Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
2 | 1 |
access time
|
finding info and putting it into main memory. in terms of milliseconds. very quick
|
time it takes to find data on hardware and copy it into main memory
|
3 | 1 |
access time
|
the estimated time for a storage device to locate data on a disk, usually measured in milliseconds.
|
the time it takes a storage device to locate its stored data
|
2 | 1 |
access time
|
amount of time it takes to complete a request for data to be retrieved from storage
|
the time it takes a storage device to locate its stored data
|
3 | 1 |
access time
|
the amount of time it takes a storage device (1) to locate an item on a storage medium or (2) to deliver an item from memory to the processor
|
the time it takes a storage device to locate its stored data or the time required to deliver an item from memory to the processor
|
1 | 0 |
significant difference
|
in an experiment, a difference that is unlikely to have occurred because of chance alone.
|
is there a significant difference between the average mean or can the difference be explained by random chance
|
1 | 0 |
significant difference
|
a measured difference between experimental groups that is large enough that it is likely not due to chance
|
a difference that is unlikely to have occurred because of chance alone
|
3 | 1 |
significant difference
|
a measured difference between experimental groups that is large enough that it is likely not due to chance
|
a measurable difference between the groups and that, statistically, the probability of obtaining that difference by chance is very small
|
1 | 0 |
significant difference
|
a difference that is unlikely to have occurred because of chance alone
|
a measurable difference between the groups and that, statistically, the probability of obtaining that difference by chance is very small
|
0 | 0 |
significant difference
|
is there a significant difference between the average mean or can the difference be explained by random chance
|
two results are only significantly different if their difference is much larger than the estimated error.
|
1 | 0 |
significant difference
|
in an experiment, a difference that is unlikely to have occurred because of chance alone.
|
two results are only significantly different if their difference is much larger than the estimated error.
|
2 | 1 |
computer networks
|
two or more computers that are connected and share data and programs
|
set of computers connected together for the purpose of sharing resources.
|
0 | 0 |
computer networks
|
a collection of computers & devices connected together via communication devices & transmission media.
|
connect two or more computers
|
2 | 1 |
computer networks
|
a collection of computers & devices connected together via communication devices & transmission media.
|
the communications media, devices, and software needed to connect two or more computer systems or devices
|
1 | 0 |
xml schema
|
a set of statements that specifies the elements (tags), the attributes (characteristics associated
|
defines: 1. elements that can appear in a file 2. attributes that can appear for each element 3. default & fixed values for elements & attributes
|
0 | 0 |
molecular biology
|
the branch of biology involved with studying the structure and function of essential macromolecules (e.g. nucleic acids and proteins)
|
molecules that make up the cells
|
2 | 1 |
molecular biology
|
molecules that make up the cells
|
study individual molecules such as proteins in living cells
|
0 | 0 |
hash tables
|
conversion of large keys to small keys using hash functions. a good function is easy to compute, uniformly distributed, and less collisions.
|
-a hash table is a data structure that creates a mapping between keys and values. -a collision in this context is when two value compute to the same hash.
|
1 | 0 |
hash tables
|
a hash table is a data structure that stores unordered items by mapping (or hashing) each item to a location in an array (or vector).
|
conversion of large keys to small keys using hash functions. a good function is easy to compute, uniformly distributed, and less collisions.
|
3 | 1 |
extensible markup language
|
manages unstructured data for efficient and effective exchange of all data types.
|
manages unstructured data for efficient and effective exchange of structured semistructured, and unstructured data.
|
3 | 1 |
extensible markup language
|
a markup language specification developed by the world wide web consortium (w3c) that is designed to describe data and information
|
a new markup language specification developed by w3c that is designed to describe data and information
|
3 | 1 |
extensible markup language
|
a metalanguage used to represent and manipulate data elements. permits the manipulation of a document's data elements.
|
a metalanguage used to represent and manipulate data elements. unlike other markup languages, xml permits the manipulation of a document's data elements.
|
1 | 0 |
extensible markup language
|
a metalanguage used to represent and manipulate data elements in a textual format
|
a metalanguage used to represent and manipulate data elements. unlike other markup languages, xml permits the manipulation of a document's data elements.
|
2 | 1 |
extensible markup language
|
also called xml; a web-document tagging and formatting language that is an advance over html and that two computers can use to exchange information.
|
tagging language much like html used to describe data, tags are not predefined
|
1 | 0 |
extensible markup language
|
- a metalanguage used to represent and manipulate data elements - facilitates exchange of structured documents over the internet
|
a special language used to represent and manipulate data elements in a textual format.
|
2 | 1 |
extensible markup language
|
a metalanguage used to represent and manipulate data elements. permits the manipulation of a document's data elements.
|
a metalanguage used to represent and manipulate data elements in a textual format
|
1 | 0 |
extensible markup language
|
language used to manipulate data
|
- a metalanguage used to represent and manipulate data elements - facilitates exchange of structured documents over the internet
|
1 | 0 |
statistical model
|
find an analytical solution to a problem and predict behavior given a set of parameters and initial conditions
|
it is a statistical process devised to make predictions about the expected behaviour of a real world problem
|
1 | 0 |
statistical model
|
a description of an uncertain outcome using random variables that characterize sources of variation
|
models that use a limited number of specific variables and are expressed as mathematical equation
|
1 | 0 |
access points
|
are open areas where other devices can communicate with another. in ad hoc bss, two comps can communicate solely with each other. in infrastructure, access points are left open.
|
are the first line of defense, where access to a network is either granted or denied.
|
1 | 0 |
access points
|
are open areas where other devices can communicate with another. in ad hoc bss, two comps can communicate solely with each other. in infrastructure, access points are left open.
|
controls what devices are allowed to the network by using acl and nac.
|
2 | 1 |
access points
|
controls what devices are allowed to the network by using acl and nac.
|
are the first line of defense, where access to a network is either granted or denied.
|
2 | 1 |
fuzzy logic
|
method of handling imprecise or subjective info assigns 0 or 1 to vague data
|
ai that is a mathematical method of handeling imprecise or subjective info. assigning values.
|
1 | 0 |
fuzzy logic
|
an algorithm that can process incomplete or partially correct data to solve unstructured problems
|
a method of dealing with imprecise data and uncertainty, with problems that have many answers rather than one.
|
2 | 1 |
fuzzy logic
|
a technique used to designed to deal with imprecise or problematic data within an expert system.
|
a method of dealing with imprecise data and uncertainty, with problems that have many answers rather than one.
|
0 | 0 |
fuzzy logic
|
like boolean, but ranking from 0-1 depending on preference. also creates results table (see slide)
|
(2nd component of expert systems) allows approximate values and inferences as well as incomplete or ambiguous data
|
2 | 1 |
fuzzy logic
|
technique that an expert system shell uses to deal with data that is imprecise/problematic. it deals with this type of data by working with confidence levels
|
the technique an expert system uses to deal with imprecise data by providing for a level of confidence.
|
0 | 0 |
fuzzy logic
|
like boolean, but ranking from 0-1 depending on preference. also creates results table (see slide)
|
a method of reasoning that resembles human reasoning which allows for approximate values and inferences and can use incomplete or ambiguous data
|
1 | 0 |
fuzzy logic
|
a technique used to designed to deal with imprecise or problematic data within an expert system.
|
a technique used within an expert system to deal with imprecise data by incorporating the probability that the input information is correct.
|
0 | 0 |
fuzzy logic
|
an algorithm that can process incomplete or partially correct data to solve unstructured problems
|
a technique used to designed to deal with imprecise or problematic data within an expert system.
|
0 | 0 |
fuzzy logic
|
rule-based ai that tolerates imprecision by using nonspecific terms called membership functions to solve problems
|
ai system that classifies imprecise information and is often used in washing machines to detect moisture levels or when clothes are clean.
|
2 | 1 |
fuzzy logic
|
a method of reasoning that resembles human reasoning which allows for approximate values and inferences and can use incomplete or ambiguous data
|
(2nd component of expert systems) allows approximate values and inferences as well as incomplete or ambiguous data
|
1 | 0 |
fuzzy logic
|
an algorithm that can process incomplete or partially correct data to solve unstructured problems
|
a technique used within an expert system to deal with imprecise data by incorporating the probability that the input information is correct.
|
2 | 1 |
fuzzy logic
|
continuous truth value [0, 1]; used for expressing possibilities
|
branch of math that deals with uncertainties by simulating process of human reasoning. - based on degrees of truth rather than &"true or false&"
|
0 | 0 |
fuzzy logic
|
ai system that classifies imprecise information and is often used in washing machines to detect moisture levels or when clothes are clean.
|
rule-based ai that tolerates imprecision by using nonspecific terms called membership functions to solve problems. good for problems that require expertise (japanese subway system)
|
1 | 0 |
database management systems
|
type of software that allows organizations to more easily store, retrieve, and analyze data.
|
software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting
|
0 | 0 |
database management systems
|
collection of tools, features, and interfaces that enables users to add, update, manage, access content in database. advantages include timely, interactive and flexible data access
|
a software system that is used to create, maintain, and provide controlled access to user databases
|
3 | 1 |
database management systems
|
(dbms) the program that manages and controls the data and the interfaces between the data and the application programs that use the data stored in the database.
|
dbms - the application that is used to create, manipulate, and access the data in a database.
|
2 | 1 |
database management systems
|
software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting
|
developed to address the file system's inherent weaknesses. •a single data repository •promotes data sharing •eliminates islands of information •enforces data integrity •eliminates redundancy •promotes data security
|
1 | 0 |
database management systems
|
not a database, seperate software system and enables user to utilize database information more efficiently.
|
a collection of software that supports the use, creation and maintainance of databases
|
1 | 0 |
database management systems
|
software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs
|
developed to address the file system's inherent weaknesses. •a single data repository •promotes data sharing •eliminates islands of information •enforces data integrity •eliminates redundancy •promotes data security
|
2 | 1 |
database management systems
|
a collection of software that supports the use, creation and maintainance of databases
|
a software system that is used to create, maintain, and provide controlled access to user databases
|
2 | 1 |
database management systems
|
not a database, seperate software system and enables user to utilize database information more efficiently.
|
collection of tools, features, and interfaces that enables users to add, update, manage, access content in database. advantages include timely, interactive and flexible data access
|
2 | 1 |
database management systems
|
a set of programs that provide users with tools to create and manage a database
|
software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting
|
3 | 1 |
database management systems
|
a software system that is used to create, maintain, and provide controlled access to user databases
|
is software system that provides the tools needed to create, maintain, and use a database.
|
1 | 0 |
database management systems
|
used for parts catalog, flight schedules, employee records, search engines, grocery store prices.
|
keeping customer records, sales records, appointments system.
|
3 | 1 |
database management systems
|
a software system that is used to create, maintain, and provide controlled access to user databases
|
software system that enables users to define, create, maintain, and control access to db
|
1 | 0 |
database management systems
|
software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs
|
software used to manage the additions, updates, and deletions of data as transactions occur, and to support data queries and reporting
|
1 | 0 |
database management systems
|
type of software that allows organizations to more easily store, retrieve, and analyze data.
|
developed to address the file system's inherent weaknesses. •a single data repository •promotes data sharing •eliminates islands of information •enforces data integrity •eliminates redundancy •promotes data security
|
0 | 0 |
database management systems
|
software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs
|
a set of programs that provide users with tools to create and manage a database
|
2 | 1 |
database management systems
|
organize related data for easy access.
|
allow the user to access the data by locating, analyzing and displaying data in an organized manner.
|
3 | 1 |
database management systems
|
a software system that is used to create, maintain, and provide controlled access to user databases
|
software that enables users to define, create, and maintain a database and provides controlled access to the database
|
1 | 0 |
database management systems
|
collection of tools, features, and interfaces that enables users to add, update, manage, access content in database. advantages include timely, interactive and flexible data access
|
a collection of software that supports the use, creation and maintainance of databases
|
0 | 0 |
software product
|
one or more programs, data, and supporting materials and services satisfying client needs and desires either as an independent artifact or as an essential ingredient in some other artifact.
|
programs, sub-programs, libraries, data , supporting materials and services, that a client uses to solve problems
|
3 | 1 |
software product
|
programs, sub-programs, libraries, data , supporting materials and services, that a client uses to solve problems
|
one or more programs, sub-programs, or libraries, along with data and supporting materials and services, that a client can use to solve problems or achieve goals
|
0 | 0 |
software product
|
one or more programs, data, and supporting materials and services satisfying client needs and desires either as an independent artifact or as an essential ingredient in some other artifact.
|
one or more programs, sub-programs, or libraries, along with data and supporting materials and services, that a client can use to solve problems or achieve goals
|
1 | 0 |
digital cameras
|
record and store images / video in digital form. the images are electronically stored on the camera
|
encodes images and videos digitally and stores them in the attached memory card for later reproduction.
|
0 | 0 |
digital cameras
|
camera that saves images digitally, often in jpeg format.
|
encodes images and videos digitally and stores them in the attached memory card for later reproduction.
|
3 | 1 |
digital cameras
|
camera that saves images digitally, often in jpeg format.
|
record and store images / video in digital form. the images are electronically stored on the camera
|
1 | 0 |
digital cameras
|
this produces digital images that can be stored in a computer and displayed on screen.
|
encodes images and videos digitally and stores them in the attached memory card for later reproduction.
|
0 | 0 |
digital cameras
|
typically include built - in storage and support additional storage by plugging in a memory card .
|
can transport malware without the user's knowledge and can be a source of data leakage.
|
3 | 1 |
digital cameras
|
an imaging device that uses digital technology to capture images and store data
|
a mobile devices that allows user to take pictures and store them digitally
|
3 | 1 |
packet loss
|
the number of packets that are lost or damaged during transmission. can be caused by an already full output buffer.
|
the number of packets that are lost or damaged during transmission, sometimes a result of finite queue space
|
1 | 0 |
packet loss
|
when an arriving packet finds that a packet buffer is full the packet becomes lost
|
either the arriving packet or one of the already-queued packets will be dropped
|
2 | 1 |
packet loss
|
due to the buffer being finite, in the case of a full buffer the arriving or one of the already queued packets get dropped
|
the loss of packets. may happen due to output queue overflow.
|
0 | 0 |
application development
|
the process of using a programming language or programming environment to build an application made up of one or more programs
|
the process of constructing the programs and code modules that will serve as the building blocks of the information system; structured analysis, object-oriented analysis, and agile methods
|
1 | 0 |
application development
|
process of constructing the programs and code modules that serve as building blocks of the information system
|
the process of using a programming language or programming environment to build an application made up of one or more programs
|
0 | 0 |
application development
|
process of constructing the programs and code modules that serve as building blocks of the information system
|
designing, writing, documenting, and unit testing required code to enact specific functionality in compliance with a design specifications
|
1 | 0 |
application development
|
designing, writing, documenting, and unit testing required code to enact specific functionality in compliance with a design specifications
|
the process of constructing the programs and code modules that will serve as the building blocks of the information system; structured analysis, object-oriented analysis, and agile methods
|
0 | 0 |
critical path
|
the sequence of scheduled activites that determines the duration of the project
|
used to determine the earliest data a project can be finished longest path through network of activities
|
1 | 0 |
critical path
|
the combination of activities that, if any are delayed, will delay the projects finish date.
|
the pert path requiring the greatest amount of time to complete a project; if a critical path activity is delayed, the whole project is delayed.
|
2 | 1 |
critical path
|
- longest contiguous path through network - least amount of slack or total float
|
the longest path through the network diagram with the shortest possible time in which we can finish the project.
|
3 | 1 |
critical path
|
a sequence of tasks that can't be delayed without causing the entire project to be delayed
|
activities are ones that will delay the entire project if they are late or delayed is called
|
2 | 1 |
critical path
|
the longest path; determines expected project duration
|
longest path through the network, describes the minimum duration of a project
|
3 | 1 |
critical path
|
the combination of activities that, if any are delayed, will delay the projects finish date.
|
activities are ones that will delay the entire project if they are late or delayed is called
|
1 | 0 |
critical path
|
a sequence of tasks that can't be delayed without causing the entire project to be delayed
|
the pert path requiring the greatest amount of time to complete a project; if a critical path activity is delayed, the whole project is delayed.
|
0 | 0 |
critical path
|
in a pert chart, the sequence of tasks that takes the shortest time to complete.
|
in a pert network, the sequence of tasks that takes the longest time to complete the path requiring the greatest amount of time
|
3 | 1 |
critical path
|
used to determine the earliest data a project can be finished longest path through network of activities
|
longest path through a network diagram that determines the earliest completion of a project
|
0 | 0 |
critical path
|
activities that, if delayed, would delay the entire project.
|
the pert path requiring the greatest amount of time to complete a project; if a critical path activity is delayed, the whole project is delayed.
|
2 | 1 |
critical path
|
the total project time established by the path with the longest total required time.
|
in a pert chart, the path with the greatest total duration time that represents the longest amount of time required to complete the total project
|
2 | 1 |
critical path
|
the total project time established by the path with the longest total required time.
|
duration of each activity determined, and the path with the greatest total duration determines the total time for the project.
|
1 | 0 |
critical path
|
in a pert chart, the sequence of tasks that takes the shortest time to complete.
|
longest amount of time to complete the project
|
2 | 1 |
critical path
|
generally, but not always, the sequence of schedule activities that determines the duration of the project. it is the longest path through the project. see also critical path methodology.
|
the sequence of activities that represents the longest path through a project, which determines the shortest possible duration
|
3 | 1 |
critical path
|
the tasks which must be completed on time for a project to complete on time
|
a sequence of activities that must be completed on time for the whole project to be complete by the agreed time
|
3 | 1 |
critical path
|
the sequence of tasks that must be started and finished on time to meet the project's deadline.
|
the tasks which must be completed on time for a project to complete on time
|
2 | 1 |
critical path
|
longest path through a network minimum project completion time
|
longest sequential path of interrelated activities in the network and shows the minimum completion time for the project
|
3 | 1 |
critical path
|
a path from the start to the finish that passes through all the tasks that are crucial to completing the project in the shortest amount of time.
|
estimates shortest path through the project ensuring all critical tasks are completed from start to finish
|
3 | 1 |
critical path
|
the series of tasks whose scheduling directly affects the project's finish date
|
a series of tasks which, if delayed, would affect the completion date of the overall project
|
2 | 1 |
critical path
|
a sequence of tasks that can't be delayed without causing the entire project to be delayed
|
activities that, if delayed, would delay the entire project.
|
2 | 1 |
critical path
|
used to determine the earliest data a project can be finished longest path through network of activities
|
sequence of activities that determine the earliest date by which the project can be accomplished
|
3 | 1 |
critical path
|
the combination of activities that, if any are delayed, will delay the projects finish date.
|
activities that, if delayed, would delay the entire project.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.