Four-class labels
int64
0
3
Binary labels
int64
0
1
Entity
stringlengths
8
33
Definition1
stringlengths
15
259
Definition2
stringlengths
14
253
0
0
virtual memory
splits processes up and swaps parts in and out of memory (uses both disk space and main memory)
space on a hard disk or other storage device that simulates random access memory; typically used as an applications address space on machines that have it implemented.
0
0
virtual memory
when ram is full the operating system uses storage on the hard disk drive as an extension to ram. very slow to read / write data.
hard drive space that is used as temporary ram
2
1
virtual memory
a part of a hard disk used to store overflow data from ram.
the space on the hard drive where the operating system stores data if there isn't enough ram
0
0
virtual memory
online secondary memory that is used as an extension of primary memory, giving appearance of larger internal memory
separate the address in a running program (virtual address) and the address in real or primary memory (real address)
2
1
virtual memory
space on a hard disk or other storage device that simulates random access memory; typically used as an applications address space on machines that have it implemented.
space on a hard disk or other storage device is used as main memory (ram) - allows the execution of process that is not completely in the memory
3
1
virtual memory
an area of secondary storage that allows the user to run programs when there is insufficient ram.
part of the hard drive (secondary storage) used as an overflow when there is insufficient space in ram.
2
1
virtual memory
the space used on the hard drive used as ram when ram is full instructions and data for all running programs are loaded in ram.
the space used on the hard drive used as ram when ram is full is called:
2
1
virtual memory
splits processes up and swaps parts in and out of memory (uses both disk space and main memory)
space on a hard disk or other storage device is used as main memory (ram) - allows the execution of process that is not completely in the memory
2
1
virtual memory
virtual memory is part of the hard drive used as an extension to ram (used when you run out of space on the ram)
the space used on the hard drive used as ram when ram is full is called:
0
0
virtual memory
online secondary memory that is used as an extension of primary memory, giving appearance of larger internal memory
a storage allocation scheme in which secondary memory can be addressed as though it were a part of main memory.
3
1
virtual memory
allocate space on the hard disk to supplement the immediate, functional memory capacity of ram.
memory that allocates space in secondary storage to supplement the immediate, functional memory capacity of ram
1
0
virtual memory
separate the address in a running program (virtual address) and the address in real or primary memory (real address)
the use of secondary storage devices as an extension of the primary storage of the computer, thus giving the appearance of a larger main memory than actually exists.
1
0
virtual memory
when the ram runs out of space, the cpu can designate part of the hard disk as acting like ram and will be treated as such
the space used on the hard drive used as ram when ram is full is called:
1
0
virtual memory
when ram is full the operating system uses storage on the hard disk drive as an extension to ram. very slow to read / write data.
the space on the hard drive where the operating system stores data if there isn't enough ram
1
0
virtual memory
allows a program to run with only a subset of its assigned address space in main memory
-early schemes required the entire program be loaded into main memory -programs had to be loaded into contiguous memory locations -modern memory management solves these problems
0
0
time dimension
research into processes that occur over time presents social challenges that can be addressed through cross-sectional studies or longitudinal studies.
the point or points in time at which a variable is measured
1
0
dynamic data
data that changes or is updated, e.g. data that can be written back or edited
data that changes automatically without user intervention it is data that updates as a result of the source data changing. eg,weather map live sports results on a website
2
1
dynamic data
data that changes or is updated, e.g. data that can be written back or edited
data that updates as a result of the source data changing.
0
0
dynamic data
data that changes or is updated, e.g. data that can be written back or edited
data that changes automatically without user intervention.
0
0
dynamic data
1) must be continually updated. 2) may change after it is recorded
changes automatically during creation
0
0
dynamic data
changes automatically during creation
data that may change after it is recorded, and has to be continually updated.
1
0
keyword search
looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading.
looks for words in any file or record in the internet.
2
1
keyword search
searches a word or phrase, including basic boolean operators
a type of search that looks for matching documents that contain one or more words specified by the user.
0
0
keyword search
you enter one or more keywords into the engine, and the search engine finds specific topics by locating those keywords or phrases in registered web pages.
uses specific terms to search databases.
2
1
keyword search
finds matching word anywhere in record
this is the type of search our catalog does, it looks for your word in every part of the catalog
3
1
keyword search
you enter one or more keywords into the engine, and the search engine finds specific topics by locating those keywords or phrases in registered web pages.
users enter keywords in a search engine to query an index. they are then compared to the keywords and if they match, the search engine will provide the indexed information.
1
0
keyword search
looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading.
a type of search that looks for matching documents that contain one or more words specified by the user.
1
0
keyword search
looks for words anywhere in the record. keyword searches are a good substitute for a subject search when you do not know the standard subject heading.
searches a word or phrase, including basic boolean operators
1
0
keyword search
searches a word or phrase, including basic boolean operators
looks for words in any file or record in the internet.
2
1
loss function
loss incurred for predicting y when correct answer is t
given the truth (y) and the system's prediction (y-hat), it measures the error.
1
0
loss function
penalty for incorrect classification of an instance. usually calculated as mean squared error.
calculates the error or loss, typically the difference between the predicted value and the actual value
1
0
loss function
measures how far what f does is fropm the obsererved data d
a function to model the cost of a particular error. eg. error ^ 2.
0
0
access control model
a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
standards that provide a predefined framework for hardware or software developers.
2
1
access control model
this term is used to describe a framework that dictates how subjects access objects or how objects access objects
dictates how subjects access objects or the other way around
2
1
access control model
a model that provides a predefined framework for hardware and software developers who need to implement access control functionality in their devices or applications.
a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
2
1
access control model
a predefined framework that the custodian can use for controlling access.
a predefined framework found in hardware and software that a custodian can use for controlling access.
0
0
necessary conditions
right (requirements)
b is a necessary condition for z only when the absence of b means z cannot occur.
1
0
design phase
physical process model, physical data model, architecture/hardware, interface, data storage and program design; designing program to meet user requirements
develop and evaluate alternatives configure and structure new system hardware design software design database design process and job descriptions created
1
0
design phase
this is when infrastructure upgrade requirements, network communication capacity, hardware and software procurement requirements, software development, and data acquisition needs must be identified.
will determine how the system will operate in terms of hardware, software, ui, databases, etc
2
1
design phase
architectural design break down into components detailed design
- architectural design - detailed design - &"how the product does it&"
3
1
design phase
decides how the system will operate, in terms of the hardware, software, and network infrastructure.
will determine how the system will operate in terms of hardware, software, ui, databases, etc
2
1
design phase
involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation -design technical architecture -design system models
0
0
security policy
a broad general statement of management's intent to protect organization assets
a senior leadership directive that indicates the direction or intent of its established goals, and assign responsibilities for, addressing security risks to an organization.
2
1
security policy
is a document that states, in writing, how a company plans to protect the company's physical and network assets.
written document that states how an organization plans to protect the company's it assets
0
0
security policy
a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources.
the document that details exactly how your organization and its data are secured.
2
1
security policy
a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources.
a high-level document describing the principles, approach, and major objectives of the organization regarding security.
2
1
security policy
written document that states how an organization plans to protect the company's it assets
a written document that describes how a system, organization, or other entity is secured.
3
1
security policy
a written document that states how an organization plans to protect the company's information technology assets is a:
a written document that describes how a system, organization, or other entity is secured.
3
1
security policy
a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets
statements that prioritize info risk, identify acceptable risks and identify mechanisms for reducing risks
2
1
security policy
the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.
a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources.
3
1
security policy
is a document that states, in writing, how a company plans to protect the company's physical and network assets.
a written document that describes how a system, organization, or other entity is secured.
2
1
security policy
the document that details exactly how your organization and its data are secured.
a high-level document describing the principles, approach, and major objectives of the organization regarding security.
3
1
security policy
a written statement describing assets to be protected, the reasons for protecting the assets, the parties responsible for protection, and acceptable and unacceptable behaviors.
written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not.
2
1
security policy
statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
statements that prioritize info risk, identify acceptable risks and identify mechanisms for reducing risks
3
1
security policy
a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets
statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
2
1
data privacy
making sure that data is protected against unauthorized access
requirement for data to be available only to authorized users
1
0
data privacy
concerned with controlling the distribution of data collected from customers, suppliers, and employees.
ensuring an employee accesses the minimum amount of data necessary to complete their job
3
1
data privacy
protecting the privacy of the data located in a database.
addresses protecting the privacy of personal data stored in the databases
0
0
data privacy
the need to preserve and protect personal information collected by any organization from being accessed by a third party
the aspect of it that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties
0
0
data privacy
a company must tell an individual how personal information will be protected and limits placed on how the data will be shared
information that is protected and business respect except in the claims and privacy policy
1
0
data privacy
a company must tell an individual how personal information will be protected and limits placed on how the data will be shared
a branch of data security concerned with the proper handling of data - consent, notice, and regulatory obligations
3
1
data privacy
making sure that data is protected against unauthorized access
requirement for data to be available only to authorised users. keeps data private rather than to the public domain.
1
0
object-oriented databases
store objects • every object is an instance of a class. • the class includes the data and the operations.
-store information in objects rather than in tables -store instructions for how to compute the data as well as the data to be processed -use object query language
1
0
object-oriented databases
store objects • every object is an instance of a class. • the class includes the data and the operations.
stores objects that contain procedures w/ data instead of storing records in tables + hierarchies
2
1
position paper
explains your opinion on a specific issue or topic based on logical support
it describes a position on an issue and the rationale for that position. the position paper is based on facts that provide a solid foundation of your argument.
1
0
position paper
has the power to change the opinion and attitudes of other
essential tool in bringing about social change
1
0
position paper
explains your opinion on a specific issue or topic based on logical support
• presents one's stand or viewpoint • starting your arguments and proposed course of action
0
0
position paper
is used to claim a one-side position on a specific issue.
• presents one's stand or viewpoint • starting your arguments and proposed course of action
1
0
position paper
explains your opinion on a specific issue or topic based on logical support
is used to claim a one-side position on a specific issue.
0
0
position paper
it describes a position on an issue and the rationale for that position. the position paper is based on facts that provide a solid foundation of your argument.
• presents one's stand or viewpoint • starting your arguments and proposed course of action
1
0
parallel programming
multiple work units executing at the same time, can be done with or without multiple processors
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
2
1
parallel programming
multiple work units executing at the same time, can be done with or without multiple processors
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
1
0
parallel programming
multiple work units executing at the same time, can be done with or without multiple processors
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
0
0
parallel programming
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
3
1
parallel programming
multiple work units executing at the same time, can be done with or without multiple processors
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
2
1
parallel programming
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
2
1
parallel programming
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
divide a large task into parts by function or by data gain efficiency by using different processors to simultaneously execute parts of a task
1
0
parallel programming
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
2
1
parallel programming
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
a program which is intended to accomplish multiple tasks at the same time through the use of either multiple cores/processors on the same machine or multiple machines
0
0
parallel programming
programming in a language that allows you to explicitly indicate how different portions of the computation may be executed concurrently by different processors
when multiple tasks are executed at the same time (or almost the same time). one or more cpus.
1
0
time synchronization
ntpsec is secure network time protocol and adds onto ntp
the process of obtaining the exact same time on multiple hosts or network time protocol (ntp)
1
0
time synchronization
ntpsec is secure network time protocol and adds onto ntp
the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication.
3
1
time synchronization
use case for obtaining the exact same time on multiple hosts using network time protocol (ntp) as a secure protocol.
the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication.
2
1
time synchronization
all server sending data to the siem should be synchronized with the same time. easier to know when the events occured
the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol.
1
0
time synchronization
the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol.
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
0
0
time synchronization
the process of obtaining the exact same time on multiple hosts. network time protocol (ntpsec) use ntpsec to secure this time sync communication.
network time protocol ( ntp ) works over udp on port 123 time critical services such as authentication, logging, and task scheduling/backup
2
1
time synchronization
the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time.
the process of obtaining the exact same time on multiple hosts. network time protocol (ntp) is a time synchronization protocol.
2
1
time synchronization
the process of obtaining the exact same time on different devices.
all server sending data to the siem should be synchronized with the same time. easier to know when the events occured
3
1
time synchronization
use case for obtaining the exact same time on multiple hosts using network time protocol (ntp) as a secure protocol.
the process of obtaining the exact same time on multiple hosts or network time protocol (ntp)
2
1
time synchronization
the process of obtaining the exact same time on different devices.
the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time.
2
1
time synchronization
all server sending data to the siem should be synchronized with the same time. easier to know when the events occured
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
2
1
time synchronization
the process of obtaining the exact same time on different devices.
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
2
1
time synchronization
the siem software can ensure that the time is the same across devices so the security events across devices are recorded at the same time.
feature of a siem that makes sure all products are synced up so they are running with the same timestamps.
2
1
main ideas
the most important ideas about a topic that a writer wants to communicate to readers; most of the time is directly stated in the topic sentence
the most important or central thought of a paragraph or larger section of text, which tells the reader what the text is about
0
0
basic concepts
- more specific than superordinate concepts (i.e. single-family home vs. superordinate home)
bracken, boehm
1
0
basic concepts
smaller and more specific than superordinate but less spacific than subordinate
- more specific than superordinate concepts (i.e. single-family home vs. superordinate home)
1
0
business rules
-rules organization follows when operating a business -implemented within business processes -sometimes simple and straight forward -sometimes not so simple and straight forward
describe the conditions that must be met when taking actions or making decisions within a work task.
0
0
business rules
concise statements that are derived from a precise and detailed description of the organization's data environment business rules determine connectives and cardinalities
a succinct statement of a constraint on business processes that provides the logic that guides the behavior of the business in specific situations
0
0
business rules
specifications that preserve the integrity of the logical data model.
- descriptions of policies, procedures, or principles within a specific organization - descriptions of operations to create/enforce actions - describe characteristics of data as viewed by the company
1
0
business rules
a succinct statement of a constraint on business processes that provides the logic that guides the behavior of the business in specific situations
- descriptions of policies, procedures, or principles within a specific organization - descriptions of operations to create/enforce actions - describe characteristics of data as viewed by the company