Search results
Jump to navigation
Jump to search
Page title matches
- A '''computer network''' is a collection of [[computer]]s or digital devices ("nodes") connected In contrast to an ordinary computer network, where the user is aware of multiple computers, a '''[[distributed system]]15 KB (2,278 words) - 05:21, 8 March 2024
- 81 bytes (10 words) - 06:17, 28 August 2009
- 12 bytes (1 word) - 06:59, 26 September 2007
- 124 bytes (15 words) - 09:26, 13 November 2008
- In [[computer network|networks of computers]], a '''host''' is a term for computers, on a network742 bytes (101 words) - 21:31, 2 February 2009
- 3 KB (490 words) - 05:49, 8 April 2024
- 181 bytes (23 words) - 06:17, 28 August 2009
- 932 bytes (116 words) - 11:20, 9 December 2009
- Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed wit232 bytes (32 words) - 12:53, 15 September 2008
- Auto-populated based on [[Special:WhatLinksHere/Sinkhole (Computer network)]]. Needs checking by a human.442 bytes (56 words) - 20:24, 11 January 2010
- Auto-populated based on [[Special:WhatLinksHere/Host (computer network)]]. Needs checking by a human.520 bytes (66 words) - 17:17, 11 January 2010
Page text matches
- The separation of [[telecommunications network|telecommunications/]] [[computer network|computer/]] [[convergence of communications|converged]] networks into gener331 bytes (37 words) - 09:49, 20 September 2009
- {{r|Computer network}} {{r|Bridge (computer network)}}331 bytes (41 words) - 22:45, 1 October 2009
- * [[Computer network|Computer networks]]509 bytes (52 words) - 20:02, 19 April 2011
- ==Computer network security== ...connaissance]]''' is a term for testing for potential vulnerabilities in a computer network. This may be a legitimate activity by the network owner/operator, seeking t1 KB (176 words) - 04:40, 26 September 2013
- {{r|Computer network}}341 bytes (42 words) - 14:19, 1 December 2010
- {{r|Computer network}}388 bytes (44 words) - 15:18, 31 October 2008
- One who enters a computer or computer network without authorization by the owner or administrator, regardless of the moti173 bytes (24 words) - 10:14, 7 February 2009
- {{r|Computer network}}275 bytes (33 words) - 22:42, 13 July 2008
- #REDIRECT [[Computer network]]30 bytes (3 words) - 09:29, 16 March 2010
- ...architecture''', applicable to both [[telecommunications network]]s and [[computer network]]s as well as their continuing modern [[convergence of communications|conve607 bytes (83 words) - 09:46, 20 September 2009
- The process of sending stimuli to a computer network and analyzing the responses, which may be a legitimate operational function207 bytes (32 words) - 09:10, 4 February 2009
- {{r|Computer network|Computer networks}} {{r|Computer network}}761 bytes (100 words) - 09:48, 22 October 2010
- {{r|Computer network}}367 bytes (45 words) - 06:00, 17 March 2024
- {{r|Computer network}}413 bytes (50 words) - 11:59, 30 November 2008
- Rules for communication among devices in a computer network.60 bytes (9 words) - 08:20, 25 April 2023
- Use of [[computer network]]s, especially the [[Internet]], to access computer resources, operated by283 bytes (38 words) - 15:04, 18 March 2010
- Largest vendor of [[computer network]] equipment and software97 bytes (11 words) - 08:57, 5 August 2010
- *[[Computer network]]98 bytes (9 words) - 05:21, 8 March 2024
- Defines the method in which a computer network is architected; topologies can be either physical (meaning how the actual h262 bytes (37 words) - 00:06, 15 January 2009
- The class of devices that attach to a computer network90 bytes (13 words) - 14:45, 7 February 2009