Four-class labels
int64
0
3
Binary labels
int64
0
1
Entity
stringlengths
8
33
Definition1
stringlengths
15
259
Definition2
stringlengths
14
253
0
0
design principles
the way of using design elements together
perception, memory, decision, design standards (like safety diagram standards)
0
0
design principles
balance: formal balance, informal balance movement proportion white space (isolation) contrast clarity and simplicity unity continuity
scale, proportion, ballance, movement, rhythm, emphasis, unity with variety
2
1
design principles
are balance/symmetry, rhythm/pattern, movement, harmony, contrast, emphasis, proportion/scale, and unity.
balance proportion rhythm emphasis unity
1
0
access methods
sequential access and direct access - relative block numbers allow os to decide where file should be placed
sequential access (based on tape model) direct access (based on disk model)
3
1
access methods
sequential access, direct access
sequential access (based on tape model) direct access (based on disk model)
0
0
hierarchical model
early database model shaped like upside down tree with each record called segment
the relationships between records from tree like structure
1
0
hierarchical model
an early database model based on an upside-down tree structure in which each record is called a segment .
the relationships between records from tree like structure
0
0
hierarchical model
restricted network model. built like a family tree.
dbs model that uses trees as building blocks. ideal for one to many (1:m) relationships. languages in this model are somewhat hard to learn.
2
1
hierarchical model
a early database model whose basic concepts and characteristics formed the basis for subsequent database development
developed to manage data for complex manufacturing projects. basic logical structure is represented by an upside-down tree
3
1
hierarchical model
early database model shaped like upside down tree with each record called segment
an early database model based on an upside-down tree structure in which each record is called a segment .
1
0
security protocols
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
ssl (secure sockets layer) tls (transport layer security)
2
1
security protocols
rules followed in a security application (ssl, ipsec)
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
0
0
security protocols
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
rules followed in a security application (ssl, ipsec)
0
0
security protocols
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
0
0
security protocols
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
0
0
security protocols
ssl (secure sockets layer) tls (transport layer security)
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
1
0
security protocols
sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it.
ssl (secure sockets layer) tls (transport layer security)
2
1
security protocols
provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
1
0
security protocols
rules followed in a security application (ssl, ipsec)
wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses)
1
0
security protocols
rules followed in a security application (ssl, ipsec)
ssl (secure sockets layer) tls (transport layer security)
0
0
leaf nodes
predicted class
gives a classification that applies to all of the instances to reach the leaf
2
1
leaf nodes
(also called terminal nodes) of the tree contain an output variable (y) which is used to make a prediction
last nodes in tree
1
0
formal methods
used in developing computer systems are mathematically based techniques for describing system properties
mathematically-based techniques used to prove a program is correct
0
0
formal methods
mathematically-based techniques for describing system properties - also known as formal description techniques (fdts)
mathematically-based techniques used to prove a program is correct
0
0
formal methods
mathematically based techniques for describing system properties
mathematically-based techniques used to prove a program is correct
3
1
formal methods
mathematically-based techniques for describing system properties - also known as formal description techniques (fdts)
used in developing computer systems are mathematically based techniques for describing system properties
2
1
formal methods
mathematically-based techniques for specifying and developing reliable systems; used for high security and safety purposes
the use of &"mathematically rigorous techniques and tools for the specification, design and verification of software and hardware systems&"
1
0
software agents
perform tasks for users like calendaring functions and e-mail list management.
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity
1
0
software agents
perform tasks for users like calendaring functions and e-mail list management.
a program that performs information gathering, information filtering on behalf of a person
2
1
software agents
a program that performs information gathering, information filtering on behalf of a person
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity. synonymous with intelligent software agent
2
1
software agents
a program that performs information gathering, information filtering on behalf of a person
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity
0
0
software agents
perform tasks for users like calendaring functions and e-mail list management.
a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity. synonymous with intelligent software agent
2
1
type inference
compiler looks at code and infers type. let compiler infer if it is obvious, if not declare it.
allows the compiler to deduce the proper type for you automatically, instead of you having to say it.
2
1
type inference
variables don't need explicit statements about their type unlike in java. haskell can automatically tell that 1 is of type int.
allows the compiler to deduce the proper type for you automatically, instead of you having to say it.
3
1
type inference
swift uses this to determine the type of any identifier using the context given whether explicit or implicit.
swift uses this term to work out an object's type from the available information, even when the name of the type isn't explicitly put into words in code.
2
1
type inference
used to determine the type of the result of the expression evaluation
translator infers the types of variables based on the operations used
2
1
embedded systems
part of a larger mechanical or electrical system e.g. a washing machine controller
placing a computer inside of another appliance to control it such as the computer in a microwave or car
3
1
embedded systems
computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions.
a computer system with a dedicated function within a larger electrical or mechanical system. examples include smart tvs, hvac, atms and printers.
3
1
embedded systems
a computer system inside another system which uses a micro-controller eg microwave and dishwasher
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
1
0
embedded systems
systems within systems. possibly a single-purpose for specific functionality used in a larger system.
systems that are included with other systems
1
0
embedded systems
computer systems built into other devices with a dedicated function
a computer system that is built into another larger device
2
1
embedded systems
part of a larger mechanical or electrical system e.g. a washing machine controller
a computer system inside another system which uses a micro-controller eg microwave and dishwasher
2
1
embedded systems
computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions.
hardware and software systems that have a specific function within a larger system.
3
1
embedded systems
hardware and software systems that have a specific function within a larger system.
a computer system with a dedicated function within a larger electrical or mechanical system. examples include smart tvs, hvac, atms and printers.
0
0
embedded systems
purpose-built device not usually to have direct access alarm system, door security, timecard system
have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats.
1
0
embedded systems
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
part of a larger mechanical or electrical system e.g. a washing machine controller
0
0
embedded systems
computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances
purpose-built device not usually to have direct access alarm system, door security, timecard system
3
1
embedded systems
computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions.
a computer hardware and software contained within a larger system designed for a specific function
1
0
embedded systems
computer system hidden inside another device, such as a car engine management system.
have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats.
2
1
embedded systems
a computer hardware and software contained within a larger system designed for a specific function
hardware and software systems that have a specific function within a larger system.
1
0
embedded systems
computer system hidden inside another device, such as a car engine management system.
purpose-built device not usually to have direct access alarm system, door security, timecard system
2
1
embedded systems
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
2
1
embedded systems
placing a computer inside of another appliance to control it such as the computer in a microwave or car
a computer system inside another system which uses a micro-controller eg microwave and dishwasher
0
0
embedded systems
involve using specialized chips within devices that contain oss themselves and are therefore self-contained computers. with the growing iot, embedded systems create management challenges and can be difficult to patch.
involves using embedded chips that contain the os itself. the growth of the internet of things (iot) further complicates the challenges.
3
1
embedded systems
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
3
1
embedded systems
part of a larger mechanical or electrical system e.g. a washing machine controller
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
2
1
embedded systems
placing a computer inside of another appliance to control it such as the computer in a microwave or car
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
3
1
embedded systems
computer systems built into other devices with a dedicated function
usually built into other devices and are dedicated systems
2
1
embedded systems
computer systems built into other devices with a dedicated function
computer system with a dedicated function within a larger mechanical system
1
0
embedded systems
computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances
computer system hidden inside another device, such as a car engine management system.
2
1
embedded systems
a computer system that forms part of an electronic device. for a single task. very limited programming ability - only its designed function
a computer system designed to do one specific purpose.
2
1
embedded systems
-computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task
placing a computer inside of another appliance to control it such as the computer in a microwave or car
2
1
embedded systems
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task
2
1
embedded systems
a computer system that is built into another larger device
usually built into other devices and are dedicated systems
3
1
embedded systems
hardware and software systems that have a specific function within a larger system.
a computer system with a dedicated function within a larger electrical or mechanical system.
3
1
embedded systems
computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process.
placing a computer inside of another appliance to control it such as the computer in a microwave or car
0
0
embedded systems
computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances
have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats.
0
0
application programs
applications that are processed on either client or server computers
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
0
0
application programs
software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
3
1
application programs
a computer program that interacts with the database by issuing an appropriate request (typically an sql statement) to the dbms.
a computer program that interacts with the database by issuing an appropriate request to dbms
3
1
application programs
software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs
software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel
1
0
application programs
programs written to accomplish certain tasks
perform a specific task ex: word processors, spreadsheets, games -operating system runs application programs
2
1
application programs
performs a specific task- word processors, spreadsheets and games
programs written to accomplish certain tasks
3
1
application programs
performs a specific task- word processors, spreadsheets and games
perform a specific task ex: word processors, spreadsheets, games -operating system runs application programs
1
0
application programs
store, maintain, and/or use database data to accomplish business and system tasks
provide security, data consistency, and special purpose processing
1
0
application programs
software using the data
software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs
1
0
application programs
software using the data
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
1
0
application programs
software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs
define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs)
0
0
application programs
software using the data
applications that are processed on either client or server computers
1
0
application programs
software using the data
software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel
3
1
application programs
programs used to interact with database
computer programs that are used to create and maintain the database
2
1
declarative language
knowledge base is created and queries then determine facts of a problem or set of data.
often used by intelligent systems. a knowledge base is used that contains a series of related facts and rules.
2
1
declarative language
simplify data access by requiring that users only specify what data they want to access without defining how access will be achieved
a language that allows users to state what data is needed rather than how it is retrieved
1
0
declarative language
simplify data access by requiring that users only specify what data they want to access without defining how access will be achieved
definitions to specify what has to be accomplished
1
0
network security
the security of computers or devices that are part of a network infrastructure
-how bad guys can attack computer networks -how we can defend networks against attacks -how to design architectures that are immune to attack
0
0
network security
the term used to describe how hard it is to access network data & accounts without authorisation
is very important consideration i the digital age . use passwords as a means of security
2
1
network security
a subset of communications security and cyber security; the protection of voice and data networking components, connections, and content
consists of security services that allocate access, distribute, monitor, and protect the underlying resource services
0
0
network security
a subset of communications security and cyber security; the protection of voice and data networking components, connections, and content
establishing security by controlling access between internal and external entities. can be through routers, switches, security hardware/software, encryption and idss
2
1
network security
all the security measures and policies taken to protect a system or network
ensures the protection of data and networks and must be integral in their design
1
0
network security
commonly used tech to ensure network safety
ensures the protection of data and networks and must be integral in their design
1
0
network security
- ensures the protection of data and networks - must be integral in the design of systems and networks - security should be planned, not an &"afterthought&"
all the security measures and policies taken to protect a system or network
1
0
network security
-mac limiting and filtering -802.1x -disabling unused interfaces & application service ports -rogue machine detection
mac address filtering discourage casual user from accessing your network, but vulnerable to hackers. should combine both encryption and authentication tech using wpa2 standard (strong password)
1
0
network security
- ensures the protection of data and networks - must be integral in the design of systems and networks - security should be planned, not an &"afterthought&"
commonly used tech to ensure network safety
2
1
network security
all the security measures and policies taken to protect a system or network
commonly used tech to ensure network safety
3
1
network security
any protection of access, misuse or hacking of files in a computer network.
protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system
1
0
parameter estimation
the process of using sample information to compute an interval that describes the range of parameter such as the population mean or the population percentage.
this is when an investigator tries to determine the actual characteristics of the population, based on measuring a subset of the population.
2
1
parameter estimation
- used to estimate a population parameter (mean, proportion, or differnce in mean between 2 groups)
a characteristic of a population (e.g., the mean age of all canadian citizens).
1
0
visual cues
1) position 2) length 3) angle 4) direction 5) shape 6) area 7) volume 8) color 9) shade
used when introducing a new skill allows athlete to see what is required to execute the skill and the result of their performance.
3
1
visual cues
body language, reading gestures, and facial expression
gestures- arms crossed; facial expressions- smiling; eye contact
0
0
visual cues
size and scale, weight, case, width, italics, numbers, punctuation, space, paragraph settings, use of multiple typefaces
used when introducing a new skill allows athlete to see what is required to execute the skill and the result of their performance.