computer

  • 91Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …

    Wikipedia

  • 92Computer networking — is the engineering discipline concerned with communication between computer systems or devices. Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs. [… …

    Wikipedia

  • 93Computer-supported collaborative learning — (CSCL) is a pedagogical approach wherein learning takes place via social interaction using a computer or through the Internet. This kind of learning is characterized by the sharing and construction of knowledge among participants using technology …

    Wikipedia

  • 94Computer user satisfaction — (and closely related concepts such as System Satisfaction, User Satisfaction, Computer System Satisfaction, End User Computing Satisfaction) is the attitude of a user to the computer system (s)he employs in the context of his/her work… …

    Wikipedia

  • 95Computer-generated holography — (CGH) is the method of digitally generating holographic interference patterns. A holographic image can be generated e.g. by digitally computing a holographic interference pattern and printing it onto a mask or film for subsequent illumination by… …

    Wikipedia

  • 96Computer memory — types Volatile RAM DRAM (e.g., DDR SDRAM) SRAM In development T RAM Z RAM TTRAM Historical Delay line memory Selectron tube Williams tube Non volatile …

    Wikipedia

  • 97Computer User — is a computer magazine originally founded in 1982, and which, after several owners and fundamental changes, is still in business today online as computeruser.com. This is not to be confused with a magazine briefly published under the name of… …

    Wikipedia

  • 98Computer surveillance in the workplace — refers to the issues related to the element of employee monitoring and workplace surveillance in which an employer engages in actively monitoring the usage of a company owned computer or terminal by an employee. Computer surveillance may also… …

    Wikipedia

  • 99Computer desk — Computer desks in a Control room Computer desk …

    Wikipedia

  • 100Computer Modern — Category Serif Classification Didone Designer(s) Donald Kn …

    Wikipedia