Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
1 | 0 | protocol stack | layering different protocols on top of one another | the set of software required to process a set of protocols at various layers |
1 | 0 | protocol stack | layering different protocols on top of one another | list of protocols used by a certain system, one protocol per layer. |
1 | 0 | protocol stack | a collection of protocols. tcp/ip is an example. the actual software that implements the protocol suite on a particular operating system. | networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol stack. |
1 | 0 | protocol stack | a collection of protocols. tcp/ip is an example. the actual software that implements the protocol suite on a particular operating system. | al known as a protocol suite and is multiple protocols that work together to provide a network service or application. |
0 | 0 | protocol stack | the set of software required to process a set of protocols at various layers | or a protocol suite, is made up of multiple protocols used to exchange information between computers |
2 | 1 | protocol stack | list of protocols used by a certain system, one protocol per layer. | or a protocol suite, is made up of multiple protocols used to exchange information between computers |
3 | 1 | protocol stack | set of software used to understand the different protocols | the set of software required to process a set of protocols at various layers |
1 | 0 | protocol stack | different layers and are stacked one of another the set of software used to understand the different protocols | or a protocol suite, is made up of multiple protocols used to exchange information between computers |
1 | 0 | protocol stack | it shows how the individual protocols within a suite are implemented | all the protocols from a protocol suite currently used to carry out specific functions of network communications within the computer. |
0 | 0 | protocol stack | set of software used to understand the different protocols | list of protocols used by a certain system, one protocol per layer. |
1 | 0 | protocol stack | the set of software required to process a set of protocols at various layers | list of protocols used by a certain system, one protocol per layer. |
3 | 1 | protocol stack | the protocols of the various layers | the collection of networking protocols that operate at the various layers |
0 | 0 | protocol stack | set of software used to understand the different protocols | or a protocol suite, is made up of multiple protocols used to exchange information between computers |
0 | 0 | small groups | -minimum of 3 people -ideal number is 5 -odd numbers usually -created to complete superordinate goals | vary in size, function as systems, maintain task-oriented goals, governed by their own norms, create their own identities, preserve member cohesiveness |
2 | 1 | small groups | are defined as any small gathering of people interacting over time in order to reach a goal. | 3 to 12 people united together around common goals and feeling a sense of belonging to their social unit |
1 | 0 | peer-to-peer network | every computer can communicate directly with every other computer. | every computer is equal and communicate with any other computer on the network that will be granted access |
3 | 1 | peer-to-peer network | peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application. | a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers. |
3 | 1 | peer-to-peer network | there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files. | a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers. |
2 | 1 | peer-to-peer network | consists of peer machines that exchange data with each other without a dedicated server | there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files. |
1 | 0 | peer-to-peer network | allows every computer to communicate with every other computer in the network. | every computer can communicate directly with every other computer. |
0 | 0 | peer-to-peer network | network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os | a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers. |
3 | 1 | peer-to-peer network | a network in which all microcomputers on the network communicate directly with one another without relying on a server. | a network relying on its interconnected computers with no use for a server. |
0 | 0 | peer-to-peer network | network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os | a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers. |
2 | 1 | peer-to-peer network | - no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually | a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers. |
2 | 1 | peer-to-peer network | when you allow workstation computers to become servers and share things in this manner, it is called a peer-to-peer network. no central authority | any network without a central file server and in which all computers in the network have access to the public files located on all other workstations |
1 | 0 | peer-to-peer network | network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os | peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application. |
1 | 0 | peer-to-peer network | each computer on this network is considered equal; no computer has ultimate control over another. | a type of network where all devices are equal and connected directly to each other |
3 | 1 | peer-to-peer network | the os of each computer on the network controls access to its resources individually, without any centralization. | a network where each computer has control of itself without a centralized admin |
3 | 1 | peer-to-peer network | consists of peer machines that exchange data with each other without a dedicated server | a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers. |
1 | 0 | peer-to-peer network | - no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually | a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers. |
0 | 0 | peer-to-peer network | network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os | there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files. |
2 | 1 | peer-to-peer network | a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers. | a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers. |
2 | 1 | peer-to-peer network | peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application. | a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers. |
1 | 0 | peer-to-peer network | a type of network that connects two client computers directly together. the systems are independent of each other and authentication is decentralized. | a peer-to-peer network, therefore, is one in which each computer node has equal abilities. # |
3 | 1 | peer-to-peer network | - no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually | network characteristics: clients share their resources with other clients, resource sharing is made available through the clients' os |
1 | 0 | peer-to-peer network | computer systems connected to each other via the internet | a network model where all computers are connected to each other and data may be shared from computer to computer. |
2 | 1 | peer-to-peer network | a peer-to-peer network, therefore, is one in which each computer node has equal abilities. # | a network in which all microcomputers on the network communicate directly with one another without relying on a server. |
0 | 0 | peer-to-peer network | network benefits: easy installation, usually cost less | network drawbacks: limited scalability, lower performance |
0 | 0 | peer-to-peer network | peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application. | there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files. |
2 | 1 | peer-to-peer network | consists of peer machines that exchange data with each other without a dedicated server | peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application. |
2 | 1 | peer-to-peer network | a type of network that connects two client computers directly together. and they can share their resources | a collection of interconnected devices (for example, pcs) which share their resources with one another. |
0 | 0 | peer-to-peer network | each computer on this network is considered equal; no computer has ultimate control over another. | - most basic, low level - a computer can be connected to another via a serial port - if multiple computers needed, then a proper network required (hub) |
0 | 0 | peer-to-peer network | - no central server, no leaders - each computer has its own functions and may share resources within the network - easy to setup - each computer maintained individually | peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. peers are equally privileged, equipotent participants in the application. |
0 | 0 | peer-to-peer network | allows interconnected devices (ie: pcs) to share their resources with one another. these resources could be for example, files or printers. | computers share resources and share equal control over resources. inexpensive and handle small amounts of info. |
2 | 1 | peer-to-peer network | a type of network that connects two client computers directly together. and they can share their resources | a type of network that connects two client computers directly together. doesnot need server software to be installed in each ones |
0 | 0 | peer-to-peer network | consists of peer machines that exchange data with each other without a dedicated server | a network type where computers act as both service providers and requestors. also referred to as workgroups and has no centralized administration. suited for networks with <= 10 computers. |
2 | 1 | peer-to-peer network | a type of network that connects two client computers directly together. the systems are independent of each other and authentication is decentralized. | a network relying on its interconnected computers with no use for a server. |
3 | 1 | peer-to-peer network | a network that has no dedicated servers. all computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers. | there is no central server, indivdual computers are connected to each other either locally or over a widea area network so they can share files. |
2 | 1 | peer-to-peer network | a collection of interconnected devices (for example, pcs) which share their resources with one another. | a type of network that connects two client computers directly together. doesnot need server software to be installed in each ones |
1 | 0 | peer-to-peer network | computer architecture in which all of the computers on a network are equal and there is no computer designated as the server. | a network model where all computers are connected to each other and data may be shared from computer to computer. |
1 | 0 | peer-to-peer network | a collection of interconnected devices (for example, pcs) which share their resources with one another. | a type of network that connects two or more host computers directly together. all computers act like clients and servers. |
2 | 1 | peer-to-peer network | a type of network that connects two client computers directly together. the systems are independent of each other and authentication is decentralized. | a network in which all microcomputers on the network communicate directly with one another without relying on a server. |
1 | 0 | peer-to-peer network | computer architecture in which all of the computers on a network are equal and there is no computer designated as the server. | computer systems connected to each other via the internet |
0 | 0 | peer-to-peer network | - most basic, low level - a computer can be connected to another via a serial port - if multiple computers needed, then a proper network required (hub) | a type of network where all devices are equal and connected directly to each other |
1 | 0 | peer-to-peer network | when a network does not have a server, all the computers are essentially equal, with programs and data distributed among them. | network of computers configured to allow certain files and folders to be shared with everyone or selected users |
1 | 0 | peer-to-peer network | a type of network that connects two client computers directly together. doesnot need server software to be installed in each ones | a type of network that connects two or more host computers directly together. all computers act like clients and servers. |
3 | 1 | 3d shape | can be measured for length, width, and height | it has three dimensions : width, length and height |
0 | 0 | software development process | requirements specification and architecture design implement and prototype testing debugging deploy and maintain | planning, analysis, design, implementation, testing and integration, maintenance |
0 | 0 | software development process | any description of software development that contains some of the nine actives listed before, organized so that together they produce tested code | in order to understand, control and improve what happens as software products are built for customers. |
1 | 0 | software development process | system that is worked through when creating a piece of software: - analysis - design - implementation - testing - documentation - evaluation - maintenance | feasibility and requirements design implementation and testing - conversion of data files installation and training maintenance |
2 | 1 | software development process | the process of dividing software development work into distinct phases to improve design, product management and project management | a framework that is used to structure, plan and control process of developing an info system |
1 | 0 | software development process | requirements specification and architecture design implement and prototype testing debugging deploy and maintain | system that is worked through when creating a piece of software: - analysis - design - implementation - testing - documentation - evaluation - maintenance |
0 | 0 | semantic web | a set of design principles that will allow computers to better index pages, topics, and subjects | allow meaning information exchange and search among machines |
0 | 0 | semantic web | - a set of design principles that will allow computers to better index web pages, topics, and subjects - enhanced search results | allow meaning information exchange and search among machines |
1 | 0 | semantic web | •will place the basic information of the web into meaningful categories •a layered connected database of information that software agents will sift through and process automatically for us. | allow meaning information exchange and search among machines |
1 | 0 | semantic web | a component of web 3.0 that provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. (w3c) | an extension of the world wide web that utilizes a variety of conventions and technologies that allow machines to understand the meaning of web content. |
2 | 1 | semantic web | an evolving extension of the web in which data is defined in such a way to make it more easily processed by computers | an evolving extension of the world wide web in which info is defined in psych a way as to make it more easily readable by computers |
1 | 0 | semantic web | - a set of design principles that will allow computers to better index web pages, topics, and subjects - enhanced search results | •will place the basic information of the web into meaningful categories •a layered connected database of information that software agents will sift through and process automatically for us. |
0 | 0 | generative model | a model like naive bayes makes use of this likelihood term, which expresses how to generate the features of a document if we knew it was of class c. | each cortical area in hierarchy makes predictions about the level below. probabilistic 'model' of each class; decision boundary: where 1 model becomes more likely; natural use of unlabeled data. |
2 | 1 | whole network | - a network viewed in it's entirety - not focused on one person | network that shows the entire population (or pre-defined part of it) even nodes that are not linked. all nodes appear |
0 | 0 | whole network | a network viewed in it's entirety (auto define) birds eye view rather than ego perspective with it's &"ego network&" all nodes appear in this network (recitation) | network that shows the entire population (or pre-defined part of it) even nodes that are not linked. all nodes appear |
2 | 1 | whole network | - a network viewed in it's entirety - not focused on one person | a network viewed in it's entirety (auto define) birds eye view rather than ego perspective with it's &"ego network&" all nodes appear in this network (recitation) |
1 | 0 | broad spectrum | -given to someone who's in danger of death -no time for testing | -e.g. tetracycline antibiotics |
0 | 0 | broad spectrum | *effective against a variety of microbes | a group of disinfectants that kill bacteria, viruses, fungi, pseudomonas, formerly known as hospital grade or level |
1 | 0 | information resources | data and other information used by businesses | the available data, technology, people, and processes within an organization to be used by the manager to perform business processes and tasks |
1 | 0 | information resources | the available data, technology, people, and processes within an organization to be used by the manager to perform business processes and tasks. information resources can either be assets or capabilities. | data and other information used by businesses |
0 | 0 | information resources | available data, technology, people, and processes within an organization to be used by the manager | data and other information used by businesses |
0 | 0 | user model | conceptual model - how the user thinks the system works | a profile of all end users of the system |
2 | 1 | hash function | turn the key that is provided into the index in the array where we want to put the data | a function that takes in the key to compute a specific hash index. |
2 | 1 | hash function | computes a bucket index from the item's key | the computation that generates a hash value from a key |
1 | 0 | hash function | a function used to manipulate the key of an element in a list to identify its location in the list | accept a key and return an output unique only to that specific key |
2 | 1 | hash function | maps search key into unique location of hash table | turn the key that is provided into the index in the array where we want to put the data |
0 | 0 | hash function | accepts an input message of any length and generates, through a one-way operation, a fixed-length output. if any part of the document is changed, a completely different function | a function that is deterministic but randomizing, i.e. whose output is a relatively small integer that appears to be a random function of the key value. |
2 | 1 | hash function | maps keys of a given type to integers in a fixed interval [0, n - 1] | a function that takes in the key to compute a specific hash index. |
2 | 1 | hash function | function used to map data of an arbitrary size/type to a fixed size and type | used to map data of arbitrary size into bit string of fixed sizes |
3 | 1 | hash function | maps search key into unique location of hash table | a function that takes in the key to compute a specific hash index. |
1 | 0 | hash function | function used to map data of an arbitrary size/type to a fixed size and type | a hash function is any function that can be used to map data of arbitrary size to data of fixed size. it is essentially used as a digital fingerprint. |
1 | 0 | hash function | a function used to manipulate the key of an element in a list to identify its location in the list | (...) is a function that takes a group of characters (called a key) and maps it to a value of a certain length. |
1 | 0 | hash function | takes data (like a string, or a file's contents) and outputs a hash, a fixed-size string or number. | takes a key, i.e. a string or integer, for a data record, scrambles it, and outputs an index to be used in a hash table |
1 | 0 | hash function | used to map data of arbitrary size into bit string of fixed sizes | a hash function is any function that can be used to map data of arbitrary size to data of fixed size. it is essentially used as a digital fingerprint. |
0 | 0 | hash function | takes an object and tells you where to put it. | the computation that generates a hash value from a key |
0 | 0 | hash function | a function used to manipulate the key of an element in a list to identify its location in the list | performs two separate functions 1) key generation 2) constrain the key to a positive value less than the size of the table |
1 | 0 | hash function | takes a key, i.e. a string or integer, for a data record, scrambles it, and outputs an index to be used in a hash table | a destructive function that throws away data from a string and outputs another string, and therefore cannot be decrypted. examples: sha1, sha256 |
1 | 0 | hash function | a function that maps data to some fixed data for access to create a table | turn the key that is provided into the index in the array where we want to put the data |
1 | 0 | hash function | accept a key and return an output unique only to that specific key | performs two separate functions 1) key generation 2) constrain the key to a positive value less than the size of the table |
3 | 1 | hash function | maps search key into unique location of hash table | a formula that provides a home position in the hash table for data |
2 | 1 | hash function | a function that maps data to some fixed data for access to create a table | a function that takes in the key to compute a specific hash index. |
2 | 1 | hash function | maps keys of a given type to integers in a fixed interval [0, n - 1] | turn the key that is provided into the index in the array where we want to put the data |
1 | 0 | hash function | maps keys of a given type to integers in a fixed interval [0, n - 1] | a function that maps data to some fixed data for access to create a table |
1 | 0 | hash function | keys of a given type to integers in a fixed range [0, n-1] the integer h(x) is the hash value of the key x | used to map keys to integer values |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.