Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
0 | 0 | design principles | the way of using design elements together | perception, memory, decision, design standards (like safety diagram standards) |
0 | 0 | design principles | balance: formal balance, informal balance movement proportion white space (isolation) contrast clarity and simplicity unity continuity | scale, proportion, ballance, movement, rhythm, emphasis, unity with variety |
2 | 1 | design principles | are balance/symmetry, rhythm/pattern, movement, harmony, contrast, emphasis, proportion/scale, and unity. | balance proportion rhythm emphasis unity |
1 | 0 | access methods | sequential access and direct access - relative block numbers allow os to decide where file should be placed | sequential access (based on tape model) direct access (based on disk model) |
3 | 1 | access methods | sequential access, direct access | sequential access (based on tape model) direct access (based on disk model) |
0 | 0 | hierarchical model | early database model shaped like upside down tree with each record called segment | the relationships between records from tree like structure |
1 | 0 | hierarchical model | an early database model based on an upside-down tree structure in which each record is called a segment . | the relationships between records from tree like structure |
0 | 0 | hierarchical model | restricted network model. built like a family tree. | dbs model that uses trees as building blocks. ideal for one to many (1:m) relationships. languages in this model are somewhat hard to learn. |
2 | 1 | hierarchical model | a early database model whose basic concepts and characteristics formed the basis for subsequent database development | developed to manage data for complex manufacturing projects. basic logical structure is represented by an upside-down tree |
3 | 1 | hierarchical model | early database model shaped like upside down tree with each record called segment | an early database model based on an upside-down tree structure in which each record is called a segment . |
1 | 0 | security protocols | provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication | ssl (secure sockets layer) tls (transport layer security) |
2 | 1 | security protocols | rules followed in a security application (ssl, ipsec) | provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication |
0 | 0 | security protocols | sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it. | rules followed in a security application (ssl, ipsec) |
0 | 0 | security protocols | sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it. | wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses) |
0 | 0 | security protocols | sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it. | provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication |
0 | 0 | security protocols | ssl (secure sockets layer) tls (transport layer security) | wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses) |
1 | 0 | security protocols | sets of rules and standards that allow computers to exchange information such that the information is not visible to those who are not allowed to view it. | ssl (secure sockets layer) tls (transport layer security) |
2 | 1 | security protocols | provide a variety of security services such as the encryption of data. this is to ensure confidentiality, data integrity, and can provide end-point authentication | wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses) |
1 | 0 | security protocols | rules followed in a security application (ssl, ipsec) | wired equivalent privacy (wep), wi-fi protected access (wpa), 802.11i (wpa2, also newest/most secure), mac address filtering (permits owner to provide a list of mac addresses) |
1 | 0 | security protocols | rules followed in a security application (ssl, ipsec) | ssl (secure sockets layer) tls (transport layer security) |
0 | 0 | leaf nodes | predicted class | gives a classification that applies to all of the instances to reach the leaf |
2 | 1 | leaf nodes | (also called terminal nodes) of the tree contain an output variable (y) which is used to make a prediction | last nodes in tree |
1 | 0 | formal methods | used in developing computer systems are mathematically based techniques for describing system properties | mathematically-based techniques used to prove a program is correct |
0 | 0 | formal methods | mathematically-based techniques for describing system properties - also known as formal description techniques (fdts) | mathematically-based techniques used to prove a program is correct |
0 | 0 | formal methods | mathematically based techniques for describing system properties | mathematically-based techniques used to prove a program is correct |
3 | 1 | formal methods | mathematically-based techniques for describing system properties - also known as formal description techniques (fdts) | used in developing computer systems are mathematically based techniques for describing system properties |
2 | 1 | formal methods | mathematically-based techniques for specifying and developing reliable systems; used for high security and safety purposes | the use of &"mathematically rigorous techniques and tools for the specification, design and verification of software and hardware systems&" |
1 | 0 | software agents | perform tasks for users like calendaring functions and e-mail list management. | a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity |
1 | 0 | software agents | perform tasks for users like calendaring functions and e-mail list management. | a program that performs information gathering, information filtering on behalf of a person |
2 | 1 | software agents | a program that performs information gathering, information filtering on behalf of a person | a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity. synonymous with intelligent software agent |
2 | 1 | software agents | a program that performs information gathering, information filtering on behalf of a person | a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity |
0 | 0 | software agents | perform tasks for users like calendaring functions and e-mail list management. | a program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity. synonymous with intelligent software agent |
2 | 1 | type inference | compiler looks at code and infers type. let compiler infer if it is obvious, if not declare it. | allows the compiler to deduce the proper type for you automatically, instead of you having to say it. |
2 | 1 | type inference | variables don't need explicit statements about their type unlike in java. haskell can automatically tell that 1 is of type int. | allows the compiler to deduce the proper type for you automatically, instead of you having to say it. |
3 | 1 | type inference | swift uses this to determine the type of any identifier using the context given whether explicit or implicit. | swift uses this term to work out an object's type from the available information, even when the name of the type isn't explicitly put into words in code. |
2 | 1 | type inference | used to determine the type of the result of the expression evaluation | translator infers the types of variables based on the operations used |
2 | 1 | embedded systems | part of a larger mechanical or electrical system e.g. a washing machine controller | placing a computer inside of another appliance to control it such as the computer in a microwave or car |
3 | 1 | embedded systems | computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions. | a computer system with a dedicated function within a larger electrical or mechanical system. examples include smart tvs, hvac, atms and printers. |
3 | 1 | embedded systems | a computer system inside another system which uses a micro-controller eg microwave and dishwasher | computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task |
1 | 0 | embedded systems | systems within systems. possibly a single-purpose for specific functionality used in a larger system. | systems that are included with other systems |
1 | 0 | embedded systems | computer systems built into other devices with a dedicated function | a computer system that is built into another larger device |
2 | 1 | embedded systems | part of a larger mechanical or electrical system e.g. a washing machine controller | a computer system inside another system which uses a micro-controller eg microwave and dishwasher |
2 | 1 | embedded systems | computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions. | hardware and software systems that have a specific function within a larger system. |
3 | 1 | embedded systems | hardware and software systems that have a specific function within a larger system. | a computer system with a dedicated function within a larger electrical or mechanical system. examples include smart tvs, hvac, atms and printers. |
0 | 0 | embedded systems | purpose-built device not usually to have direct access alarm system, door security, timecard system | have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats. |
1 | 0 | embedded systems | -computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task | part of a larger mechanical or electrical system e.g. a washing machine controller |
0 | 0 | embedded systems | computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances | purpose-built device not usually to have direct access alarm system, door security, timecard system |
3 | 1 | embedded systems | computer system with a dedicated function within a larger electrical or mechanical system. often stripped versions. | a computer hardware and software contained within a larger system designed for a specific function |
1 | 0 | embedded systems | computer system hidden inside another device, such as a car engine management system. | have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats. |
2 | 1 | embedded systems | a computer hardware and software contained within a larger system designed for a specific function | hardware and software systems that have a specific function within a larger system. |
1 | 0 | embedded systems | computer system hidden inside another device, such as a car engine management system. | purpose-built device not usually to have direct access alarm system, door security, timecard system |
2 | 1 | embedded systems | -computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task | computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task |
2 | 1 | embedded systems | placing a computer inside of another appliance to control it such as the computer in a microwave or car | a computer system inside another system which uses a micro-controller eg microwave and dishwasher |
0 | 0 | embedded systems | involve using specialized chips within devices that contain oss themselves and are therefore self-contained computers. with the growing iot, embedded systems create management challenges and can be difficult to patch. | involves using embedded chips that contain the os itself. the growth of the internet of things (iot) further complicates the challenges. |
3 | 1 | embedded systems | -computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task | computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process. |
3 | 1 | embedded systems | part of a larger mechanical or electrical system e.g. a washing machine controller | computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process. |
2 | 1 | embedded systems | placing a computer inside of another appliance to control it such as the computer in a microwave or car | computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task |
3 | 1 | embedded systems | computer systems built into other devices with a dedicated function | usually built into other devices and are dedicated systems |
2 | 1 | embedded systems | computer systems built into other devices with a dedicated function | computer system with a dedicated function within a larger mechanical system |
1 | 0 | embedded systems | computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances | computer system hidden inside another device, such as a car engine management system. |
2 | 1 | embedded systems | a computer system that forms part of an electronic device. for a single task. very limited programming ability - only its designed function | a computer system designed to do one specific purpose. |
2 | 1 | embedded systems | -computers built in another device -control systems -monitor and control machinery (eg dishwasher embedded system could control temp) -dedicated to single task | placing a computer inside of another appliance to control it such as the computer in a microwave or car |
2 | 1 | embedded systems | computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process. | computers built into other devices example: dishwasher, fridge freezer often control systems dedicated to a single task |
2 | 1 | embedded systems | a computer system that is built into another larger device | usually built into other devices and are dedicated systems |
3 | 1 | embedded systems | hardware and software systems that have a specific function within a larger system. | a computer system with a dedicated function within a larger electrical or mechanical system. |
3 | 1 | embedded systems | computer systems built into larger systems for control or other purposes. for example, a cnc (computer numeric control) router includes a computer that controls the cutting process. | placing a computer inside of another appliance to control it such as the computer in a microwave or car |
0 | 0 | embedded systems | computer implemented as part of a larger system. ex: network attached/enabled devices: printers, hvac controllers, medical devices, smart appliances | have embedded operating systems in the. must be up to date and patched. point of sale (pos) terminals to thermostats. |
0 | 0 | application programs | applications that are processed on either client or server computers | define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs) |
0 | 0 | application programs | software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel | define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs) |
3 | 1 | application programs | a computer program that interacts with the database by issuing an appropriate request (typically an sql statement) to the dbms. | a computer program that interacts with the database by issuing an appropriate request to dbms |
3 | 1 | application programs | software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs | software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel |
1 | 0 | application programs | programs written to accomplish certain tasks | perform a specific task ex: word processors, spreadsheets, games -operating system runs application programs |
2 | 1 | application programs | performs a specific task- word processors, spreadsheets and games | programs written to accomplish certain tasks |
3 | 1 | application programs | performs a specific task- word processors, spreadsheets and games | perform a specific task ex: word processors, spreadsheets, games -operating system runs application programs |
1 | 0 | application programs | store, maintain, and/or use database data to accomplish business and system tasks | provide security, data consistency, and special purpose processing |
1 | 0 | application programs | software using the data | software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs |
1 | 0 | application programs | software using the data | define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs) |
1 | 0 | application programs | software designed to serve a specific set of requirements with a specific set of type of data ex. microsoft, powerpoint, google docs | define the ways in which the system resources are used to solve the computer problems of the users (compilers, database systems, video games, business programs) |
0 | 0 | application programs | software using the data | applications that are processed on either client or server computers |
1 | 0 | application programs | software using the data | software designed to serve a specific set of requirements with a specific set or type of data. erpcrm, word, excel |
3 | 1 | application programs | programs used to interact with database | computer programs that are used to create and maintain the database |
2 | 1 | declarative language | knowledge base is created and queries then determine facts of a problem or set of data. | often used by intelligent systems. a knowledge base is used that contains a series of related facts and rules. |
2 | 1 | declarative language | simplify data access by requiring that users only specify what data they want to access without defining how access will be achieved | a language that allows users to state what data is needed rather than how it is retrieved |
1 | 0 | declarative language | simplify data access by requiring that users only specify what data they want to access without defining how access will be achieved | definitions to specify what has to be accomplished |
1 | 0 | network security | the security of computers or devices that are part of a network infrastructure | -how bad guys can attack computer networks -how we can defend networks against attacks -how to design architectures that are immune to attack |
0 | 0 | network security | the term used to describe how hard it is to access network data & accounts without authorisation | is very important consideration i the digital age . use passwords as a means of security |
2 | 1 | network security | a subset of communications security and cyber security; the protection of voice and data networking components, connections, and content | consists of security services that allocate access, distribute, monitor, and protect the underlying resource services |
0 | 0 | network security | a subset of communications security and cyber security; the protection of voice and data networking components, connections, and content | establishing security by controlling access between internal and external entities. can be through routers, switches, security hardware/software, encryption and idss |
2 | 1 | network security | all the security measures and policies taken to protect a system or network | ensures the protection of data and networks and must be integral in their design |
1 | 0 | network security | commonly used tech to ensure network safety | ensures the protection of data and networks and must be integral in their design |
1 | 0 | network security | - ensures the protection of data and networks - must be integral in the design of systems and networks - security should be planned, not an &"afterthought&" | all the security measures and policies taken to protect a system or network |
1 | 0 | network security | -mac limiting and filtering -802.1x -disabling unused interfaces & application service ports -rogue machine detection | mac address filtering discourage casual user from accessing your network, but vulnerable to hackers. should combine both encryption and authentication tech using wpa2 standard (strong password) |
1 | 0 | network security | - ensures the protection of data and networks - must be integral in the design of systems and networks - security should be planned, not an &"afterthought&" | commonly used tech to ensure network safety |
2 | 1 | network security | all the security measures and policies taken to protect a system or network | commonly used tech to ensure network safety |
3 | 1 | network security | any protection of access, misuse or hacking of files in a computer network. | protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system |
1 | 0 | parameter estimation | the process of using sample information to compute an interval that describes the range of parameter such as the population mean or the population percentage. | this is when an investigator tries to determine the actual characteristics of the population, based on measuring a subset of the population. |
2 | 1 | parameter estimation | - used to estimate a population parameter (mean, proportion, or differnce in mean between 2 groups) | a characteristic of a population (e.g., the mean age of all canadian citizens). |
1 | 0 | visual cues | 1) position 2) length 3) angle 4) direction 5) shape 6) area 7) volume 8) color 9) shade | used when introducing a new skill allows athlete to see what is required to execute the skill and the result of their performance. |
3 | 1 | visual cues | body language, reading gestures, and facial expression | gestures- arms crossed; facial expressions- smiling; eye contact |
0 | 0 | visual cues | size and scale, weight, case, width, italics, numbers, punctuation, space, paragraph settings, use of multiple typefaces | used when introducing a new skill allows athlete to see what is required to execute the skill and the result of their performance. |
Subsets and Splits