Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
2 | 1 | access time | finding info and putting it into main memory. in terms of milliseconds. very quick | time it takes to find data on hardware and copy it into main memory |
3 | 1 | access time | the estimated time for a storage device to locate data on a disk, usually measured in milliseconds. | the time it takes a storage device to locate its stored data |
2 | 1 | access time | amount of time it takes to complete a request for data to be retrieved from storage | the time it takes a storage device to locate its stored data |
3 | 1 | access time | the amount of time it takes a storage device (1) to locate an item on a storage medium or (2) to deliver an item from memory to the processor | the time it takes a storage device to locate its stored data or the time required to deliver an item from memory to the processor |
1 | 0 | significant difference | in an experiment, a difference that is unlikely to have occurred because of chance alone. | is there a significant difference between the average mean or can the difference be explained by random chance |
1 | 0 | significant difference | a measured difference between experimental groups that is large enough that it is likely not due to chance | a difference that is unlikely to have occurred because of chance alone |
3 | 1 | significant difference | a measured difference between experimental groups that is large enough that it is likely not due to chance | a measurable difference between the groups and that, statistically, the probability of obtaining that difference by chance is very small |
1 | 0 | significant difference | a difference that is unlikely to have occurred because of chance alone | a measurable difference between the groups and that, statistically, the probability of obtaining that difference by chance is very small |
0 | 0 | significant difference | is there a significant difference between the average mean or can the difference be explained by random chance | two results are only significantly different if their difference is much larger than the estimated error. |
1 | 0 | significant difference | in an experiment, a difference that is unlikely to have occurred because of chance alone. | two results are only significantly different if their difference is much larger than the estimated error. |
2 | 1 | computer networks | two or more computers that are connected and share data and programs | set of computers connected together for the purpose of sharing resources. |
0 | 0 | computer networks | a collection of computers & devices connected together via communication devices & transmission media. | connect two or more computers |
2 | 1 | computer networks | a collection of computers & devices connected together via communication devices & transmission media. | the communications media, devices, and software needed to connect two or more computer systems or devices |
1 | 0 | xml schema | a set of statements that specifies the elements (tags), the attributes (characteristics associated | defines: 1. elements that can appear in a file 2. attributes that can appear for each element 3. default & fixed values for elements & attributes |
0 | 0 | molecular biology | the branch of biology involved with studying the structure and function of essential macromolecules (e.g. nucleic acids and proteins) | molecules that make up the cells |
2 | 1 | molecular biology | molecules that make up the cells | study individual molecules such as proteins in living cells |
0 | 0 | hash tables | conversion of large keys to small keys using hash functions. a good function is easy to compute, uniformly distributed, and less collisions. | -a hash table is a data structure that creates a mapping between keys and values. -a collision in this context is when two value compute to the same hash. |
1 | 0 | hash tables | a hash table is a data structure that stores unordered items by mapping (or hashing) each item to a location in an array (or vector). | conversion of large keys to small keys using hash functions. a good function is easy to compute, uniformly distributed, and less collisions. |
3 | 1 | extensible markup language | manages unstructured data for efficient and effective exchange of all data types. | manages unstructured data for efficient and effective exchange of structured semistructured, and unstructured data. |
3 | 1 | extensible markup language | a markup language specification developed by the world wide web consortium (w3c) that is designed to describe data and information | a new markup language specification developed by w3c that is designed to describe data and information |
3 | 1 | extensible markup language | a metalanguage used to represent and manipulate data elements. permits the manipulation of a document's data elements. | a metalanguage used to represent and manipulate data elements. unlike other markup languages, xml permits the manipulation of a document's data elements. |
1 | 0 | extensible markup language | a metalanguage used to represent and manipulate data elements in a textual format | a metalanguage used to represent and manipulate data elements. unlike other markup languages, xml permits the manipulation of a document's data elements. |
2 | 1 | extensible markup language | also called xml; a web-document tagging and formatting language that is an advance over html and that two computers can use to exchange information. | tagging language much like html used to describe data, tags are not predefined |
1 | 0 | extensible markup language | - a metalanguage used to represent and manipulate data elements - facilitates exchange of structured documents over the internet | a special language used to represent and manipulate data elements in a textual format. |
2 | 1 | extensible markup language | a metalanguage used to represent and manipulate data elements. permits the manipulation of a document's data elements. | a metalanguage used to represent and manipulate data elements in a textual format |
1 | 0 | extensible markup language | language used to manipulate data | - a metalanguage used to represent and manipulate data elements - facilitates exchange of structured documents over the internet |
1 | 0 | statistical model | find an analytical solution to a problem and predict behavior given a set of parameters and initial conditions | it is a statistical process devised to make predictions about the expected behaviour of a real world problem |
1 | 0 | statistical model | a description of an uncertain outcome using random variables that characterize sources of variation | models that use a limited number of specific variables and are expressed as mathematical equation |
1 | 0 | access points | are open areas where other devices can communicate with another. in ad hoc bss, two comps can communicate solely with each other. in infrastructure, access points are left open. | are the first line of defense, where access to a network is either granted or denied. |
1 | 0 | access points | are open areas where other devices can communicate with another. in ad hoc bss, two comps can communicate solely with each other. in infrastructure, access points are left open. | controls what devices are allowed to the network by using acl and nac. |
2 | 1 | access points | controls what devices are allowed to the network by using acl and nac. | are the first line of defense, where access to a network is either granted or denied. |
2 | 1 | fuzzy logic | method of handling imprecise or subjective info assigns 0 or 1 to vague data | ai that is a mathematical method of handeling imprecise or subjective info. assigning values. |
1 | 0 | fuzzy logic | an algorithm that can process incomplete or partially correct data to solve unstructured problems | a method of dealing with imprecise data and uncertainty, with problems that have many answers rather than one. |
2 | 1 | fuzzy logic | a technique used to designed to deal with imprecise or problematic data within an expert system. | a method of dealing with imprecise data and uncertainty, with problems that have many answers rather than one. |
0 | 0 | fuzzy logic | like boolean, but ranking from 0-1 depending on preference. also creates results table (see slide) | (2nd component of expert systems) allows approximate values and inferences as well as incomplete or ambiguous data |
2 | 1 | fuzzy logic | technique that an expert system shell uses to deal with data that is imprecise/problematic. it deals with this type of data by working with confidence levels | the technique an expert system uses to deal with imprecise data by providing for a level of confidence. |
0 | 0 | fuzzy logic | like boolean, but ranking from 0-1 depending on preference. also creates results table (see slide) | a method of reasoning that resembles human reasoning which allows for approximate values and inferences and can use incomplete or ambiguous data |
1 | 0 | fuzzy logic | a technique used to designed to deal with imprecise or problematic data within an expert system. | a technique used within an expert system to deal with imprecise data by incorporating the probability that the input information is correct. |
0 | 0 | fuzzy logic | an algorithm that can process incomplete or partially correct data to solve unstructured problems | a technique used to designed to deal with imprecise or problematic data within an expert system. |
0 | 0 | fuzzy logic | rule-based ai that tolerates imprecision by using nonspecific terms called membership functions to solve problems | ai system that classifies imprecise information and is often used in washing machines to detect moisture levels or when clothes are clean. |
2 | 1 | fuzzy logic | a method of reasoning that resembles human reasoning which allows for approximate values and inferences and can use incomplete or ambiguous data | (2nd component of expert systems) allows approximate values and inferences as well as incomplete or ambiguous data |
1 | 0 | fuzzy logic | an algorithm that can process incomplete or partially correct data to solve unstructured problems | a technique used within an expert system to deal with imprecise data by incorporating the probability that the input information is correct. |
2 | 1 | fuzzy logic | continuous truth value [0, 1]; used for expressing possibilities | branch of math that deals with uncertainties by simulating process of human reasoning. - based on degrees of truth rather than &"true or false&" |
0 | 0 | fuzzy logic | ai system that classifies imprecise information and is often used in washing machines to detect moisture levels or when clothes are clean. | rule-based ai that tolerates imprecision by using nonspecific terms called membership functions to solve problems. good for problems that require expertise (japanese subway system) |
1 | 0 | database management systems | type of software that allows organizations to more easily store, retrieve, and analyze data. | software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting |
0 | 0 | database management systems | collection of tools, features, and interfaces that enables users to add, update, manage, access content in database. advantages include timely, interactive and flexible data access | a software system that is used to create, maintain, and provide controlled access to user databases |
3 | 1 | database management systems | (dbms) the program that manages and controls the data and the interfaces between the data and the application programs that use the data stored in the database. | dbms - the application that is used to create, manipulate, and access the data in a database. |
2 | 1 | database management systems | software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting | developed to address the file system's inherent weaknesses. •a single data repository •promotes data sharing •eliminates islands of information •enforces data integrity •eliminates redundancy •promotes data security |
1 | 0 | database management systems | not a database, seperate software system and enables user to utilize database information more efficiently. | a collection of software that supports the use, creation and maintainance of databases |
1 | 0 | database management systems | software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs | developed to address the file system's inherent weaknesses. •a single data repository •promotes data sharing •eliminates islands of information •enforces data integrity •eliminates redundancy •promotes data security |
2 | 1 | database management systems | a collection of software that supports the use, creation and maintainance of databases | a software system that is used to create, maintain, and provide controlled access to user databases |
2 | 1 | database management systems | not a database, seperate software system and enables user to utilize database information more efficiently. | collection of tools, features, and interfaces that enables users to add, update, manage, access content in database. advantages include timely, interactive and flexible data access |
2 | 1 | database management systems | a set of programs that provide users with tools to create and manage a database | software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting |
3 | 1 | database management systems | a software system that is used to create, maintain, and provide controlled access to user databases | is software system that provides the tools needed to create, maintain, and use a database. |
1 | 0 | database management systems | used for parts catalog, flight schedules, employee records, search engines, grocery store prices. | keeping customer records, sales records, appointments system. |
3 | 1 | database management systems | a software system that is used to create, maintain, and provide controlled access to user databases | software system that enables users to define, create, maintain, and control access to db |
1 | 0 | database management systems | software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs | software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting |
1 | 0 | database management systems | type of software that allows organizations to more easily store, retrieve, and analyze data. | developed to address the file system's inherent weaknesses. •a single data repository •promotes data sharing •eliminates islands of information •enforces data integrity •eliminates redundancy •promotes data security |
0 | 0 | database management systems | software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs | a set of programs that provide users with tools to create and manage a database |
2 | 1 | database management systems | organize related data for easy access. | allow the user to access the data by locating, analyzing and displaying data in an organized manner. |
3 | 1 | database management systems | a software system that is used to create, maintain, and provide controlled access to user databases | software that enables users to define, create, and maintain a database and provides controlled access to the database |
1 | 0 | database management systems | collection of tools, features, and interfaces that enables users to add, update, manage, access content in database. advantages include timely, interactive and flexible data access | a collection of software that supports the use, creation and maintainance of databases |
0 | 0 | software product | one or more programs, data, and supporting materials and services satisfying client needs and desires either as an independent artifact or as an essential ingredient in some other artifact. | programs, sub-programs, libraries, data , supporting materials and services, that a client uses to solve problems |
3 | 1 | software product | programs, sub-programs, libraries, data , supporting materials and services, that a client uses to solve problems | one or more programs, sub-programs, or libraries, along with data and supporting materials and services, that a client can use to solve problems or achieve goals |
0 | 0 | software product | one or more programs, data, and supporting materials and services satisfying client needs and desires either as an independent artifact or as an essential ingredient in some other artifact. | one or more programs, sub-programs, or libraries, along with data and supporting materials and services, that a client can use to solve problems or achieve goals |
1 | 0 | digital cameras | record and store images / video in digital form. the images are electronically stored on the camera | encodes images and videos digitally and stores them in the attached memory card for later reproduction. |
0 | 0 | digital cameras | camera that saves images digitally, often in jpeg format. | encodes images and videos digitally and stores them in the attached memory card for later reproduction. |
3 | 1 | digital cameras | camera that saves images digitally, often in jpeg format. | record and store images / video in digital form. the images are electronically stored on the camera |
1 | 0 | digital cameras | this produces digital images that can be stored in a computer and displayed on screen. | encodes images and videos digitally and stores them in the attached memory card for later reproduction. |
0 | 0 | digital cameras | typically include built - in storage and support additional storage by plugging in a memory card . | can transport malware without the user's knowledge and can be a source of data leakage. |
3 | 1 | digital cameras | an imaging device that uses digital technology to capture images and store data | a mobile devices that allows user to take pictures and store them digitally |
3 | 1 | packet loss | the number of packets that are lost or damaged during transmission. can be caused by an already full output buffer. | the number of packets that are lost or damaged during transmission, sometimes a result of finite queue space |
1 | 0 | packet loss | when an arriving packet finds that a packet buffer is full the packet becomes lost | either the arriving packet or one of the already-queued packets will be dropped |
2 | 1 | packet loss | due to the buffer being finite, in the case of a full buffer the arriving or one of the already queued packets get dropped | the loss of packets. may happen due to output queue overflow. |
0 | 0 | application development | the process of using a programming language or programming environment to build an application made up of one or more programs | the process of constructing the programs and code modules that will serve as the building blocks of the information system; structured analysis, object-oriented analysis, and agile methods |
1 | 0 | application development | process of constructing the programs and code modules that serve as building blocks of the information system | the process of using a programming language or programming environment to build an application made up of one or more programs |
0 | 0 | application development | process of constructing the programs and code modules that serve as building blocks of the information system | designing, writing, documenting, and unit testing required code to enact specific functionality in compliance with a design specifications |
1 | 0 | application development | designing, writing, documenting, and unit testing required code to enact specific functionality in compliance with a design specifications | the process of constructing the programs and code modules that will serve as the building blocks of the information system; structured analysis, object-oriented analysis, and agile methods |
0 | 0 | critical path | the sequence of scheduled activites that determines the duration of the project | used to determine the earliest data a project can be finished longest path through network of activities |
1 | 0 | critical path | the combination of activities that, if any are delayed, will delay the projects finish date. | the pert path requiring the greatest amount of time to complete a project; if a critical path activity is delayed, the whole project is delayed. |
2 | 1 | critical path | - longest contiguous path through network - least amount of slack or total float | the longest path through the network diagram with the shortest possible time in which we can finish the project. |
3 | 1 | critical path | a sequence of tasks that can't be delayed without causing the entire project to be delayed | activities are ones that will delay the entire project if they are late or delayed is called |
2 | 1 | critical path | the longest path; determines expected project duration | longest path through the network, describes the minimum duration of a project |
3 | 1 | critical path | the combination of activities that, if any are delayed, will delay the projects finish date. | activities are ones that will delay the entire project if they are late or delayed is called |
1 | 0 | critical path | a sequence of tasks that can't be delayed without causing the entire project to be delayed | the pert path requiring the greatest amount of time to complete a project; if a critical path activity is delayed, the whole project is delayed. |
0 | 0 | critical path | in a pert chart, the sequence of tasks that takes the shortest time to complete. | in a pert network, the sequence of tasks that takes the longest time to complete the path requiring the greatest amount of time |
3 | 1 | critical path | used to determine the earliest data a project can be finished longest path through network of activities | longest path through a network diagram that determines the earliest completion of a project |
0 | 0 | critical path | activities that, if delayed, would delay the entire project. | the pert path requiring the greatest amount of time to complete a project; if a critical path activity is delayed, the whole project is delayed. |
2 | 1 | critical path | the total project time established by the path with the longest total required time. | in a pert chart, the path with the greatest total duration time that represents the longest amount of time required to complete the total project |
2 | 1 | critical path | the total project time established by the path with the longest total required time. | duration of each activity determined, and the path with the greatest total duration determines the total time for the project. |
1 | 0 | critical path | in a pert chart, the sequence of tasks that takes the shortest time to complete. | longest amount of time to complete the project |
2 | 1 | critical path | generally, but not always, the sequence of schedule activities that determines the duration of the project. it is the longest path through the project. see also critical path methodology. | the sequence of activities that represents the longest path through a project, which determines the shortest possible duration |
3 | 1 | critical path | the tasks which must be completed on time for a project to complete on time | a sequence of activities that must be completed on time for the whole project to be complete by the agreed time |
3 | 1 | critical path | the sequence of tasks that must be started and finished on time to meet the project's deadline. | the tasks which must be completed on time for a project to complete on time |
2 | 1 | critical path | longest path through a network minimum project completion time | longest sequential path of interrelated activities in the network and shows the minimum completion time for the project |
3 | 1 | critical path | a path from the start to the finish that passes through all the tasks that are crucial to completing the project in the shortest amount of time. | estimates shortest path through the project ensuring all critical tasks are completed from start to finish |
3 | 1 | critical path | the series of tasks whose scheduling directly affects the project's finish date | a series of tasks which, if delayed, would affect the completion date of the overall project |
2 | 1 | critical path | a sequence of tasks that can't be delayed without causing the entire project to be delayed | activities that, if delayed, would delay the entire project. |
2 | 1 | critical path | used to determine the earliest data a project can be finished longest path through network of activities | sequence of activities that determine the earliest date by which the project can be accomplished |
3 | 1 | critical path | the combination of activities that, if any are delayed, will delay the projects finish date. | activities that, if delayed, would delay the entire project. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.