Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
0 | 0 |
design principles
|
the way of using design elements together
|
perception, memory, decision, design standards (like safety diagram standards)
|
0 | 0 |
design principles
|
balance: formal balance, informal balance movement proportion white space (isolation) contrast clarity and simplicity unity continuity
|
scale, proportion, ballance, movement, rhythm, emphasis, unity with variety
|
2 | 1 |
design principles
|
are balance/symmetry, rhythm/pattern, movement, harmony, contrast, emphasis, proportion/scale, and unity.
|
balance proportion rhythm emphasis unity
|
1 | 0 |
access methods
|
sequential access and direct access - relative block numbers allow os to decide where file should be placed
|
sequential access (based on tape model) direct access (based on disk model)
|
3 | 1 |
access methods
|
sequential access, direct access
|
sequential access (based on tape model) direct access (based on disk model)
|
0 | 0 |
hierarchical model
|
early database model shaped like upside down tree with each record called segment
|
the relationships between records from tree like structure
|
1 | 0 |
hierarchical model
|
an early database model based on an upside-down tree structure in which each record is called a segment .
|
the relationships between records from tree like structure
|
0 | 0 |
hierarchical model
|
restricted network model. built like a family tree.
|
dbs model that uses trees as building blocks. ideal for one to many (1:m) relationships. languages in this model are somewhat hard to learn.
|
2 | 1 |
hierarchical model
|
a early database model whose basic concepts and characteristics formed the basis for subsequent database development
|
developed to manage data for complex manufacturing projects. basic logical structure is represented by an upside-down tree
|
3 | 1 |
hierarchical model
|
early database model shaped like upside down tree with each record called segment
|
an early database model based on an upside-down tree structure in which each record is called a segment .
|
1 | 0 |
security protocols
|
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
|
ssl (secure sockets layer) tls (transport layer security)
|
2 | 1 |
security protocols
|
rules followed in a security application (ssl, ipsec)
|
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
|
0 | 0 |
security protocols
|
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
|
rules followed in a security application (ssl, ipsec)
|
0 | 0 |
security protocols
|
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
|
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
|
0 | 0 |
security protocols
|
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
|
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
|
0 | 0 |
security protocols
|
ssl (secure sockets layer) tls (transport layer security)
|
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
|
1 | 0 |
security protocols
|
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
|
ssl (secure sockets layer) tls (transport layer security)
|
2 | 1 |
security protocols
|
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
|
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
|
1 | 0 |
security protocols
|
rules followed in a security application (ssl, ipsec)
|
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
|
1 | 0 |
security protocols
|
rules followed in a security application (ssl, ipsec)
|
ssl (secure sockets layer) tls (transport layer security)
|
0 | 0 |
leaf nodes
|
predicted class
|
gives a classification that applies to all of the instances to reach the leaf
|
2 | 1 |
leaf nodes
|
(also called terminal nodes) of the tree contain an output variable (y) which is used to make a prediction
|
last nodes in tree
|
1 | 0 |
formal methods
|
used in developing computer systems are mathematically based techniques for describing system properties
|
mathematically-based techniques used to prove a program is correct
|
0 | 0 |
formal methods
|
mathematically-based techniques for describing system properties - also known as formal description techniques (fdts)
|
mathematically-based techniques used to prove a program is correct
|
0 | 0 |
formal methods
|
mathematically based techniques for describing system properties
|
mathematically-based techniques used to prove a program is correct
|
3 | 1 |
formal methods
|
mathematically-based techniques for describing system properties - also known as formal description techniques (fdts)
|
used in developing computer systems are mathematically based techniques for describing system properties
|
2 | 1 |
formal methods
|
mathematically-based techniques for specifying and developing reliable systems; used for high security and safety purposes
|
the use of &"mathematically rigorous techniques and tools for the specification, design and verification of software and hardware systems&"
|
1 | 0 |
software agents
|
perform tasks for users like calendaring functions and e-mail list management.
|
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity
|
1 | 0 |
software agents
|
perform tasks for users like calendaring functions and e-mail list management.
|
a program that performs information gathering, information filtering on behalf of a person
|
2 | 1 |
software agents
|
a program that performs information gathering, information filtering on behalf of a person
|
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity. synonymous with intelligent software agent
|
2 | 1 |
software agents
|
a program that performs information gathering, information filtering on behalf of a person
|
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity
|
0 | 0 |
software agents
|
perform tasks for users like calendaring functions and e-mail list management.
|
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity. synonymous with intelligent software agent
|
2 | 1 |
type inference
|
compiler looks at code and infers type. let compiler infer if it is obvious, if not declare it.
|
allows the compiler to deduce the proper type for you automatically, instead of you having to say it.
|
2 | 1 |
type inference
|
variables don't need explicit statements about their type unlike in java. haskell can automatically tell that 1 is of type int.
|
allows the compiler to deduce the proper type for you automatically, instead of you having to say it.
|
3 | 1 |
type inference
|
swift uses this to determine the type of any identifier using the context given whether explicit or implicit.
|
swift uses this term to work out an object's type from the available information, even when the name of the type isn't explicitly put into words in code.
|
2 | 1 |
type inference
|
used to determine the type of the result of the expression evaluation
|
translator infers the types of variables based on the operations used
|
2 | 1 |
embedded systems
|
part of a larger mechanical or electrical system e.g. a washing machine controller
|
placing a computer inside of another appliance to control it such as the computer in a microwave or car
|
3 | 1 |
embedded systems
|
computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions.
|
a computer system with a dedicated function within a larger electrical or mechanical system. examples include smart tvs, hvac, atms and printers.
|
3 | 1 |
embedded systems
|
a computer system inside another system which uses a micro-controller eg microwave and dishwasher
|
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
|
1 | 0 |
embedded systems
|
systems within systems. possibly a single-purpose for specific functionality used in a larger system.
|
systems that are included with other systems
|
1 | 0 |
embedded systems
|
computer systems built into other devices with a dedicated function
|
a computer system that is built into another larger device
|
2 | 1 |
embedded systems
|
part of a larger mechanical or electrical system e.g. a washing machine controller
|
a computer system inside another system which uses a micro-controller eg microwave and dishwasher
|
2 | 1 |
embedded systems
|
computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions.
|
hardware and software systems that have a specific function within a larger system.
|
3 | 1 |
embedded systems
|
hardware and software systems that have a specific function within a larger system.
|
a computer system with a dedicated function within a larger electrical or mechanical system. examples include smart tvs, hvac, atms and printers.
|
0 | 0 |
embedded systems
|
purpose-built device not usually to have direct access alarm system, door security, timecard system
|
have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats.
|
1 | 0 |
embedded systems
|
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
|
part of a larger mechanical or electrical system e.g. a washing machine controller
|
0 | 0 |
embedded systems
|
computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances
|
purpose-built device not usually to have direct access alarm system, door security, timecard system
|
3 | 1 |
embedded systems
|
computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions.
|
a computer hardware and software contained within a larger system designed for a specific function
|
1 | 0 |
embedded systems
|
computer system hidden inside another device, such as a car engine management system.
|
have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats.
|
2 | 1 |
embedded systems
|
a computer hardware and software contained within a larger system designed for a specific function
|
hardware and software systems that have a specific function within a larger system.
|
1 | 0 |
embedded systems
|
computer system hidden inside another device, such as a car engine management system.
|
purpose-built device not usually to have direct access alarm system, door security, timecard system
|
2 | 1 |
embedded systems
|
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
|
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
|
2 | 1 |
embedded systems
|
placing a computer inside of another appliance to control it such as the computer in a microwave or car
|
a computer system inside another system which uses a micro-controller eg microwave and dishwasher
|
0 | 0 |
embedded systems
|
involve using specialized chips within devices that contain oss themselves and are therefore self-contained computers. with the growing iot, embedded systems create management challenges and can be difficult to patch.
|
involves using embedded chips that contain the os itself. the growth of the internet of things (iot) further complicates the challenges.
|
3 | 1 |
embedded systems
|
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
|
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
|
3 | 1 |
embedded systems
|
part of a larger mechanical or electrical system e.g. a washing machine controller
|
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
|
2 | 1 |
embedded systems
|
placing a computer inside of another appliance to control it such as the computer in a microwave or car
|
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
|
3 | 1 |
embedded systems
|
computer systems built into other devices with a dedicated function
|
usually built into other devices and are dedicated systems
|
2 | 1 |
embedded systems
|
computer systems built into other devices with a dedicated function
|
computer system with a dedicated function within a larger mechanical system
|
1 | 0 |
embedded systems
|
computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances
|
computer system hidden inside another device, such as a car engine management system.
|
2 | 1 |
embedded systems
|
a computer system that forms part of an electronic device. for a single task. very limited programming ability - only its designed function
|
a computer system designed to do one specific purpose.
|
2 | 1 |
embedded systems
|
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
|
placing a computer inside of another appliance to control it such as the computer in a microwave or car
|
2 | 1 |
embedded systems
|
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
|
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
|
2 | 1 |
embedded systems
|
a computer system that is built into another larger device
|
usually built into other devices and are dedicated systems
|
3 | 1 |
embedded systems
|
hardware and software systems that have a specific function within a larger system.
|
a computer system with a dedicated function within a larger electrical or mechanical system.
|
3 | 1 |
embedded systems
|
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
|
placing a computer inside of another appliance to control it such as the computer in a microwave or car
|
0 | 0 |
embedded systems
|
computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances
|
have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats.
|
0 | 0 |
application programs
|
applications that are processed on either client or server computers
|
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
|
0 | 0 |
application programs
|
software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel
|
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
|
3 | 1 |
application programs
|
a computer program that interacts with the database by issuing an appropriate request (typically an sql statement) to the dbms.
|
a computer program that interacts with the database by issuing an appropriate request to dbms
|
3 | 1 |
application programs
|
software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs
|
software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel
|
1 | 0 |
application programs
|
programs written to accomplish certain tasks
|
perform a specific task ex: word processors, spreadsheets, games -operating system runs application programs
|
2 | 1 |
application programs
|
performs a specific task- word processors, spreadsheets and games
|
programs written to accomplish certain tasks
|
3 | 1 |
application programs
|
performs a specific task- word processors, spreadsheets and games
|
perform a specific task ex: word processors, spreadsheets, games -operating system runs application programs
|
1 | 0 |
application programs
|
store, maintain, and/or use database data to accomplish business and system tasks
|
provide security, data consistency, and special purpose processing
|
1 | 0 |
application programs
|
software using the data
|
software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs
|
1 | 0 |
application programs
|
software using the data
|
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
|
1 | 0 |
application programs
|
software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs
|
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
|
0 | 0 |
application programs
|
software using the data
|
applications that are processed on either client or server computers
|
1 | 0 |
application programs
|
software using the data
|
software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel
|
3 | 1 |
application programs
|
programs used to interact with database
|
computer programs that are used to create and maintain the database
|
2 | 1 |
declarative language
|
knowledge base is created and queries then determine facts of a problem or set of data.
|
often used by intelligent systems. a knowledge base is used that contains a series of related facts and rules.
|
2 | 1 |
declarative language
|
simplify data access by requiring that users only specify what data they want to access without defining how access will be achieved
|
a language that allows users to state what data is needed rather than how it is retrieved
|
1 | 0 |
declarative language
|
simplify data access by requiring that users only specify what data they want to access without defining how access will be achieved
|
definitions to specify what has to be accomplished
|
1 | 0 |
network security
|
the security of computers or devices that are part of a network infrastructure
|
-how bad guys can attack computer networks -how we can defend networks against attacks -how to design architectures that are immune to attack
|
0 | 0 |
network security
|
the term used to describe how hard it is to access network data & accounts without authorisation
|
is very important consideration i the digital age . use passwords as a means of security
|
2 | 1 |
network security
|
a subset of communications security and cyber security; the protection of voice and data networking components, connections, and content
|
consists of security services that allocate access, distribute, monitor, and protect the underlying resource services
|
0 | 0 |
network security
|
a subset of communications security and cyber security; the protection of voice and data networking components, connections, and content
|
establishing security by controlling access between internal and external entities. can be through routers, switches, security hardware/software, encryption and idss
|
2 | 1 |
network security
|
all the security measures and policies taken to protect a system or network
|
ensures the protection of data and networks and must be integral in their design
|
1 | 0 |
network security
|
commonly used tech to ensure network safety
|
ensures the protection of data and networks and must be integral in their design
|
1 | 0 |
network security
|
- ensures the protection of data and networks - must be integral in the design of systems and networks - security should be planned, not an &"afterthought&"
|
all the security measures and policies taken to protect a system or network
|
1 | 0 |
network security
|
-mac limiting and filtering -802.1x -disabling unused interfaces & application service ports -rogue machine detection
|
mac address filtering discourage casual user from accessing your network, but vulnerable to hackers. should combine both encryption and authentication tech using wpa2 standard (strong password)
|
1 | 0 |
network security
|
- ensures the protection of data and networks - must be integral in the design of systems and networks - security should be planned, not an &"afterthought&"
|
commonly used tech to ensure network safety
|
2 | 1 |
network security
|
all the security measures and policies taken to protect a system or network
|
commonly used tech to ensure network safety
|
3 | 1 |
network security
|
any protection of access, misuse or hacking of files in a computer network.
|
protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system
|
1 | 0 |
parameter estimation
|
the process of using sample information to compute an interval that describes the range of parameter such as the population mean or the population percentage.
|
this is when an investigator tries to determine the actual characteristics of the population, based on measuring a subset of the population.
|
2 | 1 |
parameter estimation
|
- used to estimate a population parameter (mean, proportion, or differnce in mean between 2 groups)
|
a characteristic of a population (e.g., the mean age of all canadian citizens).
|
1 | 0 |
visual cues
|
1) position 2) length 3) angle 4) direction 5) shape 6) area 7) volume 8) color 9) shade
|
used when introducing a new skill allows athlete to see what is required to execute the skill and the result of their performance.
|
3 | 1 |
visual cues
|
body language, reading gestures, and facial expression
|
gestures- arms crossed; facial expressions- smiling; eye contact
|
0 | 0 |
visual cues
|
size and scale, weight, case, width, italics, numbers, punctuation, space, paragraph settings, use of multiple typefaces
|
used when introducing a new skill allows athlete to see what is required to execute the skill and the result of their performance.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.