Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
0 | 0 |
virtual memory
|
splits processes up and swaps parts in and out of memory (uses both disk space and main memory)
|
space on a hard disk or other storage device that simulates random access memory; typically used as an applications address space on machines that have it implemented.
|
0 | 0 |
virtual memory
|
when ram is full the operating system uses storage on the hard disk drive as an extension to ram. very slow to read / write data.
|
hard drive space that is used as temporary ram
|
2 | 1 |
virtual memory
|
a part of a hard disk used to store overflow data from ram.
|
the space on the hard drive where the operating system stores data if there isn't enough ram
|
0 | 0 |
virtual memory
|
online secondary memory that is used as an extension of primary memory, giving appearance of larger internal memory
|
separate the address in a running program (virtual address) and the address in real or primary memory (real address)
|
2 | 1 |
virtual memory
|
space on a hard disk or other storage device that simulates random access memory; typically used as an applications address space on machines that have it implemented.
|
space on a hard disk or other storage device is used as main memory (ram) - allows the execution of process that is not completely in the memory
|
3 | 1 |
virtual memory
|
an area of secondary storage that allows the user to run programs when there is insufficient ram.
|
part of the hard drive (secondary storage) used as an overflow when there is insufficient space in ram.
|
2 | 1 |
virtual memory
|
the space used on the hard drive used as ram when ram is full instructions and data for all running programs are loaded in ram.
|
the space used on the hard drive used as ram when ram is full is called:
|
2 | 1 |
virtual memory
|
splits processes up and swaps parts in and out of memory (uses both disk space and main memory)
|
space on a hard disk or other storage device is used as main memory (ram) - allows the execution of process that is not completely in the memory
|
2 | 1 |
virtual memory
|
virtual memory is part of the hard drive used as an extension to ram (used when you run out of space on the ram)
|
the space used on the hard drive used as ram when ram is full is called:
|
0 | 0 |
virtual memory
|
online secondary memory that is used as an extension of primary memory, giving appearance of larger internal memory
|
a storage allocation scheme in which secondary memory can be addressed as though it were a part of main memory.
|
3 | 1 |
virtual memory
|
allocate space on the hard disk to supplement the immediate, functional memory capacity of ram.
|
memory that allocates space in secondary storage to supplement the immediate, functional memory capacity of ram
|
1 | 0 |
virtual memory
|
separate the address in a running program (virtual address) and the address in real or primary memory (real address)
|
the use of secondary storage devices as an extension of the primary storage of the computer, thus giving the appearance of a larger main memory than actually exists.
|
1 | 0 |
virtual memory
|
when the ram runs out of space, the cpu can designate part of the hard disk as acting like ram and will be treated as such
|
the space used on the hard drive used as ram when ram is full is called:
|
1 | 0 |
virtual memory
|
when ram is full the operating system uses storage on the hard disk drive as an extension to ram. very slow to read / write data.
|
the space on the hard drive where the operating system stores data if there isn't enough ram
|
1 | 0 |
virtual memory
|
allows a program to run with only a subset of its assigned address space in main memory
|
-early schemes required the entire program be loaded into main memory -programs had to be loaded into contiguous memory locations -modern memory management solves these problems
|
0 | 0 |
time dimension
|
research into processes that occur over time presents social challenges that can be addressed through cross-sectional studies or longitudinal studies.
|
the point or points in time at which a variable is measured
|
1 | 0 |
dynamic data
|
data that changes or is updated, e.g. data that can be written back or edited
|
data that changes automatically without user intervention it is data that updates as a result of the source data changing. eg,weather map live sports results on a website
|
2 | 1 |
dynamic data
|
data that changes or is updated, e.g. data that can be written back or edited
|
data that updates as a result of the source data changing.
|
0 | 0 |
dynamic data
|
data that changes or is updated, e.g. data that can be written back or edited
|
data that changes automatically without user intervention.
|
0 | 0 |
dynamic data
|
1) must be continually updated. 2) may change after it is recorded
|
changes automatically during creation
|
0 | 0 |
dynamic data
|
changes automatically during creation
|
data that may change after it is recorded, and has to be continually updated.
|
1 | 0 |
keyword search
|
looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading.
|
looks for words in any file or record in the internet.
|
2 | 1 |
keyword search
|
searches a word or phrase, including basic boolean operators
|
a type of search that looks for matching documents that contain one or more words specified by the user.
|
0 | 0 |
keyword search
|
you enter one or more keywords into the engine, and the search engine finds specific topics by locating those keywords or phrases in registered web pages.
|
uses specific terms to search databases.
|
2 | 1 |
keyword search
|
finds matching word anywhere in record
|
this is the type of search our catalog does, it looks for your word in every part of the catalog
|
3 | 1 |
keyword search
|
you enter one or more keywords into the engine, and the search engine finds specific topics by locating those keywords or phrases in registered web pages.
|
users enter keywords in a search engine to query an index. they are then compared to the keywords and if they match, the search engine will provide the indexed information.
|
1 | 0 |
keyword search
|
looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading.
|
a type of search that looks for matching documents that contain one or more words specified by the user.
|
1 | 0 |
keyword search
|
looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading.
|
searches a word or phrase, including basic boolean operators
|
1 | 0 |
keyword search
|
searches a word or phrase, including basic boolean operators
|
looks for words in any file or record in the internet.
|
2 | 1 |
loss function
|
loss incurred for predicting y when correct answer is t
|
given the truth (y) and the system's prediction (y-hat), it measures the error.
|
1 | 0 |
loss function
|
penalty for incorrect classification of an instance. usually calculated as mean squared error.
|
calculates the error or loss, typically the difference between the predicted value and the actual value
|
1 | 0 |
loss function
|
measures how far what f does is fropm the obsererved data d
|
a function to model the cost of a particular error. eg. error ^ 2.
|
0 | 0 |
access control model
|
a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
|
standards that provide a predefined framework for hardware or software developers.
|
2 | 1 |
access control model
|
this term is used to describe a framework that dictates how subjects access objects or how objects access objects
|
dictates how subjects access objects or the other way around
|
2 | 1 |
access control model
|
a model that provides a predefined framework for hardware and software developers who need to implement access control functionality in their devices or applications.
|
a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
|
2 | 1 |
access control model
|
a predefined framework that the custodian can use for controlling access.
|
a predefined framework found in hardware and software that a custodian can use for controlling access.
|
0 | 0 |
necessary conditions
|
right (requirements)
|
b is a necessary condition for z only when the absence of b means z cannot occur.
|
1 | 0 |
design phase
|
physical process model, physical data model, architecture/hardware, interface, data storage and program design; designing program to meet user requirements
|
develop and evaluate alternatives configure and structure new system hardware design software design database design process and job descriptions created
|
1 | 0 |
design phase
|
this is when infrastructure upgrade requirements, network communication capacity, hardware and software procurement requirements, software development, and data acquisition needs must be identified.
|
will determine how the system will operate in terms of hardware, software, ui, databases, etc
|
2 | 1 |
design phase
|
architectural design break down into components detailed design
|
- architectural design - detailed design - &"how the product does it&"
|
3 | 1 |
design phase
|
decides how the system will operate, in terms of the hardware, software, and network infrastructure.
|
will determine how the system will operate in terms of hardware, software, ui, databases, etc
|
2 | 1 |
design phase
|
involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
|
establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation -design technical architecture -design system models
|
0 | 0 |
security policy
|
a broad general statement of management's intent to protect organization assets
|
a senior leadership directive that indicates the direction or intent of its established goals, and assign responsibilities for, addressing security risks to an organization.
|
2 | 1 |
security policy
|
is a document that states, in writing, how a company plans to protect the company's physical and network assets.
|
written document that states how an organization plans to protect the company's it assets
|
0 | 0 |
security policy
|
a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources.
|
the document that details exactly how your organization and its data are secured.
|
2 | 1 |
security policy
|
a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources.
|
a high-level document describing the principles, approach, and major objectives of the organization regarding security.
|
2 | 1 |
security policy
|
written document that states how an organization plans to protect the company's it assets
|
a written document that describes how a system, organization, or other entity is secured.
|
3 | 1 |
security policy
|
a written document that states how an organization plans to protect the company's information technology assets is a:
|
a written document that describes how a system, organization, or other entity is secured.
|
3 | 1 |
security policy
|
a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets
|
statements that prioritize info risk, identify acceptable risks and identify mechanisms for reducing risks
|
2 | 1 |
security policy
|
the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.
|
a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources.
|
3 | 1 |
security policy
|
is a document that states, in writing, how a company plans to protect the company's physical and network assets.
|
a written document that describes how a system, organization, or other entity is secured.
|
2 | 1 |
security policy
|
the document that details exactly how your organization and its data are secured.
|
a high-level document describing the principles, approach, and major objectives of the organization regarding security.
|
3 | 1 |
security policy
|
a written statement describing assets to be protected, the reasons for protecting the assets, the parties responsible for protection, and acceptable and unacceptable behaviors.
|
written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not.
|
2 | 1 |
security policy
|
statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
|
statements that prioritize info risk, identify acceptable risks and identify mechanisms for reducing risks
|
3 | 1 |
security policy
|
a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets
|
statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
|
2 | 1 |
data privacy
|
making sure that data is protected against unauthorized access
|
requirement for data to be available only to authorized users
|
1 | 0 |
data privacy
|
concerned with controlling the distribution of data collected from customers, suppliers, and employees.
|
ensuring an employee accesses the minimum amount of data necessary to complete their job
|
3 | 1 |
data privacy
|
protecting the privacy of the data located in a database.
|
addresses protecting the privacy of personal data stored in the databases
|
0 | 0 |
data privacy
|
the need to preserve and protect personal information collected by any organization from being accessed by a third party
|
the aspect of it that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties
|
0 | 0 |
data privacy
|
a company must tell an individual how personal information will be protected and limits placed on how the data will be shared
|
information that is protected and business respect except in the claims and privacy policy
|
1 | 0 |
data privacy
|
a company must tell an individual how personal information will be protected and limits placed on how the data will be shared
|
a branch of data security concerned with the proper handling of data - consent, notice, and regulatory obligations
|
3 | 1 |
data privacy
|
making sure that data is protected against unauthorized access
|
requirement for data to be available only to authorised users. keeps data private rather than to the public domain.
|
1 | 0 |
object-oriented databases
|
store objects • every object is an instance of a class. • the class includes the data and the operations.
|
-store information in objects rather than in tables -store instructions for how to compute the data as well as the data to be processed -use object query language
|
1 | 0 |
object-oriented databases
|
store objects • every object is an instance of a class. • the class includes the data and the operations.
|
stores objects that contain procedures w/ data instead of storing records in tables + hierarchies
|
2 | 1 |
position paper
|
explains your opinion on a specific issue or topic based on logical support
|
it describes a position on an issue and the rationale for that position. the position paper is based on facts that provide a solid foundation of your argument.
|
1 | 0 |
position paper
|
has the power to change the opinion and attitudes of other
|
essential tool in bringing about social change
|
1 | 0 |
position paper
|
explains your opinion on a specific issue or topic based on logical support
|
• presents one's stand or viewpoint • starting your arguments and proposed course of action
|
0 | 0 |
position paper
|
is used to claim a one-side position on a specific issue.
|
• presents one's stand or viewpoint • starting your arguments and proposed course of action
|
1 | 0 |
position paper
|
explains your opinion on a specific issue or topic based on logical support
|
is used to claim a one-side position on a specific issue.
|
0 | 0 |
position paper
|
it describes a position on an issue and the rationale for that position. the position paper is based on facts that provide a solid foundation of your argument.
|
• presents one's stand or viewpoint • starting your arguments and proposed course of action
|
1 | 0 |
parallel programming
|
multiple work units executing at the same time, can be done with or without multiple processors
|
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
|
2 | 1 |
parallel programming
|
multiple work units executing at the same time, can be done with or without multiple processors
|
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
|
1 | 0 |
parallel programming
|
multiple work units executing at the same time, can be done with or without multiple processors
|
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
|
0 | 0 |
parallel programming
|
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
|
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
|
3 | 1 |
parallel programming
|
multiple work units executing at the same time, can be done with or without multiple processors
|
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
|
2 | 1 |
parallel programming
|
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
|
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
|
2 | 1 |
parallel programming
|
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
|
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
|
1 | 0 |
parallel programming
|
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
|
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
|
2 | 1 |
parallel programming
|
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
|
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
|
0 | 0 |
parallel programming
|
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
|
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
|
1 | 0 |
time synchronization
|
ntpsec is secure network time protocol and adds onto ntp
|
the process of obtaining the exact same time on multiple hosts or network time protocol (ntp)
|
1 | 0 |
time synchronization
|
ntpsec is secure network time protocol and adds onto ntp
|
the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication.
|
3 | 1 |
time synchronization
|
use case for obtaining the exact same time on multiple hosts using network time protocol (ntp) as a secure protocol.
|
the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication.
|
2 | 1 |
time synchronization
|
all server sending data to the siem should be synchronized with the same time. easier to know when the events occured
|
the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol.
|
1 | 0 |
time synchronization
|
the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol.
|
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
|
0 | 0 |
time synchronization
|
the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication.
|
network time protocol ( ntp ) works over udp on port 123 time critical services such as authentication, logging, and task scheduling/backup
|
2 | 1 |
time synchronization
|
the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time.
|
the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol.
|
2 | 1 |
time synchronization
|
the process of obtaining the exact same time on different devices.
|
all server sending data to the siem should be synchronized with the same time. easier to know when the events occured
|
3 | 1 |
time synchronization
|
use case for obtaining the exact same time on multiple hosts using network time protocol (ntp) as a secure protocol.
|
the process of obtaining the exact same time on multiple hosts or network time protocol (ntp)
|
2 | 1 |
time synchronization
|
the process of obtaining the exact same time on different devices.
|
the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time.
|
2 | 1 |
time synchronization
|
all server sending data to the siem should be synchronized with the same time. easier to know when the events occured
|
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
|
2 | 1 |
time synchronization
|
the process of obtaining the exact same time on different devices.
|
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
|
2 | 1 |
time synchronization
|
the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time.
|
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
|
2 | 1 |
main ideas
|
the most important ideas about a topic that a writer wants to communicate to readers; most of the time is directly stated in the topic sentence
|
the most important or central thought of a paragraph or larger section of text, which tells the reader what the text is about
|
0 | 0 |
basic concepts
|
- more specific than superordinate concepts (i.e. single-family home vs. superordinate home)
|
bracken, boehm
|
1 | 0 |
basic concepts
|
smaller and more specific than superordinate but less spacific than subordinate
|
- more specific than superordinate concepts (i.e. single-family home vs. superordinate home)
|
1 | 0 |
business rules
|
-rules organization follows when operating a business -implemented within business processes -sometimes simple and straight forward -sometimes not so simple and straight forward
|
describe the conditions that must be met when taking actions or making decisions within a work task.
|
0 | 0 |
business rules
|
concise statements that are derived from a precise and detailed description of the organization's data environment business rules determine connectives and cardinalities
|
a succinct statement of a constraint on business processes that provides the logic that guides the behavior of the business in specific situations
|
0 | 0 |
business rules
|
specifications that preserve the integrity of the logical data model.
|
- descriptions of policies, procedures, or principles within a specific organization - descriptions of operations to create/enforce actions - describe characteristics of data as viewed by the company
|
1 | 0 |
business rules
|
a succinct statement of a constraint on business processes that provides the logic that guides the behavior of the business in specific situations
|
- descriptions of policies, procedures, or principles within a specific organization - descriptions of operations to create/enforce actions - describe characteristics of data as viewed by the company
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.