, 10 March 2009
  • * [http://www.tcf-nj.org/web/ Trenton Computer Festival]
    70 bytes (9 words) - 13:14, 15 February 2009
  • [[Computer]] [[programming language]].
    74 bytes (6 words) - 07:38, 3 October 2008
  • #REDIRECT [[Oracle (computer software)]]
    40 bytes (4 words) - 09:56, 19 September 2009
  • Computer scripting language
    63 bytes (6 words) - 12:03, 24 November 2009
  • #REDIRECT [[Trenton Computer Festival]]
    39 bytes (4 words) - 13:41, 14 February 2007
  • #REDIRECT [[Closure (computer science)]]
    40 bytes (4 words) - 17:12, 6 January 2009
  • {{r|Computer networking end-to-end protocols}} {{r|Computer network}}
    715 bytes (90 words) - 11:54, 31 December 2022
  • ...r Interface]] (or GUI) as the sole means for the user to interact with the computer. The Macintosh is said to have kicked off several "revolutions" in the computer age, to include what became known as [[Desktop Publishing]].
    1 KB (223 words) - 22:33, 5 July 2008
  • #REDIRECT [[Pointer (computer science)/Definition]]
    51 bytes (5 words) - 20:34, 21 January 2009
  • <noinclude>{{Subpages}}</noinclude>wearable computer, incorporated into eyeglasses
    82 bytes (8 words) - 14:24, 27 February 2022
  • An influential [[Computer Scientist]]
    73 bytes (7 words) - 04:59, 21 February 2009
  • #REDIRECT [[Oracle (computer software)/Approval]]
    49 bytes (5 words) - 09:56, 19 September 2009
  • An influential [[Computer Scientist]]
    73 bytes (7 words) - 05:04, 21 February 2009
  • #REDIRECT [[Oracle (computer software)/Definition]]
    51 bytes (5 words) - 09:56, 19 September 2009
  • #REDIRECT [[Computer science/Catalogs/Breakthroughs]]
    53 bytes (5 words) - 18:12, 8 November 2008
  • {{r|Computer networking application protocols}} {{r|Computer network}}
    745 bytes (92 words) - 19:25, 11 January 2010
  • {{r|Computer}} {{r|shell (computer)}}
    718 bytes (96 words) - 09:01, 2 March 2024
  • {{r|Computer architecture}} {{r|Computer engineering}}
    1 KB (145 words) - 12:05, 6 March 2024
  • A computer scientist and cryptographer.
    75 bytes (8 words) - 21:54, 5 June 2010
  • #REDIRECT [[Oracle (computer software)/Related Articles]]
    57 bytes (6 words) - 09:56, 19 September 2009
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking end-to-end protocols]]. Needs checking by a human. {{r|Computer networking application protocols}}
    642 bytes (79 words) - 15:37, 11 January 2010
  • {{r|Computer network}} {{r|Bridge (computer network)}}
    331 bytes (41 words) - 22:45, 1 October 2009
  • #REDIRECT [[Common student exercises in computer science]]
    58 bytes (7 words) - 17:24, 13 March 2007
  • #REDIRECT [[Amateur Computer Group of New Jersey]]
    50 bytes (7 words) - 13:41, 14 February 2007
  • ...ading computer scientists and historians, as well as firsthand accounts by computer pioneers, the Annals is the primary publication for recording, analyzing, a
    844 bytes (122 words) - 01:36, 9 May 2008
  • {{r|Human-computer interface}} {{r|Wearable computer}}
    344 bytes (40 words) - 09:46, 23 May 2010
  • ...sychological acceptability is a the idea that the security mechanisms of a computer system should align as closely as possible to the functional expectations o
    898 bytes (132 words) - 05:49, 8 April 2024
  • {{r|Computer network}} {{r|Computer networking media sharing protocols}}
    367 bytes (45 words) - 06:00, 17 March 2024
  • ...iler]] and/or [[assembler]] on human readable [[source code]] written by a computer programmer. Machine code is often also often referred to as "binary" code, ...programming required intimate knowledge of the [[instruction set]] of the computer in question, as a given number may represent totally different instructions
    2 KB (354 words) - 13:55, 9 January 2010
  • ...athematical library, using simpler operations that can be performed on the computer (e.g. addition and multiplication), such that the result is as close to the
    985 bytes (130 words) - 01:40, 14 February 2010
  • {{r|Computer networking media sharing protocols}} {{r|Computer networking reference models}}
    829 bytes (102 words) - 05:56, 17 March 2024
  • <noinclude>{{Subpages}}</noinclude>A computer operating system that uses the Linux Kernel.
    90 bytes (12 words) - 23:07, 24 February 2011
  • Rules for communication among devices in a computer network.
    60 bytes (9 words) - 08:20, 25 April 2023
  • Ongoing computer project to model internet infrastructures.
    95 bytes (10 words) - 16:42, 26 May 2023
  • British mathematician, code breaker and computer pioneer.
    93 bytes (10 words) - 21:04, 1 November 2008
  • *[[Computer Architecture]]
    80 bytes (8 words) - 21:36, 26 April 2008
  • A major professional association in [[computer science]]
    92 bytes (10 words) - 15:18, 29 November 2009
  • * How to Avoid the 29 Biggest Computer Mistakes, Positive Response Marketing, 1993, ASIN B000QOHNBY * The 50 Biggest Computer Mistakes (Audio CD) ASIN B00129H9E8
    663 bytes (80 words) - 11:04, 7 February 2008
  • ...uch as text printed on a screen or sent to a printer). The main problem of computer programming is how to put simple operations together in a way that is effec ...urces of a computer. This ensures that several programs can coexist on one computer.
    2 KB (365 words) - 09:56, 16 July 2013
  • {{r|Computer networking application protocols}} {{r|Computer network}}
    775 bytes (97 words) - 11:55, 11 January 2010
  • *[[Computer network]]
    98 bytes (9 words) - 05:21, 8 March 2024
  • The memory address of some data in computer science.
    88 bytes (12 words) - 20:34, 21 January 2009
  • Early German computer designer (b. 1910, d. 1995).
    86 bytes (9 words) - 16:25, 16 May 2008
  • An early single chip computer, introduced in 1974
    85 bytes (10 words) - 22:02, 27 November 2008
  • Device used for pointing to objects on computer screens.
    92 bytes (12 words) - 19:14, 28 December 2008
  • Oldest high-level computer language; especially used for numeric applications
    113 bytes (12 words) - 03:38, 31 July 2009
  • A Quantum computer manipulates coherence for parallel computing.
    100 bytes (11 words) - 17:46, 21 February 2009
  • Largest vendor of [[computer network]] equipment and software
    97 bytes (11 words) - 08:57, 5 August 2010
  • {{r|Computer}} {{r|Computer program}}
    526 bytes (60 words) - 21:40, 27 April 2010
  • (1950 - ) Computer engineer and co-founder of [[Apple Inc]].
    96 bytes (11 words) - 18:22, 6 October 2011
  • A user interface through which textual commands are entered into the computer,
    114 bytes (15 words) - 19:31, 8 October 2009
  • The class of devices that attach to a computer network
    90 bytes (13 words) - 14:45, 7 February 2009
  • Transformation of computer programs and compilers to decrease runtime.
    106 bytes (12 words) - 13:08, 14 March 2009
  • A form of encoding for computer instructions and data.
    90 bytes (12 words) - 12:39, 6 March 2009
  • *[[Personal Computer]]
    98 bytes (9 words) - 16:37, 10 May 2008
  • {{r|Shell (computer)|In computer science}}
    237 bytes (34 words) - 11:31, 17 June 2009
  • {{r|Computer}} {{r|Computer programming}}
    287 bytes (35 words) - 16:18, 10 January 2014
  • Three-dimensional medical imaging method, employing tomography created by computer processing.
    131 bytes (13 words) - 23:11, 8 September 2009
  • A computer operating system kernel developed at Carnegie Mellon University.
    111 bytes (13 words) - 07:15, 25 March 2010
  • ISO standard that describes a layered approach to designing [[computer networks]]
    117 bytes (14 words) - 14:41, 2 September 2008
  • Commercial computer algebra system and a general purpose mathematics software.
    114 bytes (13 words) - 08:53, 1 June 2008
  • Computer programme written by Americans to beat Russians at chess.
    102 bytes (13 words) - 04:02, 20 May 2008
  • Technique to organize data and functions in a computer program.
    99 bytes (13 words) - 06:24, 12 July 2010
  • The binary code which is executable and readable by a computer.
    99 bytes (14 words) - 13:58, 9 January 2010
  • ...ttps://www.si.edu/object/log-book-computer-bug%3Anmah_334663 Log Book with Computer Bug], Smithsonian National Museum of American History
    155 bytes (19 words) - 13:03, 5 July 2022
  • == video sounds funny on my computer == The sound is unbearable on my computer, every second it sorta does what I would call "an electric version of a rec
    963 bytes (150 words) - 23:49, 20 March 2008
  • [[Tablet computer]] produced by [[Apple Inc.]] and announced in January 2010.
    113 bytes (13 words) - 08:48, 7 February 2010
  • Behaviour of a computer program that was not intended by its developers.
    108 bytes (15 words) - 08:13, 3 August 2010
  • A computer algebra system for mathematicians interested in algebraic number theory.
    119 bytes (14 words) - 15:20, 28 October 2008
  • {{dambigbox|text=This article is for data as it pertains to computer science. For other uses, see [[byte (disambiguation)]].}} An [[analog computer]] uses a physical quantity, such as a [[voltage]] or [[hydraulics]], to sol
    2 KB (394 words) - 07:05, 2 October 2008
  • ...ting a Quine in various computer languages has been a popular challenge to computer programmers; this problem has been posed to readers in various magazines su
    853 bytes (140 words) - 11:13, 12 January 2009
  • Interactive computer programs that directly assist physicians and other health professionals wit
    156 bytes (17 words) - 02:30, 10 June 2008
  • An early, text-based computer adventure game, released between 1980 and 1982. XYZZY.
    120 bytes (13 words) - 17:18, 8 March 2009
  • A high-level interpreted, general-purpose, cross-platform, dynamic computer programming language.
    133 bytes (12 words) - 16:21, 6 February 2010
  • A computer microprocessor technique in which data is transmitted four times for each c
    133 bytes (18 words) - 15:06, 25 May 2008
  • Computer programs or documentation used as part of an operating system, distinct fro
    135 bytes (17 words) - 10:38, 21 December 2009
  • ...ach to historical research that makes use of quantitative, statistical and computer tools.
    132 bytes (16 words) - 11:00, 9 September 2009
  • ...ation of scientific data using computers and in particular techniques from computer graphics.
    152 bytes (18 words) - 15:12, 18 May 2008
  • A computer whose price, size, and features make it suitable for personal use.
    113 bytes (16 words) - 08:21, 21 May 2008
  • An attack vector that is used to malicious alter database interactions in computer applications.
    132 bytes (17 words) - 17:02, 26 July 2010
  • English 19th century inventor who invented a precursor of the modern computer.
    114 bytes (15 words) - 12:54, 16 May 2008
  • ==Computer network security== ...connaissance]]''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, s
    1 KB (176 words) - 04:40, 26 September 2013
  • A computer software company founded in 1975 by [[Bill Gates]] and [[Paul Allen]].
    117 bytes (15 words) - 11:50, 21 May 2008
  • ...d most frequently in [[websites]] to discriminate between [[humans]] and [[computer programs]].
    156 bytes (18 words) - 19:16, 13 August 2010
  • ...rol device consisting of a movable grip with buttons; used in aircraft and computer gaming.
    131 bytes (18 words) - 03:29, 26 August 2008
  • An 8-bit, 64-kilobyte home computer released by Commodore International in 1982.
    116 bytes (13 words) - 04:24, 12 September 2008
  • An enabling [[optimization]] used in computer [[compiler]]s that organizes data to improve subsequent optimizations.
    152 bytes (18 words) - 12:34, 11 July 2009
  • ...an actual insect was found to have caused a failure in a vacuum-tube-based computer in 1947.]] ...can likewise be used to described unwanted behavior in hardware, including computer chips or any hardware based on digital logic, and in analog hardware design
    2 KB (270 words) - 11:37, 6 July 2022
  • {{r|Computer}} {{r|Personal computer}}
    518 bytes (60 words) - 12:05, 6 March 2024
  • ...al Processing Unit]]), which are used on the majority of general purpose [[computer]]s today.
    613 bytes (89 words) - 14:22, 7 July 2009
  • {{r|Computer networking reference models}} {{r|Computer network}}
    388 bytes (44 words) - 15:18, 31 October 2008
  • ...which thrived during the early years of the first generation of [[Personal Computer|personal computers]]. '''Commodore''' (as it is commonly known) was one of "big three" [[Personal Computer|personal computer]] manufacturers before [[IBM]] introduced its [[IBM PC]] line of computers.
    1 KB (161 words) - 13:50, 28 December 2007
  • A high-level, functional computer programming language with close historical ties to artificial intelligence
    154 bytes (17 words) - 18:03, 19 February 2011
  • Command interpreters envelope a computer application, and provide an environment in which it is run.
    136 bytes (18 words) - 10:00, 22 July 2013
  • A major manufactured of equipment for [[computer network]]s; Advisory Committee, Congressional Internet Caucus
    146 bytes (17 words) - 11:37, 19 March 2024
  • ...and configuring of [[software]], such that it can be executed on a target computer.
    131 bytes (19 words) - 18:27, 11 July 2010
  • ...ournals.org/content/5/1/10.full.pdf+html Quicksort] by C. A. R. Hoare. The Computer Journal (1962) 5 (1): 10-16
    149 bytes (19 words) - 09:18, 14 September 2013
  • A tool that disables network connection on an [[Apple MacIntosh]] computer in order to cope with [[procrastination]].
    153 bytes (20 words) - 15:40, 26 March 2010
  • A [[Mexico|Mexican]] [[multimedia]] digital educational [[computer network]] which provides lesson backup for 5th and 6th graders.
    166 bytes (20 words) - 13:05, 29 November 2008
  • {{r|Computer}} {{r|Computer networking reference models}}
    560 bytes (71 words) - 10:03, 20 September 2009
  • {{r|Computer networking media sharing protocols}} {{r|Computer networking reference models}}
    1,016 bytes (127 words) - 05:56, 17 March 2024
  • A user with full administration rights on a computer.
    89 bytes (12 words) - 02:27, 29 May 2008
  • Chronology of the development and history of computer processors.
    102 bytes (12 words) - 08:38, 9 September 2009
  • ...scepticism by industry insiders but turned into one of the most successful computer games in history. A number of sequels have been released since. ...[SimPark]], [[SimSafari]], [[Sim Theme Park]] and [[The Sims]]. Many other computer game companies also produced titles based on the same city/community buildi
    1 KB (154 words) - 07:31, 16 December 2009
  • How electronic [[Computer|computers]] were first invented; how the technology underlying them evolved
    138 bytes (16 words) - 20:07, 3 August 2008
  • A data visualization created by combining data with multiple computer applications.
    119 bytes (14 words) - 01:20, 30 August 2020
  • A set of instructions to be executed by a computer.
    87 bytes (13 words) - 23:46, 16 December 2009
  • #Redirect [[Computer networking end-to-end protocols]]
    54 bytes (5 words) - 19:31, 18 May 2008
  • #REDIRECT [[Computer networking end-to-end protocols]]
    54 bytes (5 words) - 17:44, 17 May 2008
  • #Redirect [[Computer networking end-to-end protocols]]
    54 bytes (5 words) - 19:31, 18 May 2008
  • Creator of the C++ programming language and chair in Computer Science at Texas A&M University.
    130 bytes (19 words) - 13:15, 16 May 2008
  • in computer science, is an unordered, dictionary-like data structure that provides very
    176 bytes (22 words) - 04:54, 6 January 2010
  • Field of artificial intelligence dedicated to creating a computer program that plays the ancient board game ''go''.
    151 bytes (20 words) - 08:48, 23 January 2009
  • An industrial control system which uses a computer system monitoring and controlling process.
    130 bytes (16 words) - 09:28, 11 September 2009
  • Value used by a computer together with a complex algorithm to encrypt and decrypt messages.
    128 bytes (18 words) - 06:28, 4 September 2009
  • The task to decide whether a certain computer (executing a certain program) will eventually stop.
    134 bytes (18 words) - 11:33, 15 September 2009
  • ...] and data, creation of user interfaces, and interfacing with programs and computer hardware. MATLAB can also call functions or subroutines written in the [[C] ...[[Maple (software)|Maple]] symbolic engine, allowing it to act also as a [[computer algebra system]]. The MATLAB application itself also provides an interactiv
    1 KB (141 words) - 11:14, 2 August 2010
  • {{r|Computer architecture}} {{r|Computer science}}
    527 bytes (68 words) - 11:46, 11 January 2010
  • {{r|Computer network}} {{r|Computer simulation}}
    548 bytes (69 words) - 16:01, 11 January 2010
  • A computer compatible with the original IBM PC, but made by a different company.
    116 bytes (17 words) - 21:33, 17 May 2008
  • A commonly observed pattern in memory accesses by a computer program over time.
    115 bytes (16 words) - 10:41, 13 October 2009
  • A computer operating system function that loads and executes a new child process.
    118 bytes (16 words) - 00:44, 1 October 2009
  • * [http://www.tcf-nj.org/web/ Trenton Computer Festival]
    207 bytes (30 words) - 02:19, 14 September 2013
  • The floating point co-processor for the intel 80286 single chip computer
    108 bytes (13 words) - 22:58, 27 November 2008
  • ...s for greater flexibility and in programs and higher responsiveness of the computer as a whole. For example, a program that performs a lengthy operation can do
    612 bytes (99 words) - 23:54, 12 February 2010
  • | product = Computer network devices '''Cisco Systems''' is an American technology company specializing in computer network technologies and devices.
    1 KB (147 words) - 07:09, 14 September 2013
  • A computer program that is used to determine the quantity and timing of financial mark
    182 bytes (25 words) - 05:20, 12 July 2010
  • Unique label for a computer readable object that can be found on the internet, usually used in [[academ
    153 bytes (23 words) - 19:17, 25 June 2009
  • {{r|Computer Go}} {{r|Computer}}
    569 bytes (72 words) - 18:15, 11 January 2010
  • In [[computer network]] [[protocol (computer)|protocols]], a unicast message, whether it be an application message, a [[
    622 bytes (96 words) - 00:05, 5 August 2008
  • Natural GOMS Language, a variation of the [[GOMS]] technique in human computer interaction.
    127 bytes (16 words) - 13:54, 14 March 2009
  • Commercial computer algebra system with own programming language that supports functional and p
    160 bytes (18 words) - 08:29, 1 June 2008
  • a [[computer role-playing game]] series [[video game developer|developed]] by [[Bethesda
    137 bytes (15 words) - 05:34, 26 September 2009
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking application protocols]]. Needs checking by a human. {{r|Computer networking reference models}}
    545 bytes (68 words) - 15:36, 11 January 2010
  • ...ages reside on a server rather than being downloaded to the user's desktop computer, phone or tablet.
    461 bytes (76 words) - 16:02, 21 January 2023
  • ...], it is a [[Fortune 500]] company. Most [[personal computer]]s and many [[computer server]]s have AMD or Intel processors as their "brain", along with various
    681 bytes (99 words) - 12:03, 6 March 2024
  • Abstract data type in computer science that supports last-in first-out (LIFO) access to its contents.
    137 bytes (18 words) - 11:36, 26 June 2008
  • ...is a software tool that disables network connection on an Apple MacIntosh computer in order to cope with procrastination.
    148 bytes (21 words) - 11:43, 13 January 2024
  • [[Nintendo]]-owned entertainment franchise based on computer game where players collect "pocket monsters" and use them in RPG-style batt
    176 bytes (22 words) - 11:40, 9 July 2008
  • ...ing of Topologically Complex Information Processing Networks in Brains and Computer Circuits}}
    156 bytes (18 words) - 16:02, 23 April 2010
  • ...nteractive fiction]] which has gone on to become an [[easter egg]] in many computer programs.
    182 bytes (26 words) - 18:58, 4 May 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking internetwork protocols]]. Needs checking by a human. {{r|Computer networking application protocols}}
    502 bytes (62 words) - 15:37, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking media attachment protocols]]. Needs checking by a human. {{r|Computer networking media sharing protocols}}
    495 bytes (62 words) - 15:37, 11 January 2010
  • A successful family of single chip computer, used in most home computers built in the early 2000s
    133 bytes (20 words) - 11:55, 12 July 2023
  • A computer program used interactively for developing human-readable reliable mathemati
    158 bytes (18 words) - 03:21, 12 August 2010
  • A computer, used on a large network/mainframe, used for the basic Input and Output of
    127 bytes (20 words) - 16:04, 14 March 2010
  • A computer program that retrieves and renders webpages to display information stored o
    137 bytes (19 words) - 11:45, 26 June 2008
  • Pioneering computer scientist specializing in programming languages and interoperability; rear
    155 bytes (19 words) - 06:07, 13 August 2010
  • ...sign and operation of devices that select paths for information carried by computer and telecommunications networks
    152 bytes (19 words) - 06:59, 10 February 2011
  • * [[Computer Go]]
    45 bytes (5 words) - 09:12, 3 February 2008
  • ...icated example of a protocol is the set or "stack" of protocols used in [[computer networking reference models]], such as the [[Internet Protocol Suite]] or [
    737 bytes (104 words) - 05:43, 17 March 2024
  • ...usable block of computer code or script that, when applied to an [[object (computer science)]] causes it to respond to user input in meaningful patterns or to
    2 KB (294 words) - 01:39, 19 February 2010
  • *[[Computer and video game]]s **[[Computer board game]]s
    2 KB (223 words) - 10:51, 23 January 2008
  • In computer networking, an address that can be made unique for individual [[network int
    173 bytes (24 words) - 10:50, 30 September 2008
  • Auto-populated based on [[Special:WhatLinksHere/Protocol (computer)]]. Needs checking by a human. {{r|Computer networking reference models}}
    2 KB (248 words) - 05:56, 17 March 2024
  • {{r|Computer-aided design|Computer-aided design (CAD)}}
    368 bytes (46 words) - 21:59, 26 April 2010
  • {{r|Computer networking internetwork protocols}} {{r|Computer networking reference models}}
    622 bytes (78 words) - 19:19, 11 January 2010
  • ...ies to boost traffic to a particular web site so it appears earlier in any computer search.
    134 bytes (20 words) - 18:53, 1 March 2010
  • A computer game in which many players are simultaneously inhabiting the same game envi
    157 bytes (23 words) - 15:50, 1 June 2008
  • A '''daemon''' is a computer program that runs automatically when a computer boots up, as opposed to being directly started by a user. Typically, there
    665 bytes (103 words) - 00:21, 19 October 2013
  • * [[pointer (computer science)]]
    100 bytes (11 words) - 20:43, 21 January 2009
  • professional librarian, computer scientist, and writer who won a 2013 artificial intelligence competition sp
    189 bytes (23 words) - 14:40, 22 January 2023
  • ...the name of an computer-based event recording service, and the [[protocol (computer)|protocol]] that delivers the event information to the server.<ref name=RFC For syslog, a computer that can generate a message is called a "device". A machine that can recei
    1 KB (171 words) - 15:12, 12 February 2009
  • ...prompt or shell is a place where textual commands can be entered into the computer, which then processes them and responds. The shells of which command lines
    673 bytes (108 words) - 21:19, 10 November 2009
  • ...g|thumb|right|180px| The [[iMac]] is an example of a modern-day all-in-one computer.]] ...puter keyboard|keyboard]] and [[mouse (computing)|mouse]], inside of the [[computer monitor|monitor]]'s case. However, AIOs have commonly included built-in key
    3 KB (383 words) - 11:35, 24 September 2007
  • ...ng asymptotic behaviour of functions, e.g. the complexity of algorithms in computer science.
    184 bytes (23 words) - 19:55, 5 August 2008
  • [[Computer architecture]]s that apply multiple tightly coupled processors, usually wit
    192 bytes (24 words) - 12:27, 28 July 2010
  • Auto-populated based on [[Special:WhatLinksHere/Computer]]. Needs checking by a human. {{r|Computer architecture}}
    3 KB (441 words) - 12:55, 13 November 2014
  • A physical, software, or abstract function that interconnects two or more computer or telecommunications networking domains
    159 bytes (19 words) - 09:39, 20 September 2009
  • Auto-populated based on [[Special:WhatLinksHere/Computer networking media sharing protocols]]. Needs checking by a human. {{r|Computer networking media attachment protocols}}
    589 bytes (76 words) - 15:37, 11 January 2010
  • {{r|Computer}} {{r|Personal computer}}
    502 bytes (66 words) - 15:39, 11 January 2010
  • A method of abstracting machine code instructions for a computer into commands recognizable by a human.
    139 bytes (19 words) - 17:42, 30 November 2008
  • ...de>The name of the penguin, official logo and cartoon mascot for the Linux computer operating system.
    133 bytes (19 words) - 14:00, 15 May 2008
  • ...ng asymptotic behaviour of functions, e.g. the complexity of algorithms in computer science.
    190 bytes (24 words) - 04:42, 5 August 2008
  • In [[computer graphics]], an algorithm for constructing a 3D surface mesh from scalar 3D
    170 bytes (24 words) - 05:15, 5 February 2010
  • A nonprofit, membership, computer library service and research organization, founded in 1967 as the Ohio Coll
    165 bytes (20 words) - 00:31, 2 October 2009
  • ...y a brilliant programmer. In popular usage, those who illegally break into computer systems.
    169 bytes (23 words) - 10:41, 25 July 2009
  • '''Vernor Vinge''' (1944-2024) was a science-fiction writer, computer scientist and mathematician. As a sci-fi author, Vinge won [[Hugo Awards]] Vinge was also a professor of computer science at San Diego State University from 1972 until 2000. His first shor
    634 bytes (88 words) - 22:55, 25 March 2024
  • ...ite of the Day'' and ''Tip of the Day'' which are delivered to millions of computer users each day. Her radio program can also be heard on the web. Her websi
    1 KB (169 words) - 13:17, 2 February 2023
  • {{r|Computer architecture}} {{r|Pointer (computer science)}}
    669 bytes (88 words) - 17:27, 11 January 2010
  • A collection of computer-readable records, at one or more location, that are organized in some meani
    180 bytes (25 words) - 13:45, 14 October 2008
  • ...lemented in hardware are instead implemented using software on a personal computer or other embedded computing devices.
    229 bytes (29 words) - 09:41, 11 September 2009
  • ...ntrolled either by full-time manual [[telepresence]] or possibly with some computer-controlled autonomous operation
    198 bytes (24 words) - 14:13, 26 July 2010
  • A challenge encountered so commonly in object-oriented computer programming that its general solution is taught independently of any partic
    165 bytes (21 words) - 10:10, 11 October 2020
  • General-purpose computer programming language that is frequently embedded within HTML pages on the W
    181 bytes (24 words) - 02:38, 3 June 2008
  • Computer-assisted mathematical calculations of beam angles, intensities of radiation
    199 bytes (21 words) - 20:37, 15 August 2010
  • Auto-populated based on [[Special:WhatLinksHere/Closure (computer science)]]. Needs checking by a human. {{r|Computer science}}
    540 bytes (67 words) - 11:56, 11 January 2010
  • [[Open source software|Open source]] [[World Wide Web]] browser [[Computer program|application]].
    133 bytes (15 words) - 23:23, 5 July 2009
  • * [[Interpreter (computer)]]
    169 bytes (18 words) - 12:45, 31 May 2009
  • ...lled maintenance updates, since there is an implicit authorization, by the computer owner, to allow such updates to install and confuse resources. ...live" on their own. A biological virus must be a parasite inside a cell; a computer virus is a parasite to some other fully executable software.
    4 KB (577 words) - 05:48, 8 April 2024
  • A computer manufacturer which thrived during the early years of the first generation o
    143 bytes (19 words) - 20:50, 20 May 2008
  • ...that performs integer [[addition]] in the [[Arithmetic Logic Unit]] in a [[computer]].
    144 bytes (18 words) - 14:17, 8 December 2008
  • A set of [[computer graphics]] techniques used to analyze the surface structure of the [[brain]
    133 bytes (18 words) - 16:03, 14 February 2010
  • Early [[computer science]] and [[virtual reality]] researcher; invented [[hypertext]] while
    203 bytes (24 words) - 06:37, 19 April 2011
  • Set of interaction techniques which allow computer or mobile users to control graphical user interface with more than one fing
    204 bytes (29 words) - 03:33, 14 July 2010
  • {{r|Quine (computer program)}}
    79 bytes (11 words) - 11:48, 12 January 2009
  • The main software of a computer system; controls the execution of applications and provides various service
    153 bytes (21 words) - 16:52, 20 May 2008
  • High-performance computer chipsets, 32/64 bit-capable, intended for servers and high-performance work
    145 bytes (13 words) - 10:26, 22 February 2009
  • An early single chip computer chip, from the 1970s, and a lineal ancestor of the Pentium
    124 bytes (19 words) - 14:00, 27 November 2008
  • A portable computer that is always on, always usable and is used while being in the personal sp
    147 bytes (24 words) - 18:17, 22 May 2010
  • An early single chip computer chip, from the 1970s, and a lineal ancestor of the Pentium
    124 bytes (19 words) - 14:12, 27 November 2008
  • ...lude three volumes written by Donald Knuth collectively titled "The Art of Computer Programming" (ISBN 0201485419). *Ellis Horowitz and Sartaj Sahni (1978). Fundamentals of computer algorithms.
    1 KB (212 words) - 17:42, 20 February 2012
  • ...ere is an electrical or optical conversion between the signals seen on the computer interface, and those that are used in the larger transmission system. Some differences between the computer connections specification deal with installation convenience and interface
    2 KB (333 words) - 06:02, 31 May 2009
  • ...marketed as a floating point co-processor to the intel 80486sx single chip computer
    131 bytes (18 words) - 00:34, 28 November 2008
  • In computer science, the register that contains the memory address of the next instruct
    164 bytes (23 words) - 12:48, 14 June 2008
  • ...field overlaps heavily with the fields of [[electrical engineering]] and [[computer science]]. ==Examples of Computer Engineering==
    4 KB (608 words) - 13:08, 17 April 2013
  • A computer security expert who was awared the [[Wes Graham Award]] by his alma mater,
    161 bytes (23 words) - 20:35, 19 May 2022
  • A test for [[artificial intelligence]] proposed by [[Alan Turing]]; if a computer can handle conversation well enough to appear human, then it must be behavi
    210 bytes (29 words) - 23:19, 1 November 2008
  • ...design-related elements using special graphics and calculations intensive computer programs.
    226 bytes (26 words) - 22:24, 11 September 2009
  • ...y diverse situations, and is used in many academic fields from politics to computer science.
    226 bytes (32 words) - 12:59, 8 September 2008
  • ...lklore.org]- Anecdotes about the development of Apple's original Macintosh computer, and the people who created it
    151 bytes (22 words) - 21:44, 26 April 2008
  • ...r intelligence and includes parts of cognitive psychology, linguistics and computer science.
    165 bytes (21 words) - 08:36, 26 March 2009
  • ...e (file) or database type object that is stored in a router or a networked computer.
    138 bytes (21 words) - 22:04, 19 June 2008
  • ...most certainly deserves to be recognized to be the first modern electronic computer. However, Zuse was in a chaotic German wartime environment and lacked offic ...ter was the first designer to propose [[pipelining]] the computations of a computer [[CPU|processor]]. In 1949, Zuse formed Zuse KG, where he worked until 196
    2 KB (226 words) - 08:25, 8 June 2009
  • Prestigious award in [[computer science]], presented by the [[Association for Computing Machinery]]<ref>[ht
    240 bytes (31 words) - 15:36, 10 August 2020
  • In computers and computer security, occurs when more data is written to a memory buffer than can fit
    160 bytes (25 words) - 23:56, 29 June 2009
  • ...technology and consumer electronics. It was formerly called the European Computer Manufacturers Association (ECMA). Among other important standards, it is t ECMA manages many of the standards having to do with interoperability of computer software, including the standard specifications for various programming lan
    827 bytes (111 words) - 12:18, 17 April 2023
  • {{r|Computer networking reference models}} {{r|Computer network}}
    1 KB (167 words) - 14:59, 20 March 2024
  • {{r|Computer Go}} {{r|Computer}}
    823 bytes (105 words) - 11:04, 11 January 2010
  • ...Finlay, J., Abowd, G., Beale, R., [http://www.hiraeth.com/books/hci/ Human Computer Interaction] , Prentice Hall, 1993 ...M. Baecker, J. Grudin, W. A. S. Buxton, S. Greenberg: ''Readings in Human-Computer Interaction: Towards the Year 2000.'' 1995, San Francisco, CA: Morgan Kaufm
    1 KB (193 words) - 01:04, 7 November 2013
  • A computer industry organization that develops and promulgates architectures and inter
    255 bytes (27 words) - 10:37, 22 February 2009
  • ...that facilitates [[symbolic mathematics]]. The core functionality of any computer algebra systems is manipulation of mathematical expressions in symbolic for Typical symbolic manipulations that can be performed by ''computer algebra systems'' include:
    1 KB (164 words) - 14:01, 18 January 2008
  • An inexpensive subnotebook computer intended to be distributed to children in developing countries around the w
    195 bytes (26 words) - 09:57, 14 September 2009
  • ...ing]] or interpreting of images by means of [[algorithm]]s executed on a [[computer]].
    176 bytes (22 words) - 16:46, 7 September 2010
  • {{r|Computer networking media sharing protocols}} {{r|Computer networking reference models}}
    709 bytes (90 words) - 17:21, 11 January 2010
  • The set of nasty things that an attacker installs on a computer system after he or she acquires administrator privileges, or in Unix terms
    190 bytes (29 words) - 19:07, 2 April 2009
  • {{r|Computer networking media sharing protocols}} {{r|Bridge (computer network)}}
    1 KB (165 words) - 05:56, 17 March 2024
  • {{r|Relaxation (computer graphics)|In computer graphics}}
    414 bytes (48 words) - 11:46, 31 May 2009
  • {{r|Computer network}} {{r|Computer networking application protocols}}
    680 bytes (84 words) - 19:33, 31 July 2008
  • Sub-field of computational linguistics that investigates the use of computer software to translate text or speech from one natural language to another.
    188 bytes (25 words) - 18:26, 12 September 2009
  • [[protocol (computer) | Protocol]] and administrative convention to manage the interaction of tw
    187 bytes (24 words) - 01:00, 15 July 2008
  • Computer-processable information with destination addresses that are unique only whe
    243 bytes (29 words) - 00:34, 2 February 2009
  • {{r|Computer networking application protocols}} {{r|Protocol (computer)}}
    698 bytes (88 words) - 18:27, 11 January 2010
  • The taking of a command (i.e., a directive from a computer program) and handing it to another command.
    139 bytes (22 words) - 19:56, 23 January 2009
  • {{r|Computer network}} {{r|Server (computer)}}
    680 bytes (92 words) - 21:38, 11 January 2010
  • ...search engine, it requires knowledge of unambiguous or minimally ambiguous computer-friendly identifiers and relatively human-friendly identifiers. ...y. In most cases, only one name corresponds to a given telephone number or computer identifier. There are exceptions when calls are automatically forwarded fro
    2 KB (238 words) - 00:46, 28 October 2013
  • ...but room for only one set of KVM components, and, again, will use only one computer at a time. ...sible to use virtual terminal applications to take software control of one computer for another, that assumes a windowing operating system. If the computers be
    3 KB (475 words) - 15:05, 12 February 2009
  • ...cially in the subfield of [[programming languages]], the '''syntax''' of a computer language is the set of allowed [[reserved word]]s and possible [[token_(par The syntax of computer languages is often at level-2 (ie, a [[context-free grammar]]) in the [[Cho
    2 KB (246 words) - 00:21, 15 November 2007
  • The '''Motorola 6800''' is a [[single chip computer]] introduced by [[integrated circuit]] manufacturer [[Motorola]] in 1974.<r ...er]]s for its [[peripheral device]]s shared the same bus used to address [[computer memory|memory]].
    1 KB (140 words) - 21:58, 27 November 2008
  • {{r|Computer science}} {{r|Computer networking reference models }}
    932 bytes (116 words) - 11:20, 9 December 2009
  • In computer networks, the transmission of a frame, packet, or message, which has a dest
    175 bytes (27 words) - 13:43, 1 December 2008
  • An early single chip computer with 16-bit architecture, with a more extensive instruction set than the [[
    195 bytes (26 words) - 13:42, 22 February 2009
  • {{r|Host (computer network)}}
    64 bytes (8 words) - 03:37, 10 June 2009
  • ...d graphics coprocessor responsible for handling the graphics output of the computer, generally to the monitor.
    171 bytes (21 words) - 12:01, 1 June 2008
  • ...s/List_of_seminal_concepts_in_computer_science|List of seminal concepts in computer science]] {{r|Computer architecture}}
    807 bytes (103 words) - 12:05, 6 March 2024
  • {{r|Computer network}} {{r|Computer science}}
    830 bytes (103 words) - 14:41, 18 March 2024
  • # [[Internet Key Exchange]], a computer protocol.
    183 bytes (24 words) - 04:31, 19 November 2008
  • ...deliberately generated electromagnetic signals, for human communications, computer control and monitoring, and noncommunications electronics such as radar and
    257 bytes (28 words) - 21:38, 2 February 2009
  • Computer information that has destination addresses unique only on a shared transmis
    225 bytes (30 words) - 09:12, 15 September 2009
  • ...ying and configuring of software, such that it can be executed on a target computer.
    173 bytes (26 words) - 02:50, 14 January 2024
  • ...anization]] for communications and computers, formerly called the European Computer Manufacturers Association, the source for the ECMAScript standard behind [[
    196 bytes (23 words) - 13:24, 15 April 2023
  • Short-range, high-speed, low-latency computer interconnect architecture used both at the level of interconnection within
    223 bytes (26 words) - 14:06, 28 July 2010
  • a computer program that runs by itself, as opposed to being directly controlled by a u
    145 bytes (22 words) - 14:46, 30 September 2009
  • A [[computer program]] that attempts to [[simulation|simulate]] an abstract [[model (abs
    162 bytes (20 words) - 20:51, 27 April 2010
  • Military computer workstation for the [[Force XXI Battle Command Brigade and Below]] command
    188 bytes (24 words) - 23:57, 27 July 2010
  • In computer science, a type of ordered collection in which each item contains a referen
    154 bytes (24 words) - 21:54, 30 October 2009
  • | title = CODE: The Hidden Language of Computer Hardware and Software
    227 bytes (27 words) - 14:05, 9 January 2010
  • Instances of server software hosted simultaneously on a single computer along with other instances of the same, or different, server operating syst
    187 bytes (25 words) - 05:58, 11 July 2010
  • {{r|Cell (computer architecture)}}
    96 bytes (12 words) - 05:32, 22 February 2010
  • ...puter to pass the 1-million-mark in January 1983, and was the best-selling computer of the year 1982 (with 800,000 units). ...handled all the sounds too. It was designed by Commodore to be a low-cost computer, with gaming and programming capabilities. However, that machine was a bit
    2 KB (384 words) - 15:51, 3 May 2008
  • * [http://www.computerhistory.org/ The Computer History Museum]
    207 bytes (28 words) - 21:37, 26 April 2008
  • ...least one [[edge]] with at least one neighbour; an essential element of [[computer graphics]].
    167 bytes (25 words) - 05:33, 5 February 2010
  • {{r|Common student exercises in computer science}} {{r|Computer network}}
    856 bytes (113 words) - 16:31, 11 January 2010
  • The combination of [[computer security]], [[communications security]], [[auditing]] and administrative co
    234 bytes (24 words) - 14:55, 26 February 2010
  • An attack on a computer or communications system that tries to prevent the system delivering its no
    162 bytes (24 words) - 19:43, 2 April 2009
  • [[terrorism|Terrorist]] attacks on resources on computer and telecommunications networks, or use of Internet and other cyberspace to
    198 bytes (24 words) - 13:29, 13 September 2009
  • A [[protocol (computer)|protocol model]] for networking, in which the client always initiates requ
    191 bytes (26 words) - 10:49, 3 August 2008
  • Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be anal
    232 bytes (32 words) - 12:53, 15 September 2008
  • In [[computer graphics]], '''topology correction''' refers to procedures that correct inc
    228 bytes (29 words) - 05:45, 8 September 2009
  • A computer server on a [[printed circuit board]] of a [[form factor]] that lets multip
    221 bytes (31 words) - 15:28, 17 March 2010
  • ...pes (such as integer or string) to variables at the time of execution of a computer program, rather than during the compilation phase.
    196 bytes (30 words) - 00:23, 2 October 2009
  • '''Jon Callas''' is a computer security expert best known for work related to PGP. He has a rather out-of- Callas worked for Digital Equipment, for Apple Computer, for PGP Incorporated, the company set up by Phil Zimmermann to commerciali
    744 bytes (121 words) - 07:31, 18 March 2024
  • (1948- ) Computer scientist and [[futurism|futurist]], one of the major proponents of the con
    177 bytes (21 words) - 02:18, 27 July 2011
  • Moderately high-performance computer processors, in both 32-bit/64-bit and single core/[[multicore processor]] m
    246 bytes (29 words) - 10:18, 22 February 2009
  • A concept in computer science whereby an [[operating system]] can use alternate (usually slower)
    246 bytes (35 words) - 11:54, 4 July 2009
  • A very flexible [[protocol (computer)|protocol]] for running data over a wide range of media, which use a logica
    173 bytes (24 words) - 11:35, 26 August 2008
  • The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and opera
    209 bytes (23 words) - 20:08, 7 June 2008
  • A technique, in [[computer network]]s, where a group of "spoke" devices all connect to a common "hub",
    219 bytes (32 words) - 11:22, 15 September 2008
  • ...artificial agent, usually an electro-mechanical machine which is guided by computer or electronic programming, and is thus able to do tasks on its own.
    210 bytes (30 words) - 07:14, 11 September 2009
  • ...rm for a [[marine navigation]] device that, at a minimum, links a display, computer-readable charts and a [[Global Navigation Satellite System]]
    229 bytes (28 words) - 22:31, 12 January 2011
  • In computer security, a program that a user is induced to run deliberately for some app
    207 bytes (32 words) - 22:58, 23 February 2009
  • *[[Computer graphics]]
    103 bytes (9 words) - 16:25, 17 February 2008
  • An early single chip computer chip, from the 1970s, derived from the [[Intel 8008]] but to some extent a
    174 bytes (25 words) - 13:27, 22 February 2009
  • {{r|Computer networking end-to-end protocols}} {{r|Computer networking session protocols}}
    847 bytes (104 words) - 21:34, 11 January 2010
  • ==Examples of Latency in Computer Networking==
    1 KB (209 words) - 06:39, 4 November 2007
  • {{r|Computer science}} {{r|Computer program}}
    888 bytes (123 words) - 17:03, 13 July 2008
  • ...ors optimized for the power consumption constraints of mobile and laptop [[computer]]s, but still offering [[multicore processor]] performance; higher performa
    255 bytes (32 words) - 01:33, 18 February 2010
  • *[[Computer algebra system]]
    250 bytes (30 words) - 11:48, 8 February 2009
  • ...d chairperson, [[PARSA Community Foundation]]; former executive, [[Oracle (computer software)|Oracle, Inc.]]
    256 bytes (31 words) - 12:37, 5 April 2024
  • A function that maps to and from human-readable names and computer-readable addresses, not intended to be a [[search engine]]
    161 bytes (22 words) - 02:16, 12 February 2009
  • ...ftware", used to describe undesirable or harmful software and changes to a computer.
    169 bytes (24 words) - 00:21, 7 February 2009
  • {{rpl|Syntax (computer science)}}
    124 bytes (15 words) - 07:14, 24 September 2013
  • {{rpl|Culture (computer programming)}}
    124 bytes (15 words) - 04:40, 26 September 2013
  • In telecommunications and computer networking, a location at which service providers can connect to one anothe
    206 bytes (28 words) - 08:19, 16 July 2009
  • Optical disc storage technology for video, audio, and computer data which holds high-quality digital video, better-than-CD audio, pictures
    206 bytes (25 words) - 23:22, 3 March 2010
  • ...ronic Charting System]] that may run on a dedicated device or a [[personal computer]]; typically accepts inputs, via [[NMEA 0183]] interface, from a wide range
    255 bytes (35 words) - 22:20, 12 January 2011
  • * [[Syndication (computers)]] - computer standards for allowing users to subscribe to regular updates on certain kin
    249 bytes (30 words) - 22:14, 1 October 2009
  • ...F) has existed since 1976, created by [[Sol Libes]] of the [[Acgnj|Amateur Computer Group of New Jersey]] and [[Allen Katz]] of [[The College of New Jersey]] (
    750 bytes (117 words) - 20:15, 2 December 2009
  • ...al damage, such as [[electronic warfare]], concealing smoke, or attacks on computer network software
    272 bytes (38 words) - 15:30, 25 December 2010
  • ...viding multiple communications paths among logical or physical points in [[computer network]]s, primarily for [[fault tolerance]] but also for [[load distribut
    261 bytes (34 words) - 12:38, 30 May 2010
  • ...ia]], [[California (U.S. state)]]. The device is a touchscreen tablet-form computer that runs the [[iPhone]] "touch" OS, as well as software designed for the i
    759 bytes (114 words) - 10:23, 27 March 2023
  • A set of procedures in [[computer graphics]] that correct inconsistencies in the [[topology (mathematics)|top
    222 bytes (30 words) - 05:47, 8 September 2009
  • | product = Computer and Consumer Products '''Dell Inc.''' (formerly known as Dell Computer Corporation) is an American electronic hardware manufacturing company prima
    3 KB (487 words) - 05:48, 28 September 2013
  • A computer operating system originally conceived and developed by a group of researche
    202 bytes (29 words) - 11:38, 1 June 2008
  • *.xyz: a computer file format for modelling molecules
    194 bytes (29 words) - 10:00, 28 May 2010
  • A '''computer tower''' is the basic physical enclosure for [[modular computer system]]s used for desktop workstations and for servers with less than the ...[motherboard]], [[power supply (computer)]], [[disk bay]]s, [[cooling fan (computer)]] and possibly additional cooling components, and [[peripheral card]]s. Th
    2 KB (270 words) - 11:41, 22 February 2009
  • ...nd transmits the [[angle]] of the pivot two or three [[dimensions]] to a [[computer]] or [[video game]] device.
    859 bytes (136 words) - 15:08, 19 May 2010
  • An interactive entertainment computer or electronic device that manipulates the video display signal of a display
    205 bytes (28 words) - 21:25, 12 July 2008
  • A field at the intersection of [[mathematics]] and [[computer science]] that is concerned with the [[security of information]], typically
    250 bytes (30 words) - 03:05, 21 May 2010
  • {{r|Computer science}} {{r|Computer}}
    978 bytes (131 words) - 18:06, 11 January 2010
  • ...r IP]] service that can be used to make calls from computer to computer or computer to telephone. In addition to the common functions of instant messaging (IM) ...ts contacts from email-based applications which have been installed on the computer.
    2 KB (296 words) - 08:58, 22 April 2024
  • The component in an electronic computer that performs all the active processing of its programming directions, and
    273 bytes (36 words) - 18:25, 16 June 2008
  • ...heir apparent use of [[origin of language|language]] via [[lexigram]]s and computer-based keyboards.
    266 bytes (33 words) - 21:46, 14 September 2009
  • ...ng material. In this chapter we will cover all aspects that fall under '''Computer Science Foundation'''. The material covered here will get you prepared fo * [[Computer Organization]]
    1 KB (134 words) - 00:53, 18 February 2009
  • ...eans, including one's complement, two's complements, and variants, used in computer memory and mass storage to differentiate positive from negative numbers
    204 bytes (27 words) - 13:21, 18 November 2008
  • [[Malware]] that overwhelms processing, memory, or network resources of a computer system by sending large numbers requests that appear legitimate, but at a h
    258 bytes (37 words) - 20:09, 22 February 2009
  • ...8085A die.jpg | left | thumb | Die image of an Intel 8085A, a single chip computer]] [[File:Intel C8085.jpg | thumb | an 8085 single chip computer is mounted within this [[Dual in-line package]] from 1976.]]
    926 bytes (134 words) - 12:03, 6 March 2024
  • ...[[operating system]]. The term dates back to the original [[IBM]] personal computer of the early 1980's. ...ten to a [[CMOS]] (complimentary metal oxide semiconductor) chip, and some computer enthusiasts used the terms "BIOS" and "CMOS" interchangeably.
    3 KB (483 words) - 14:23, 15 July 2008
  • (1944-2024) Science-fiction writer. computer scientist and mathematician who won five Hugo Awards, including for the nov
    229 bytes (30 words) - 22:55, 25 March 2024
  • Until quite recently, [[Intel]] computer chipsets were separated into very-high-speed "northbridge" components inclu
    281 bytes (31 words) - 09:45, 28 August 2009
  • An early single chip computer with 16-bit architecture, chosen by IBM for the 1979 introduction of the fi
    208 bytes (31 words) - 13:40, 22 February 2009
  • ...ation security]] functions that may or may not reside in a single physical computer. Large or fault-tolerant networks have multiple firewalls. The functions c *(necessarily) a single computer
    1 KB (190 words) - 05:48, 8 April 2024
  • ...would complete his degree in the mid 1980's long after the launch of Apple Computer. Wozniak's partnership with [[Steve Jobs]] began in 1970. Jobs supplied mar
    853 bytes (125 words) - 10:18, 27 March 2023
  • ...n called simply ISA, is the formal specification of a particular type of [[computer]], in the form of a full description of the instructions which the machine ...ISA falls within the [[computer science]] area of specialization called [[computer architecture]].
    2 KB (364 words) - 10:41, 4 January 2022
  • a first-person [[computer role-playing game]] for [[MS-DOS]], released in 1994 by [[Bethesda Softwork
    208 bytes (26 words) - 05:44, 9 December 2010
  • ...ta.org/main/news/stories/college_science.php?news_story_ID=47561&print=yes Computer Analogies], ''Journal of College Science Teaching'' '''32''' No. 3, p. 176- |align=center|'''Computer science'''
    2 KB (278 words) - 00:32, 1 April 2008
  • ....H., T.A. DeFanti, M.D. Brown (ed), Visualization in Scientific Computing, Computer Graphics Vol. 21, No. 6, November 1987.</ref>.
    2 KB (236 words) - 09:18, 18 February 2008
  • ...1, to a radical decision made by IBM when it introduced its first personal computer ([[x86]]-based). IBM published the [[BIOS|BIOS]] (Basic Input/Output Syste To be called IBM compatible, a computer's processor must be [[x86]]-based, and all the hardware components must adh
    2 KB (279 words) - 14:38, 7 July 2009
  • ...ttps://www.si.edu/object/log-book-computer-bug%3Anmah_334663 Log Book with Computer Bug], Smithsonian National Museum of American History
    317 bytes (44 words) - 13:02, 5 July 2022
  • *Computer generated summit panoramas [http://www.viewfinderpanoramas.org/panoramas/CE
    332 bytes (43 words) - 10:55, 24 January 2009
  • ...of study which provides useful procedures in the fields of mathematics and computer science.
    205 bytes (30 words) - 00:31, 10 September 2012
  • ...s wise to require that changing privileges be done from a separate, secure computer. ...rity Agency]], it should be able to access a Navy computer. Accessing that computer, however, does not mean a soldier in a tank can get into every application
    3 KB (397 words) - 20:52, 4 November 2008
  • ...December 28th, 1969 to Nils and Anna Torvalds, is a [[Finland|Finnish]] [[computer]] [[software engineer]] known for writing the initial versions of the [[ope ...studying at the [[University of Helsinki]] in 1988, where he majored in [[computer science]]. He and his wife Tove Monni Torvalds have three children, Patrici
    981 bytes (134 words) - 06:47, 14 September 2013
  • {{r|String (computer science)}}
    144 bytes (17 words) - 12:28, 4 July 2009
  • ...cs-animations.com/Physics/English/f02_tmp.htm |accessdate=2011-03-07 |work=Computer animations of physical processes |publisher=physics-animations.com }} Anima
    256 bytes (31 words) - 13:00, 7 March 2011
  • {{r|Computer}} {{r|Computer program}}
    880 bytes (140 words) - 18:36, 11 July 2010
  • ...and the public Internet. Some relay types are associated with layers in [[computer networking reference models]], such as [[router]]s at the Internetworking L
    980 bytes (148 words) - 09:37, 20 September 2009
  • ...tures. The precise shaping of dose distribution is achieved via the use of computer-controlled multileaf collimators.<noinclude>{{DefMeSH}}</noinclude>
    296 bytes (37 words) - 14:17, 22 June 2010
  • A means of human-to-computer interfacing, most commonly implemented over a voice [[telephone]] call, in
    231 bytes (33 words) - 16:49, 22 December 2008
  • {{rpl|Relay (computer controlled)}}
    184 bytes (21 words) - 05:05, 24 September 2013
  • ...produce a secure cipher that required the user neither to have access to a computer nor to carry anything that might be incriminating, such as a cipher machine The book includes a computer implementation, written in [[Perl]] by [[Ian Goldberg]]. There are other im
    949 bytes (145 words) - 23:50, 12 May 2011
  • Discussion of the many different computer programs developed worldwide that use mathematical algorithms to simulate h
    260 bytes (36 words) - 18:25, 24 May 2011
  • The process of sending stimuli to a computer network and analyzing the responses, which may be a legitimate operational
    207 bytes (32 words) - 09:10, 4 February 2009
  • ...an be either remote-controlled by human operators or operate under its own computer control, and can carry lethal or nonlethal payloads (i.e., weapons and sens
    249 bytes (37 words) - 13:20, 11 August 2009
  • A feature in some computer programming languages that allows a procedure to bind to its environment, s
    296 bytes (45 words) - 14:19, 30 April 2011
  • Virtual worlds are computer-based simulations of environments where the users of such environments can
    216 bytes (29 words) - 20:44, 16 September 2008
  • ...for [[Email|email]] which requires messages to be downloaded to a client's computer, phone or tablet for reading.
    184 bytes (25 words) - 16:09, 21 January 2023
  • ...a problem which is trivial for a human to solve, but very difficult for a computer program (see [[artificial intelligence]]). ...[[computer security|exploit]] those services will often attempt to write a computer program that can automatically register for and use said services. CAPTCHA
    3 KB (388 words) - 20:29, 22 March 2011
  • {{rpl|Program (software)|In computer science}}
    96 bytes (12 words) - 06:23, 26 September 2013
  • ...arch in the psychology of speech perception laid the groundwork for modern computer speech synthesis, and the understanding of critical issues in cognitive sci
    265 bytes (33 words) - 10:03, 12 September 2009
  • | title = The Best Laid Plans of Mice and Men: The Computer Mouse in the History of Computing
    259 bytes (34 words) - 21:58, 28 December 2008
  • The act of releasing computer security vulnerability details without first informing vendors or allowing
    267 bytes (38 words) - 17:09, 21 July 2010
  • Chairman of EDventure Holdings, a computer industry business group; board of directors, [[National Endowment for Democ
    298 bytes (36 words) - 18:24, 14 September 2009
  • ...//www.unicog.org/main/pages.php?page=NumberRace The Number Race] &mdash; a computer game designed to improve numerical processing in children with dyscalculia
    357 bytes (50 words) - 15:02, 11 August 2010
  • A hardened but isolated component of a network or computer, which is intended to be attractive to [[miscreant]]s and invite attacks, w
    249 bytes (38 words) - 10:11, 12 June 2009
  • ...osed of an ordered sequence of [[record]]s, is transferred from one source computer to one or more destination computers. The [[Trivial File Transfer Protocol|
    905 bytes (126 words) - 11:04, 11 July 2010
  • Associate Professor of Computer Science and Director of Laboratory for International Data Privacy; visiting
    316 bytes (35 words) - 17:09, 3 October 2009
  • ...e design and testing specifications, and reliable and timely [[programming|computer code]] is produced, so as to fit the needs of potential users and to be mai
    282 bytes (41 words) - 11:31, 29 April 2010
  • {{rpl|Closure (computer science)}}
    151 bytes (17 words) - 05:13, 26 September 2013
  • A reference in a computer document to a website document in another place; clicking on it brings the
    170 bytes (26 words) - 19:09, 1 March 2010
  • Military computer workstation and communications processing to interface to the [[Army Battle
    259 bytes (33 words) - 23:44, 27 July 2010
  • ...on board a computer. These circuits are fundamental to the operation of a computer and have an analog in traditional pencil-and-paper addition. ...trons represents a '''1''' and a lack of electrons represents a '''0'''. A computer's ALU (Arithmetic Logic Unit) consists of a variety of circuits that perfor
    2 KB (368 words) - 05:19, 17 March 2024
  • * [[computer role-playing game]]
    130 bytes (11 words) - 05:22, 27 February 2009
  • ...tters and receivers, [[Global Navigation Satellite System]] receivers, and computer control into a self-organizing, mobile network in which vessels are inform
    340 bytes (42 words) - 11:58, 15 April 2009
  • A '''role-playing video game''', sometimes called a '''computer role-playing game''' (abbreviated cRPG or CRPG), is a [[role-playing game] ...nct effects on game play. Particularly in recent years, the evolution of [[computer graphics]] has allowed game designers to lushly detail their imagined world
    2 KB (259 words) - 14:58, 19 May 2010
  • General-purpose military command and control laptop computer, using the [[Microsoft Windows]] operating system to run the U.S. Army [[Ma
    290 bytes (38 words) - 23:53, 27 July 2010
  • ...an integrated [[electronic warfare]] system which fires, manually or under computer control, [[flare (electronic warfare)|flares]], [[chaff (electronic warfare
    329 bytes (41 words) - 15:04, 27 November 2010
  • The '''P-versus-NP problem''' is a major unsolved problem in theoretical [[computer science]]. Basically, the issue is if every problem whose solution can be q
    215 bytes (31 words) - 17:03, 13 January 2024
  • A computer-assisted means of controlling a complex machine, such as an automobile or a
    301 bytes (46 words) - 17:01, 15 August 2008
  • Defines the method in which a computer network is architected; topologies can be either physical (meaning how the
    262 bytes (37 words) - 00:06, 15 January 2009
  • {{r|Operator (computer programming)}}
    182 bytes (18 words) - 11:06, 31 May 2009
  • ...nd [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend to people and t
    319 bytes (41 words) - 08:45, 13 September 2009
  • A variety of techniques in electronic engineering, computer science, and network engineering, the most basic of which being multiple l
    307 bytes (42 words) - 13:30, 26 February 2010
  • {{r|Translation (computer)}}
    160 bytes (16 words) - 15:30, 31 October 2014
  • A related, and often ambiguous, computer term is [[Synchronization]].
    282 bytes (34 words) - 10:36, 4 April 2024
  • ...electrical or optical, specification that defines the connection between a computer and the transmission medium, aspects or all details of the transmission me
    226 bytes (31 words) - 11:33, 14 September 2008
  • ...zed piece of software, which is an unauthorized consumer of resources on a computer; it may or may not propagate to other computers inside software sent to the
    266 bytes (43 words) - 10:08, 7 February 2009
  • ...social stratification, the nature of duty, and, interestingly, the role of computer technicians in a context that completely missed trends in the development o
    304 bytes (40 words) - 10:12, 26 June 2009
  • ...or the purpose of illustrating the steps involved in the installation of a computer program.
    319 bytes (47 words) - 09:53, 7 December 2022
  • {{r|Computer network}}
    197 bytes (24 words) - 17:14, 19 March 2009
  • *[[Computer algebra system]]
    119 bytes (12 words) - 08:32, 1 June 2008
  • ...Society for Modeling and Simulation International (Formerly the Society of Computer Simulation)] ...dCast/files/podcast29.mp3 Sabanci University School of Languages Podcasts: Computer Simulation by Prof. David M. Goldsman]
    2 KB (290 words) - 20:45, 1 May 2008
  • A hardware device that plugs into a common computer interface, such as a serial or [[USB]] port, which serves as an [[authentic
    387 bytes (53 words) - 11:23, 7 May 2010
  • | journal = Computer
    426 bytes (51 words) - 10:38, 29 August 2008
  • * In [[logic]] and [[computer science]]
    478 bytes (48 words) - 09:33, 31 December 2008
  • ...nt in the [[history of computing]] for having invented a viable mechanical computer equivalent to modern digital computers. ...y 1800's for the purpose of computing naval navigation charts. His second computer, also never quite finished, was called the Analytical Engine. It was gener
    2 KB (313 words) - 07:27, 14 February 2016
  • ...graphic Organization]], for a device that, at a minimum, links a display, computer-readable charts and a [[Global Navigation Satellite System]] such as [[GPS] ...a function that runs on a commercial [[personal computer]] or a dedicated computer. Chartplotter tends to imply that the device will accept real-time electron
    3 KB (369 words) - 22:52, 12 January 2011
  • [[Computer]]
    99 bytes (10 words) - 18:34, 17 October 2007
  • '''Grace Murray Hopper''' (-1992) was a pioneering [[computer science|computer scientist]] and a [[rear admiral]] in the [[United States Navy]]. In the te When computer speeds broke into the microsecond range, she commanded her staff to "bring
    4 KB (696 words) - 15:41, 8 April 2024
  • ...tication server in combination with a user ID; the code is manually into a computer session by the user
    263 bytes (37 words) - 11:15, 7 May 2010
  • ...ing, a broad term that usually refers to the abstraction of resources on a computer, using a container such as a "virtual machine" or several "virtual machines
    353 bytes (55 words) - 12:48, 4 July 2009
  • In computer science, anything that turns one set of instructions into another set of in
    367 bytes (49 words) - 20:43, 5 July 2009
  • ...ings, is the goal of having all types of human-to-computer and computer-to-computer communications '''converge onto''' (i.e., all run over) a common infrastruc ..., private branch exchange) on a purpose-built router, or a general-purpose computer.
    3 KB (351 words) - 04:39, 5 April 2024
  • ...nsure interested parties are notified of a [[software]] issue, wherein the computer itself or one of its programs is not performing to expectations. Software i
    284 bytes (44 words) - 02:50, 13 January 2024
  • The set of [[protocol (computer)|protocols]] and administrative conventions that let multiple computers or
    351 bytes (47 words) - 17:15, 28 August 2008
  • ...omputer operators by formally defining the threshold of criminal damage to computer systems. Nonmonetary damages, such as threats to safety, are also included # damage affecting a computer system used by or for a government entity in furtherance of the administrat
    2 KB (261 words) - 12:47, 22 November 2010
  • ...ds user application programs to create and read mail, but also [[protocol (computer)|protocols]] to transfer and deliver electronic envelopes. ...e, which is in the user application program that runs on the user's client computer.
    2 KB (279 words) - 05:12, 31 May 2009
  • ...ctionality of a computer system, but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer.<ref>[http://wearcam.o There are three new ways how a wearable computer and it's user may interact.
    6 KB (1,035 words) - 22:16, 15 September 2013
  • In computer and network security, the term '''miscreant''' is a preferred neutral term ...re rarely amused. Even if the hacker believed his acts were "ethical", the computer owner or user might not &mdash; there was a conflict of ethics.
    3 KB (448 words) - 05:48, 8 April 2024
  • In computer science, an '''interpreter''' is anything that turns one set of instruction ...s also a result of the fact that an interpreter is itself is a typically a computer program that runs in a loop of the form:
    4 KB (636 words) - 09:49, 20 August 2023
  • '''Computer networking media sharing protocols''' define the rules of attachment of a s
    325 bytes (47 words) - 12:38, 30 March 2024
  • Virtual worlds are computer based environments where the user can modify or control aspects of environm
    313 bytes (47 words) - 19:58, 16 September 2008
  • {{rpl|Myth (computer game)}}
    287 bytes (41 words) - 04:57, 24 September 2013
  • ...h as a [[cellular telephony|cell phone]] or larger device such as a laptop computer
    295 bytes (47 words) - 12:19, 21 March 2009
  • '''KANT''' is a [[computer algebra system]] for mathematicians interested in algebraic number theory, * [[Comparison of computer algebra systems]]
    1 KB (152 words) - 08:31, 14 September 2013
  • * For {{r|Protocol (computer)|computers|}}
    146 bytes (16 words) - 05:57, 2 January 2010
  • In mathematics or computer science, an '''algorithm''' is a sequence of steps for one particular metho ...thm consists of the steps to follow in solving a problem. When encoded in computer programs, algorithms operate on data values, preferably data maintained in
    2 KB (286 words) - 07:49, 10 February 2021
  • Devices for [[computer network]]s involving applications that use multiple, variable TCP/UDP port
    409 bytes (54 words) - 13:38, 7 May 2010
  • a first-person [[computer role-playing game]] (CRPG) for [[MS-DOS]], developed by [[Bethesda Softwork
    311 bytes (45 words) - 06:58, 26 September 2009
  • A [[single-player]] [[Computer role-playing game|role-playing]] [[video game]] developed by Bethesda Game
    343 bytes (44 words) - 20:50, 30 September 2009
View (previous 500 | ) (20 | 50 | 100 | 250 | 500)