Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
1 | 0 |
protocol stack
|
layering different protocols on top of one another
|
the set of software required to process a set of protocols at various layers
|
1 | 0 |
protocol stack
|
layering different protocols on top of one another
|
list of protocols used by a certain system, one protocol per layer.
|
1 | 0 |
protocol stack
|
a collection of protocols. tcp/ip is an example. the actual software that implements the protocol suite on a particular operating system.
|
networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol stack.
|
1 | 0 |
protocol stack
|
a collection of protocols. tcp/ip is an example. the actual software that implements the protocol suite on a particular operating system.
|
al known as a protocol suite and is multiple protocols that work together to provide a network service or application.
|
0 | 0 |
protocol stack
|
the set of software required to process a set of protocols at various layers
|
or a protocol suite, is made up of multiple protocols used to exchange information between computers
|
2 | 1 |
protocol stack
|
list of protocols used by a certain system, one protocol per layer.
|
or a protocol suite, is made up of multiple protocols used to exchange information between computers
|
3 | 1 |
protocol stack
|
set of software used to understand the different protocols
|
the set of software required to process a set of protocols at various layers
|
1 | 0 |
protocol stack
|
different layers and are stacked one of another the set of software used to understand the different protocols
|
or a protocol suite, is made up of multiple protocols used to exchange information between computers
|
1 | 0 |
protocol stack
|
it shows how the individual protocols within a suite are implemented
|
all the protocols from a protocol suite currently used to carry out specific functions of network communications within the computer.
|
0 | 0 |
protocol stack
|
set of software used to understand the different protocols
|
list of protocols used by a certain system, one protocol per layer.
|
1 | 0 |
protocol stack
|
the set of software required to process a set of protocols at various layers
|
list of protocols used by a certain system, one protocol per layer.
|
3 | 1 |
protocol stack
|
the protocols of the various layers
|
the collection of networking protocols that operate at the various layers
|
0 | 0 |
protocol stack
|
set of software used to understand the different protocols
|
or a protocol suite, is made up of multiple protocols used to exchange information between computers
|
0 | 0 |
small groups
|
-minimum of 3 people -ideal number is 5 -odd numbers usually -created to complete superordinate goals
|
vary in size, function as systems, maintain task-oriented goals, governed by their own norms, create their own identities, preserve member cohesiveness
|
2 | 1 |
small groups
|
are defined as any small gathering of people interacting over time in order to reach a goal.
|
3 to 12 people united together around common goals and feeling a sense of belonging to their social unit
|
1 | 0 |
peer-to-peer network
|
every computer can communicate directly with every other computer.
|
every computer is equal and communicate with any other computer on the network that will be granted access
|
3 | 1 |
peer-to-peer network
|
peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application.
|
a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers.
|
3 | 1 |
peer-to-peer network
|
there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files.
|
a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers.
|
2 | 1 |
peer-to-peer network
|
consists of peer machines that exchange data with each other without a dedicated server
|
there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files.
|
1 | 0 |
peer-to-peer network
|
allows every computer to communicate with every other computer in the network.
|
every computer can communicate directly with every other computer.
|
0 | 0 |
peer-to-peer network
|
network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os
|
a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers.
|
3 | 1 |
peer-to-peer network
|
a network in which all microcomputers on the network communicate directly with one another without relying on a server.
|
a network relying on its interconnected computers with no use for a server.
|
0 | 0 |
peer-to-peer network
|
network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os
|
a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers.
|
2 | 1 |
peer-to-peer network
|
- no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually
|
a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers.
|
2 | 1 |
peer-to-peer network
|
when you allow workstation computers to become servers and share things in this manner, it is called a peer-to-peer network. no central authority
|
any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
|
1 | 0 |
peer-to-peer network
|
network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os
|
peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application.
|
1 | 0 |
peer-to-peer network
|
each computer on this network is considered equal; no computer has ultimate control over another.
|
a type of network where all devices are equal and connected directly to each other
|
3 | 1 |
peer-to-peer network
|
the os of each computer on the network controls access to its resources individually, without any centralization.
|
a network where each computer has control of itself without a centralized admin
|
3 | 1 |
peer-to-peer network
|
consists of peer machines that exchange data with each other without a dedicated server
|
a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers.
|
1 | 0 |
peer-to-peer network
|
- no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually
|
a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers.
|
0 | 0 |
peer-to-peer network
|
network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os
|
there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files.
|
2 | 1 |
peer-to-peer network
|
a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers.
|
a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers.
|
2 | 1 |
peer-to-peer network
|
peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application.
|
a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers.
|
1 | 0 |
peer-to-peer network
|
a type of network that connects two client computers directly together. the systems are independent of each other and authentication is decentralized.
|
a peer-to-peer network, therefore, is one in which each computer node has equal abilities. #
|
3 | 1 |
peer-to-peer network
|
- no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually
|
network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os
|
1 | 0 |
peer-to-peer network
|
computer systems connected to each other via the internet
|
a network model where all computers are connected to each other and data may be shared from computer to computer.
|
2 | 1 |
peer-to-peer network
|
a peer-to-peer network, therefore, is one in which each computer node has equal abilities. #
|
a network in which all microcomputers on the network communicate directly with one another without relying on a server.
|
0 | 0 |
peer-to-peer network
|
network benefits: easy installation, usually cost less
|
network drawbacks: limited scalability, lower performance
|
0 | 0 |
peer-to-peer network
|
peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application.
|
there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files.
|
2 | 1 |
peer-to-peer network
|
consists of peer machines that exchange data with each other without a dedicated server
|
peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application.
|
2 | 1 |
peer-to-peer network
|
a type of network that connects two client computers directly together. and they can share their resources
|
a collection of interconnected devices (for example, pcs) which share their resources with one another.
|
0 | 0 |
peer-to-peer network
|
each computer on this network is considered equal; no computer has ultimate control over another.
|
- most basic, low level - a computer can be connected to another via a serial port - if multiple computers needed, then a proper network required (hub)
|
0 | 0 |
peer-to-peer network
|
- no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually
|
peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application.
|
0 | 0 |
peer-to-peer network
|
allows interconnected devices (ie: pcs) to share their resources with one another. these resources could be for example, files or printers.
|
computers share resources and share equal control over resources. inexpensive and handle small amounts of info.
|
2 | 1 |
peer-to-peer network
|
a type of network that connects two client computers directly together. and they can share their resources
|
a type of network that connects two client computers directly together. doesnot need server software to be installed in each ones
|
0 | 0 |
peer-to-peer network
|
consists of peer machines that exchange data with each other without a dedicated server
|
a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers.
|
2 | 1 |
peer-to-peer network
|
a type of network that connects two client computers directly together. the systems are independent of each other and authentication is decentralized.
|
a network relying on its interconnected computers with no use for a server.
|
3 | 1 |
peer-to-peer network
|
a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers.
|
there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files.
|
2 | 1 |
peer-to-peer network
|
a collection of interconnected devices (for example, pcs) which share their resources with one another.
|
a type of network that connects two client computers directly together. doesnot need server software to be installed in each ones
|
1 | 0 |
peer-to-peer network
|
computer architecture in which all of the computers on a network are equal and there is no computer designated as the server.
|
a network model where all computers are connected to each other and data may be shared from computer to computer.
|
1 | 0 |
peer-to-peer network
|
a collection of interconnected devices (for example, pcs) which share their resources with one another.
|
a type of network that connects two or more host computers directly together. all computers act like clients and servers.
|
2 | 1 |
peer-to-peer network
|
a type of network that connects two client computers directly together. the systems are independent of each other and authentication is decentralized.
|
a network in which all microcomputers on the network communicate directly with one another without relying on a server.
|
1 | 0 |
peer-to-peer network
|
computer architecture in which all of the computers on a network are equal and there is no computer designated as the server.
|
computer systems connected to each other via the internet
|
0 | 0 |
peer-to-peer network
|
- most basic, low level - a computer can be connected to another via a serial port - if multiple computers needed, then a proper network required (hub)
|
a type of network where all devices are equal and connected directly to each other
|
1 | 0 |
peer-to-peer network
|
when a network does not have a server, all the computers are essentially equal, with programs and data distributed among them.
|
network of computers configured to allow certain files and folders to be shared with everyone or selected users
|
1 | 0 |
peer-to-peer network
|
a type of network that connects two client computers directly together. doesnot need server software to be installed in each ones
|
a type of network that connects two or more host computers directly together. all computers act like clients and servers.
|
3 | 1 |
3d shape
|
can be measured for length, width, and height
|
it has three dimensions : width, length and height
|
0 | 0 |
software development process
|
requirements specification and architecture design implement and prototype testing debugging deploy and maintain
|
planning, analysis, design, implementation, testing and integration, maintenance
|
0 | 0 |
software development process
|
any description of software development that contains some of the nine actives listed before, organized so that together they produce tested code
|
in order to understand, control and improve what happens as software products are built for customers.
|
1 | 0 |
software development process
|
system that is worked through when creating a piece of software: - analysis - design - implementation - testing - documentation - evaluation - maintenance
|
feasibility and requirements design implementation and testing - conversion of data files installation and training maintenance
|
2 | 1 |
software development process
|
the process of dividing software development work into distinct phases to improve design, product management and project management
|
a framework that is used to structure, plan and control process of developing an info system
|
1 | 0 |
software development process
|
requirements specification and architecture design implement and prototype testing debugging deploy and maintain
|
system that is worked through when creating a piece of software: - analysis - design - implementation - testing - documentation - evaluation - maintenance
|
0 | 0 |
semantic web
|
a set of design principles that will allow computers to better index pages, topics, and subjects
|
allow meaning information exchange and search among machines
|
0 | 0 |
semantic web
|
- a set of design principles that will allow computers to better index web pages, topics, and subjects - enhanced search results
|
allow meaning information exchange and search among machines
|
1 | 0 |
semantic web
|
•will place the basic information of the web into meaningful categories •a layered connected database of information that software agents will sift through and process automatically for us.
|
allow meaning information exchange and search among machines
|
1 | 0 |
semantic web
|
a component of web 3.0 that provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. (w3c)
|
an extension of the world wide web that utilizes a variety of conventions and technologies that allow machines to understand the meaning of web content.
|
2 | 1 |
semantic web
|
an evolving extension of the web in which data is defined in such a way to make it more easily processed by computers
|
an evolving extension of the world wide web in which info is defined in psych a way as to make it more easily readable by computers
|
1 | 0 |
semantic web
|
- a set of design principles that will allow computers to better index web pages, topics, and subjects - enhanced search results
|
•will place the basic information of the web into meaningful categories •a layered connected database of information that software agents will sift through and process automatically for us.
|
0 | 0 |
generative model
|
a model like naive bayes makes use of this likelihood term, which expresses how to generate the features of a document if we knew it was of class c.
|
each cortical area in hierarchy makes predictions about the level below. probabilistic 'model' of each class; decision boundary: where 1 model becomes more likely; natural use of unlabeled data.
|
2 | 1 |
whole network
|
- a network viewed in it's entirety - not focused on one person
|
network that shows the entire population (or pre-defined part of it) even nodes that are not linked. all nodes appear
|
0 | 0 |
whole network
|
a network viewed in it's entirety (auto define) birds eye view rather than ego perspective with it's &"ego network&" all nodes appear in this network (recitation)
|
network that shows the entire population (or pre-defined part of it) even nodes that are not linked. all nodes appear
|
2 | 1 |
whole network
|
- a network viewed in it's entirety - not focused on one person
|
a network viewed in it's entirety (auto define) birds eye view rather than ego perspective with it's &"ego network&" all nodes appear in this network (recitation)
|
1 | 0 |
broad spectrum
|
-given to someone who's in danger of death -no time for testing
|
-e.g. tetracycline antibiotics
|
0 | 0 |
broad spectrum
|
*effective against a variety of microbes
|
a group of disinfectants that kill bacteria, viruses, fungi, pseudomonas, formerly known as hospital grade or level
|
1 | 0 |
information resources
|
data and other information used by businesses
|
the available data, technology, people, and processes within an organization to be used by the manager to perform business processes and tasks
|
1 | 0 |
information resources
|
the available data, technology, people, and processes within an organization to be used by the manager to perform business processes and tasks. information resources can either be assets or capabilities.
|
data and other information used by businesses
|
0 | 0 |
information resources
|
available data, technology, people, and processes within an organization to be used by the manager
|
data and other information used by businesses
|
0 | 0 |
user model
|
conceptual model - how the user thinks the system works
|
a profile of all end users of the system
|
2 | 1 |
hash function
|
turn the key that is provided into the index in the array where we want to put the data
|
a function that takes in the key to compute a specific hash index.
|
2 | 1 |
hash function
|
computes a bucket index from the item's key
|
the computation that generates a hash value from a key
|
1 | 0 |
hash function
|
a function used to manipulate the key of an element in a list to identify its location in the list
|
accept a key and return an output unique only to that specific key
|
2 | 1 |
hash function
|
maps search key into unique location of hash table
|
turn the key that is provided into the index in the array where we want to put the data
|
0 | 0 |
hash function
|
accepts an input message of any length and generates, through a one-way operation, a fixed-length output. if any part of the document is changed, a completely different function
|
a function that is deterministic but randomizing, i.e. whose output is a relatively small integer that appears to be a random function of the key value.
|
2 | 1 |
hash function
|
maps keys of a given type to integers in a fixed interval [0, n - 1]
|
a function that takes in the key to compute a specific hash index.
|
2 | 1 |
hash function
|
function used to map data of an arbitrary size/type to a fixed size and type
|
used to map data of arbitrary size into bit string of fixed sizes
|
3 | 1 |
hash function
|
maps search key into unique location of hash table
|
a function that takes in the key to compute a specific hash index.
|
1 | 0 |
hash function
|
function used to map data of an arbitrary size/type to a fixed size and type
|
a hash function is any function that can be used to map data of arbitrary size to data of fixed size. it is essentially used as a digital fingerprint.
|
1 | 0 |
hash function
|
a function used to manipulate the key of an element in a list to identify its location in the list
|
(...) is a function that takes a group of characters (called a key) and maps it to a value of a certain length.
|
1 | 0 |
hash function
|
takes data (like a string, or a file's contents) and outputs a hash, a fixed-size string or number.
|
takes a key, i.e. a string or integer, for a data record, scrambles it, and outputs an index to be used in a hash table
|
1 | 0 |
hash function
|
used to map data of arbitrary size into bit string of fixed sizes
|
a hash function is any function that can be used to map data of arbitrary size to data of fixed size. it is essentially used as a digital fingerprint.
|
0 | 0 |
hash function
|
takes an object and tells you where to put it.
|
the computation that generates a hash value from a key
|
0 | 0 |
hash function
|
a function used to manipulate the key of an element in a list to identify its location in the list
|
performs two separate functions 1) key generation 2) constrain the key to a positive value less than the size of the table
|
1 | 0 |
hash function
|
takes a key, i.e. a string or integer, for a data record, scrambles it, and outputs an index to be used in a hash table
|
a destructive function that throws away data from a string and outputs another string, and therefore cannot be decrypted. examples: sha1, sha256
|
1 | 0 |
hash function
|
a function that maps data to some fixed data for access to create a table
|
turn the key that is provided into the index in the array where we want to put the data
|
1 | 0 |
hash function
|
accept a key and return an output unique only to that specific key
|
performs two separate functions 1) key generation 2) constrain the key to a positive value less than the size of the table
|
3 | 1 |
hash function
|
maps search key into unique location of hash table
|
a formula that provides a home position in the hash table for data
|
2 | 1 |
hash function
|
a function that maps data to some fixed data for access to create a table
|
a function that takes in the key to compute a specific hash index.
|
2 | 1 |
hash function
|
maps keys of a given type to integers in a fixed interval [0, n - 1]
|
turn the key that is provided into the index in the array where we want to put the data
|
1 | 0 |
hash function
|
maps keys of a given type to integers in a fixed interval [0, n - 1]
|
a function that maps data to some fixed data for access to create a table
|
1 | 0 |
hash function
|
keys of a given type to integers in a fixed range [0, n-1] the integer h(x) is the hash value of the key x
|
used to map keys to integer values
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.