Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
2 | 1 |
data compression
|
taking data and packaging it into a smaller size (ex: zip, jpeg, mp3)
|
reducing the file size while maintaining the contained information
|
2 | 1 |
data compression
|
reducing the amount of space needed to store a piece of data/bandwidth to transmit it (ex. zip files)
|
compression reduces the volume of data to reduce image processing, transmission times, bandwidth requirements, and storage needs
|
2 | 1 |
data compression
|
involves encoding information using fewer bits than the original representation
|
the process of reducing the number of bits required to represent a sound or image.
|
1 | 0 |
data compression
|
the process of shrinking the size of a file by removing data or recoding it more efficiently
|
process of encoding data to take up less storage space and bandwidth for transmission, by finding repeatable patterns of 0's and 1's, enables info to be dispersed faster
|
3 | 1 |
data compression
|
when the bit structure of a file is manipulated to make the file size smaller. done using algorithms. algorithm - a step by step set of instruction.
|
bit structure of a file is manipulated in such a way that the data in a file will become smaller in size uses compression algorithms
|
2 | 1 |
data compression
|
encoding digital information using less bits than the original works by finding & eliminating or rewriting statistical redundancies
|
process of encoding information using fewer bits than the original representation
|
2 | 1 |
data compression
|
making a message smaller so it transmits more quickly
|
making a file smaller to make it easier to deal with
|
3 | 1 |
data compression
|
reduction of bits by encoding data using fewer bits than the original representation.
|
process of encoding information using fewer bits than the original representation
|
2 | 1 |
data compression
|
used to reduce file sizes. fits more files onto storage devices / faster transmission over networks
|
process of encoding data to take up less storage space and bandwidth for transmission, by finding repeatable patterns of 0's and 1's, enables info to be dispersed faster
|
1 | 0 |
data compression
|
the process of shrinking the size of a file by removing data or recoding it more efficiently
|
used to reduce file sizes. fits more files onto storage devices / faster transmission over networks
|
2 | 1 |
data compression
|
reducing the amount of space needed to store a piece of data/bandwidth to transmit it (ex. zip files)
|
used to reduce file sizes. fits more files onto storage devices / faster transmission over networks
|
1 | 0 |
data compression
|
is the process of storing information using less storage space by reducing the number of bits it takes up.
|
process of reducing memory of storage required by large files
|
2 | 1 |
large scale
|
a relatively small ratio between map units and ground units. this usually has higher resolution and covers much smaller regions and show more detail
|
features are larger because map is more zoomed in.
|
0 | 0 |
large scale
|
refers to maps on which objects are relatively large
|
1:10,000 small area detail large representative fraction
|
1 | 0 |
large scale
|
a relatively small ratio between map units and ground units. this usually has higher resolution and covers much smaller regions and show more detail
|
refers to maps on which objects are relatively large
|
1 | 0 |
large scale
|
features are larger because map is more zoomed in.
|
small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods
|
2 | 1 |
large scale
|
generally, a map scale that shows a small area on the ground at a high level of detail.
|
refers to maps on which objects are relatively large
|
1 | 0 |
large scale
|
generally, a map scale that shows a small area on the ground at a high level of detail.
|
large scale = small area ex. school map
|
0 | 0 |
large scale
|
refers to maps on which objects are relatively large
|
a relatively small ratio between map units and ground units. large-scale maps usually have higher resolution and cover much smaller regions than small-scale maps. (large amounts of detail)
|
1 | 0 |
large scale
|
features are larger because map is more zoomed in.
|
large scale = small area ex. school map
|
1 | 0 |
large scale
|
large scale = small area ex. school map
|
small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods
|
2 | 1 |
large scale
|
features are larger because map is more zoomed in.
|
refers to maps on which objects are relatively large
|
0 | 0 |
large scale
|
less pronounced distortion due to projection
|
less generalization and closer to reality
|
1 | 0 |
large scale
|
a relatively small ratio between map units and ground units. this usually has higher resolution and covers much smaller regions and show more detail
|
1:10,000 small area detail large representative fraction
|
0 | 0 |
large scale
|
1:10,000 small area detail large representative fraction
|
small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods
|
0 | 0 |
large scale
|
refers to maps on which objects are relatively large
|
small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods
|
2 | 1 |
large scale
|
large scale = small area ex. school map
|
a relatively small ratio between map units and ground units. large-scale maps usually have higher resolution and cover much smaller regions than small-scale maps. (large amounts of detail)
|
1 | 0 |
large scale
|
features are larger because map is more zoomed in.
|
generally, a map scale that shows a small area on the ground at a high level of detail.
|
1 | 0 |
black box
|
the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker
|
attacker has no knowledge of the network environment (external attack)
|
0 | 0 |
black box
|
blind test of system
|
attacker has no knowledge of the network environment (external attack)
|
2 | 1 |
black box
|
having no information about the system or environment when performing a penetration test
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
0 | 0 |
black box
|
testing where only the inputs and outputs of a software module are tested without examining the inner working of the software
|
a process of testing where operations or actions are unknown or unspecified, can test for features not implemented.
|
1 | 0 |
black box
|
internals are hidden (eg 3rd party library); access only through documented external interfaces.
|
testing the software from an external perspective, i.e., with no prior knowledge of the software; only binary executable or intermediate byte code is available for analysis
|
3 | 1 |
black box
|
a test conducted when the assessor has no information or knowledge about the inner workings of the system or knowledge of the source code.
|
the assessor has no knowledge of the inner workings of the system or the source code.
|
2 | 1 |
black box
|
having no information about the system or environment when performing a penetration test
|
pentester knows nothing about systems under attack &"blind&"
|
3 | 1 |
black box
|
having no information about the system or environment when performing a penetration test
|
no prior knowledge of the system or network to be assessed
|
3 | 1 |
black box
|
outsider attack, attacker has no knowledge of the network environment
|
attacker has no knowledge of the network environment (external attack)
|
3 | 1 |
black box
|
the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker
|
testers have no knowledge of environment, just like an attacker
|
3 | 1 |
black box
|
testers conduct their work without any knowledge of the target environment.
|
a test method conducted when the assessor has no information or knowledge about the inner workings of the system or knowledge of the source code
|
1 | 0 |
black box
|
this term describes any mechanism that accepts input, performs some operation that cannot be seen on the input, and produces output.
|
a device that can be used solely in terms of input and output with regard to how it works.
|
1 | 0 |
black box
|
outsider attack, attacker has no knowledge of the network environment
|
no prior knowledge of the system or network to be assessed
|
3 | 1 |
black box
|
an analogy that programmers use to refer to hidden method implementation details.
|
the analogy that programmers use to refer to the details of hidden methods.
|
2 | 1 |
black box
|
a &"blind&" test the pentester knows nothing about the systems
|
testers have zero knowledge of the environment prior to starting a test. instead they approach the test with the same knowledge as an attacker.
|
0 | 0 |
black box
|
having no information about the system or environment when performing a penetration test
|
attacker has no knowledge of the network environment (external attack)
|
0 | 0 |
black box
|
outsider attack, attacker has no knowledge of the network environment
|
test without knowledge of system internals.
|
1 | 0 |
black box
|
test without knowledge of system internals.
|
having no information about the system or environment when performing a penetration test
|
3 | 1 |
black box
|
any device you can use without knowing how it works internally
|
a device you can use without understanding how it works.
|
1 | 0 |
black box
|
device, system, or object viewed in terms of input/output without any knowledge of its internal workings and a well explained interface ex) phone, tv, fridge
|
a term used to indicate any component of a computer-based system for whih the user need not to know the details of its internal operations
|
1 | 0 |
black box
|
you can examine what goes in and out of the method, but not the details of how it works inside.
|
an analogy that programmers use to refer to hidden method implementation details.
|
2 | 1 |
black box
|
no prior knowledge of the system or network to be assessed
|
pentester knows nothing about systems under attack &"blind&"
|
2 | 1 |
black box
|
blind test of system
|
testers have no knowledge of environment, just like an attacker
|
3 | 1 |
black box
|
blind test of system
|
test without knowledge of system internals.
|
2 | 1 |
black box
|
the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker
|
test without knowledge of system internals.
|
0 | 0 |
black box
|
users test; functionality, user input validation, output results and transitions and boundary cases
|
any component of a system for which the user need not know the details of its internal operation
|
2 | 1 |
black box
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
pentester knows nothing about systems under attack &"blind&"
|
3 | 1 |
black box
|
a &"blind&" test the pentester knows nothing about the systems
|
a test where the tester has no knowledge of the network and systems being tested.
|
2 | 1 |
black box
|
manipulates line voltage for toll free calls
|
phreaking tool used to manipulate line voltages to steal long-distance service.
|
1 | 0 |
black box
|
blind test of system
|
pentester knows nothing about systems under attack &"blind&"
|
3 | 1 |
black box
|
testers have no knowledge of environment, just like an attacker
|
having no information about the system or environment when performing a penetration test
|
1 | 0 |
black box
|
the tester has no prior knowledge of the network infrastructure being tested. most closely mimics an attack from outside the organization
|
tester knows nothing of the network
|
3 | 1 |
black box
|
test without knowledge of the code
|
used to test the software without knowing the internal structure of code of program
|
2 | 1 |
black box
|
the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker
|
no prior knowledge of the system or network to be assessed
|
2 | 1 |
black box
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
attacker has no knowledge of the network environment (external attack)
|
3 | 1 |
black box
|
the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker
|
having no information about the system or environment when performing a penetration test
|
1 | 0 |
black box
|
attacker has no knowledge of the network environment (external attack)
|
pentester knows nothing about systems under attack &"blind&"
|
2 | 1 |
black box
|
outsider attack, attacker has no knowledge of the network environment
|
pentester knows nothing about systems under attack &"blind&"
|
1 | 0 |
black box
|
outsider attack, attacker has no knowledge of the network environment
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
2 | 1 |
black box
|
blind test of system
|
the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker
|
2 | 1 |
black box
|
it can be viewed only in terms of its input and output, without any knowledge of its internal workings
|
a device, system or object in computing which can be viewed in terms of its inputs and outputs, without requiring any knowledge of its internal workings.
|
3 | 1 |
black box
|
a device, system or object in computing which can be viewed in terms of its inputs and outputs, without requiring any knowledge of its internal workings.
|
a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings.
|
2 | 1 |
black box
|
testers have no knowledge of environment, just like an attacker
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
3 | 1 |
black box
|
blind test of system
|
no prior knowledge of the system or network to be assessed
|
3 | 1 |
black box
|
testers have no knowledge of environment, just like an attacker
|
no prior knowledge of the system or network to be assessed
|
2 | 1 |
black box
|
blind test of system
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
1 | 0 |
black box
|
testers have no knowledge of environment, just like an attacker
|
attacker has no knowledge of the network environment (external attack)
|
2 | 1 |
black box
|
a system that can not be directly observed or easily undeestood
|
a system that is not easily observed
|
2 | 1 |
black box
|
test without knowledge of system internals.
|
pentester knows nothing about systems under attack &"blind&"
|
3 | 1 |
black box
|
the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
1 | 0 |
black box
|
blind test of system
|
having no information about the system or environment when performing a penetration test
|
3 | 1 |
black box
|
(penetration test) a penetration test in which the tester has no prior knowledge of the network infrastructure that is being tested.
|
a test where the tester has no knowledge of the network and systems being tested.
|
0 | 0 |
black box
|
aka functional testing. carried out independently of the code used in the program. makes sure the program functions to the specified requirements.
|
test without knowledge of the code
|
2 | 1 |
black box
|
you can examine what goes in and out of the method, but not the details of how it works inside.
|
the analogy that programmers use to refer to the details of hidden methods.
|
2 | 1 |
black box
|
outsider attack, attacker has no knowledge of the network environment
|
testers have no knowledge of environment, just like an attacker
|
2 | 1 |
black box
|
where you do not know how inputs are being transformed into outputs
|
a metaphor for a process or action that produces results in a non-transparent or non-observable manner.
|
1 | 0 |
black box
|
blind test of system
|
outsider attack, attacker has no knowledge of the network environment
|
3 | 1 |
black box
|
a test where the tester has no knowledge of the network and systems being tested.
|
testers have zero knowledge of the environment prior to starting a test. instead they approach the test with the same knowledge as an attacker.
|
2 | 1 |
black box
|
a type of penetration test. testers have zero knowledge of the environment prior to starting the test.
|
a test where the tester has no knowledge of the network and systems being tested.
|
0 | 0 |
black box
|
no prior knowledge of the system or network to be assessed
|
no knowledge of the system, tester is operating as if they were an outside attacker
|
2 | 1 |
black box
|
it can be viewed only in terms of its input and output, without any knowledge of its internal workings
|
a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings.
|
2 | 1 |
black box
|
testing where only the inputs and outputs of a software module are tested without examining the inner working of the software
|
users test; functionality, user input validation, output results and transitions and boundary cases
|
0 | 0 |
black box
|
a complex system that cannot be directly observed and easily understood
|
occurs when an evaluation of program outcomes ignores, and does not identify, the process by which the program produced the effect
|
0 | 0 |
black box
|
a process of testing where operations or actions are unknown or unspecified, can test for features not implemented.
|
any component of a system for which the user need not know the details of its internal operation
|
2 | 1 |
black box
|
(penetration test) a penetration test in which the tester has no prior knowledge of the network infrastructure that is being tested.
|
a type of penetration test. testers have zero knowledge of the environment prior to starting the test.
|
0 | 0 |
black box
|
test without knowledge of system internals.
|
attacker has no knowledge of the network environment (external attack)
|
3 | 1 |
black box
|
testers have no knowledge of environment, just like an attacker
|
pentester knows nothing about systems under attack &"blind&"
|
1 | 0 |
black box
|
test without knowledge of system internals.
|
no prior knowledge of the system or network to be assessed
|
1 | 0 |
markup language
|
a language used to describe the content and structure of a document
|
the most common language for defining the structure and layout of web pages
|
2 | 1 |
markup language
|
series of commands used to format and organize a website
|
a series of commands used to format, organize and describe information on a webpage.
|
2 | 1 |
markup language
|
a language that uses tags to annotate the information in a document.
|
lets you annotate text to define how it should be displayed.
|
1 | 0 |
markup language
|
a document language that contains tags that describe a document's content and appearance.
|
the most common language for defining the structure and layout of web pages
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.