Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
0 | 0 | virtual memory | splits processes up and swaps parts in and out of memory (uses both disk space and main memory) | space on a hard disk or other storage device that simulates random access memory; typically used as an applications address space on machines that have it implemented. |
0 | 0 | virtual memory | when ram is full the operating system uses storage on the hard disk drive as an extension to ram. very slow to read / write data. | hard drive space that is used as temporary ram |
2 | 1 | virtual memory | a part of a hard disk used to store overflow data from ram. | the space on the hard drive where the operating system stores data if there isn't enough ram |
0 | 0 | virtual memory | online secondary memory that is used as an extension of primary memory, giving appearance of larger internal memory | separate the address in a running program (virtual address) and the address in real or primary memory (real address) |
2 | 1 | virtual memory | space on a hard disk or other storage device that simulates random access memory; typically used as an applications address space on machines that have it implemented. | space on a hard disk or other storage device is used as main memory (ram) - allows the execution of process that is not completely in the memory |
3 | 1 | virtual memory | an area of secondary storage that allows the user to run programs when there is insufficient ram. | part of the hard drive (secondary storage) used as an overflow when there is insufficient space in ram. |
2 | 1 | virtual memory | the space used on the hard drive used as ram when ram is full instructions and data for all running programs are loaded in ram. | the space used on the hard drive used as ram when ram is full is called: |
2 | 1 | virtual memory | splits processes up and swaps parts in and out of memory (uses both disk space and main memory) | space on a hard disk or other storage device is used as main memory (ram) - allows the execution of process that is not completely in the memory |
2 | 1 | virtual memory | virtual memory is part of the hard drive used as an extension to ram (used when you run out of space on the ram) | the space used on the hard drive used as ram when ram is full is called: |
0 | 0 | virtual memory | online secondary memory that is used as an extension of primary memory, giving appearance of larger internal memory | a storage allocation scheme in which secondary memory can be addressed as though it were a part of main memory. |
3 | 1 | virtual memory | allocate space on the hard disk to supplement the immediate, functional memory capacity of ram. | memory that allocates space in secondary storage to supplement the immediate, functional memory capacity of ram |
1 | 0 | virtual memory | separate the address in a running program (virtual address) and the address in real or primary memory (real address) | the use of secondary storage devices as an extension of the primary storage of the computer, thus giving the appearance of a larger main memory than actually exists. |
1 | 0 | virtual memory | when the ram runs out of space, the cpu can designate part of the hard disk as acting like ram and will be treated as such | the space used on the hard drive used as ram when ram is full is called: |
1 | 0 | virtual memory | when ram is full the operating system uses storage on the hard disk drive as an extension to ram. very slow to read / write data. | the space on the hard drive where the operating system stores data if there isn't enough ram |
1 | 0 | virtual memory | allows a program to run with only a subset of its assigned address space in main memory | -early schemes required the entire program be loaded into main memory -programs had to be loaded into contiguous memory locations -modern memory management solves these problems |
0 | 0 | time dimension | research into processes that occur over time presents social challenges that can be addressed through cross-sectional studies or longitudinal studies. | the point or points in time at which a variable is measured |
1 | 0 | dynamic data | data that changes or is updated, e.g. data that can be written back or edited | data that changes automatically without user intervention it is data that updates as a result of the source data changing. eg,weather map live sports results on a website |
2 | 1 | dynamic data | data that changes or is updated, e.g. data that can be written back or edited | data that updates as a result of the source data changing. |
0 | 0 | dynamic data | data that changes or is updated, e.g. data that can be written back or edited | data that changes automatically without user intervention. |
0 | 0 | dynamic data | 1) must be continually updated. 2) may change after it is recorded | changes automatically during creation |
0 | 0 | dynamic data | changes automatically during creation | data that may change after it is recorded, and has to be continually updated. |
1 | 0 | keyword search | looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading. | looks for words in any file or record in the internet. |
2 | 1 | keyword search | searches a word or phrase, including basic boolean operators | a type of search that looks for matching documents that contain one or more words specified by the user. |
0 | 0 | keyword search | you enter one or more keywords into the engine, and the search engine finds specific topics by locating those keywords or phrases in registered web pages. | uses specific terms to search databases. |
2 | 1 | keyword search | finds matching word anywhere in record | this is the type of search our catalog does, it looks for your word in every part of the catalog |
3 | 1 | keyword search | you enter one or more keywords into the engine, and the search engine finds specific topics by locating those keywords or phrases in registered web pages. | users enter keywords in a search engine to query an index. they are then compared to the keywords and if they match, the search engine will provide the indexed information. |
1 | 0 | keyword search | looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading. | a type of search that looks for matching documents that contain one or more words specified by the user. |
1 | 0 | keyword search | looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading. | searches a word or phrase, including basic boolean operators |
1 | 0 | keyword search | searches a word or phrase, including basic boolean operators | looks for words in any file or record in the internet. |
2 | 1 | loss function | loss incurred for predicting y when correct answer is t | given the truth (y) and the system's prediction (y-hat), it measures the error. |
1 | 0 | loss function | penalty for incorrect classification of an instance. usually calculated as mean squared error. | calculates the error or loss, typically the difference between the predicted value and the actual value |
1 | 0 | loss function | measures how far what f does is fropm the obsererved data d | a function to model the cost of a particular error. eg. error ^ 2. |
0 | 0 | access control model | a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications. | standards that provide a predefined framework for hardware or software developers. |
2 | 1 | access control model | this term is used to describe a framework that dictates how subjects access objects or how objects access objects | dictates how subjects access objects or the other way around |
2 | 1 | access control model | a model that provides a predefined framework for hardware and software developers who need to implement access control functionality in their devices or applications. | a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications. |
2 | 1 | access control model | a predefined framework that the custodian can use for controlling access. | a predefined framework found in hardware and software that a custodian can use for controlling access. |
0 | 0 | necessary conditions | right (requirements) | b is a necessary condition for z only when the absence of b means z cannot occur. |
1 | 0 | design phase | physical process model, physical data model, architecture/hardware, interface, data storage and program design; designing program to meet user requirements | develop and evaluate alternatives configure and structure new system hardware design software design database design process and job descriptions created |
1 | 0 | design phase | this is when infrastructure upgrade requirements, network communication capacity, hardware and software procurement requirements, software development, and data acquisition needs must be identified. | will determine how the system will operate in terms of hardware, software, ui, databases, etc |
2 | 1 | design phase | architectural design break down into components detailed design | - architectural design - detailed design - &"how the product does it&" |
3 | 1 | design phase | decides how the system will operate, in terms of the hardware, software, and network infrastructure. | will determine how the system will operate in terms of hardware, software, ui, databases, etc |
2 | 1 | design phase | involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation. | establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation -design technical architecture -design system models |
0 | 0 | security policy | a broad general statement of management's intent to protect organization assets | a senior leadership directive that indicates the direction or intent of its established goals, and assign responsibilities for, addressing security risks to an organization. |
2 | 1 | security policy | is a document that states, in writing, how a company plans to protect the company's physical and network assets. | written document that states how an organization plans to protect the company's it assets |
0 | 0 | security policy | a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources. | the document that details exactly how your organization and its data are secured. |
2 | 1 | security policy | a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources. | a high-level document describing the principles, approach, and major objectives of the organization regarding security. |
2 | 1 | security policy | written document that states how an organization plans to protect the company's it assets | a written document that describes how a system, organization, or other entity is secured. |
3 | 1 | security policy | a written document that states how an organization plans to protect the company's information technology assets is a: | a written document that describes how a system, organization, or other entity is secured. |
3 | 1 | security policy | a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets | statements that prioritize info risk, identify acceptable risks and identify mechanisms for reducing risks |
2 | 1 | security policy | the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. | a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources. |
3 | 1 | security policy | is a document that states, in writing, how a company plans to protect the company's physical and network assets. | a written document that describes how a system, organization, or other entity is secured. |
2 | 1 | security policy | the document that details exactly how your organization and its data are secured. | a high-level document describing the principles, approach, and major objectives of the organization regarding security. |
3 | 1 | security policy | a written statement describing assets to be protected, the reasons for protecting the assets, the parties responsible for protection, and acceptable and unacceptable behaviors. | written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not. |
2 | 1 | security policy | statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals. | statements that prioritize info risk, identify acceptable risks and identify mechanisms for reducing risks |
3 | 1 | security policy | a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets | statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals. |
2 | 1 | data privacy | making sure that data is protected against unauthorized access | requirement for data to be available only to authorized users |
1 | 0 | data privacy | concerned with controlling the distribution of data collected from customers, suppliers, and employees. | ensuring an employee accesses the minimum amount of data necessary to complete their job |
3 | 1 | data privacy | protecting the privacy of the data located in a database. | addresses protecting the privacy of personal data stored in the databases |
0 | 0 | data privacy | the need to preserve and protect personal information collected by any organization from being accessed by a third party | the aspect of it that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties |
0 | 0 | data privacy | a company must tell an individual how personal information will be protected and limits placed on how the data will be shared | information that is protected and business respect except in the claims and privacy policy |
1 | 0 | data privacy | a company must tell an individual how personal information will be protected and limits placed on how the data will be shared | a branch of data security concerned with the proper handling of data - consent, notice, and regulatory obligations |
3 | 1 | data privacy | making sure that data is protected against unauthorized access | requirement for data to be available only to authorised users. keeps data private rather than to the public domain. |
1 | 0 | object-oriented databases | store objects • every object is an instance of a class. • the class includes the data and the operations. | -store information in objects rather than in tables -store instructions for how to compute the data as well as the data to be processed -use object query language |
1 | 0 | object-oriented databases | store objects • every object is an instance of a class. • the class includes the data and the operations. | stores objects that contain procedures w/ data instead of storing records in tables + hierarchies |
2 | 1 | position paper | explains your opinion on a specific issue or topic based on logical support | it describes a position on an issue and the rationale for that position. the position paper is based on facts that provide a solid foundation of your argument. |
1 | 0 | position paper | has the power to change the opinion and attitudes of other | essential tool in bringing about social change |
1 | 0 | position paper | explains your opinion on a specific issue or topic based on logical support | • presents one's stand or viewpoint • starting your arguments and proposed course of action |
0 | 0 | position paper | is used to claim a one-side position on a specific issue. | • presents one's stand or viewpoint • starting your arguments and proposed course of action |
1 | 0 | position paper | explains your opinion on a specific issue or topic based on logical support | is used to claim a one-side position on a specific issue. |
0 | 0 | position paper | it describes a position on an issue and the rationale for that position. the position paper is based on facts that provide a solid foundation of your argument. | • presents one's stand or viewpoint • starting your arguments and proposed course of action |
1 | 0 | parallel programming | multiple work units executing at the same time, can be done with or without multiple processors | programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors |
2 | 1 | parallel programming | multiple work units executing at the same time, can be done with or without multiple processors | a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines |
1 | 0 | parallel programming | multiple work units executing at the same time, can be done with or without multiple processors | divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task |
0 | 0 | parallel programming | programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors | divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task |
3 | 1 | parallel programming | multiple work units executing at the same time, can be done with or without multiple processors | when multiple tasks are executed at the same time (or almost the same time). one or more cpus. |
2 | 1 | parallel programming | a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines | divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task |
2 | 1 | parallel programming | when multiple tasks are executed at the same time (or almost the same time). one or more cpus. | divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task |
1 | 0 | parallel programming | programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors | a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines |
2 | 1 | parallel programming | when multiple tasks are executed at the same time (or almost the same time). one or more cpus. | a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines |
0 | 0 | parallel programming | programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors | when multiple tasks are executed at the same time (or almost the same time). one or more cpus. |
1 | 0 | time synchronization | ntpsec is secure network time protocol and adds onto ntp | the process of obtaining the exact same time on multiple hosts or network time protocol (ntp) |
1 | 0 | time synchronization | ntpsec is secure network time protocol and adds onto ntp | the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication. |
3 | 1 | time synchronization | use case for obtaining the exact same time on multiple hosts using network time protocol (ntp) as a secure protocol. | the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication. |
2 | 1 | time synchronization | all server sending data to the siem should be synchronized with the same time. easier to know when the events occured | the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol. |
1 | 0 | time synchronization | the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol. | feature of a siem that makes sure all products are synced up so they are running with the same timestamps. |
0 | 0 | time synchronization | the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication. | network time protocol ( ntp ) works over udp on port 123 time critical services such as authentication, logging, and task scheduling/backup |
2 | 1 | time synchronization | the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time. | the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol. |
2 | 1 | time synchronization | the process of obtaining the exact same time on different devices. | all server sending data to the siem should be synchronized with the same time. easier to know when the events occured |
3 | 1 | time synchronization | use case for obtaining the exact same time on multiple hosts using network time protocol (ntp) as a secure protocol. | the process of obtaining the exact same time on multiple hosts or network time protocol (ntp) |
2 | 1 | time synchronization | the process of obtaining the exact same time on different devices. | the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time. |
2 | 1 | time synchronization | all server sending data to the siem should be synchronized with the same time. easier to know when the events occured | feature of a siem that makes sure all products are synced up so they are running with the same timestamps. |
2 | 1 | time synchronization | the process of obtaining the exact same time on different devices. | feature of a siem that makes sure all products are synced up so they are running with the same timestamps. |
2 | 1 | time synchronization | the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time. | feature of a siem that makes sure all products are synced up so they are running with the same timestamps. |
2 | 1 | main ideas | the most important ideas about a topic that a writer wants to communicate to readers; most of the time is directly stated in the topic sentence | the most important or central thought of a paragraph or larger section of text, which tells the reader what the text is about |
0 | 0 | basic concepts | - more specific than superordinate concepts (i.e. single-family home vs. superordinate home) | bracken, boehm |
1 | 0 | basic concepts | smaller and more specific than superordinate but less spacific than subordinate | - more specific than superordinate concepts (i.e. single-family home vs. superordinate home) |
1 | 0 | business rules | -rules organization follows when operating a business -implemented within business processes -sometimes simple and straight forward -sometimes not so simple and straight forward | describe the conditions that must be met when taking actions or making decisions within a work task. |
0 | 0 | business rules | concise statements that are derived from a precise and detailed description of the organization's data environment business rules determine connectives and cardinalities | a succinct statement of a constraint on business processes that provides the logic that guides the behavior of the business in specific situations |
0 | 0 | business rules | specifications that preserve the integrity of the logical data model. | - descriptions of policies, procedures, or principles within a specific organization - descriptions of operations to create/enforce actions - describe characteristics of data as viewed by the company |
1 | 0 | business rules | a succinct statement of a constraint on business processes that provides the logic that guides the behavior of the business in specific situations | - descriptions of policies, procedures, or principles within a specific organization - descriptions of operations to create/enforce actions - describe characteristics of data as viewed by the company |
Subsets and Splits