Four-class labels
int64 0
3
| Binary labels
int64 0
1
| Entity
stringlengths 8
33
| Definition1
stringlengths 15
259
| Definition2
stringlengths 14
253
|
---|---|---|---|---|
2 | 1 | data compression | taking data and packaging it into a smaller size (ex: zip, jpeg, mp3) | reducing the file size while maintaining the contained information |
2 | 1 | data compression | reducing the amount of space needed to store a piece of data/bandwidth to transmit it (ex. zip files) | compression reduces the volume of data to reduce image processing, transmission times, bandwidth requirements, and storage needs |
2 | 1 | data compression | involves encoding information using fewer bits than the original representation | the process of reducing the number of bits required to represent a sound or image. |
1 | 0 | data compression | the process of shrinking the size of a file by removing data or recoding it more efficiently | process of encoding data to take up less storage space and bandwidth for transmission, by finding repeatable patterns of 0's and 1's, enables info to be dispersed faster |
3 | 1 | data compression | when the bit structure of a file is manipulated to make the file size smaller. done using algorithms. algorithm - a step by step set of instruction. | bit structure of a file is manipulated in such a way that the data in a file will become smaller in size uses compression algorithms |
2 | 1 | data compression | encoding digital information using less bits than the original works by finding & eliminating or rewriting statistical redundancies | process of encoding information using fewer bits than the original representation |
2 | 1 | data compression | making a message smaller so it transmits more quickly | making a file smaller to make it easier to deal with |
3 | 1 | data compression | reduction of bits by encoding data using fewer bits than the original representation. | process of encoding information using fewer bits than the original representation |
2 | 1 | data compression | used to reduce file sizes. fits more files onto storage devices / faster transmission over networks | process of encoding data to take up less storage space and bandwidth for transmission, by finding repeatable patterns of 0's and 1's, enables info to be dispersed faster |
1 | 0 | data compression | the process of shrinking the size of a file by removing data or recoding it more efficiently | used to reduce file sizes. fits more files onto storage devices / faster transmission over networks |
2 | 1 | data compression | reducing the amount of space needed to store a piece of data/bandwidth to transmit it (ex. zip files) | used to reduce file sizes. fits more files onto storage devices / faster transmission over networks |
1 | 0 | data compression | is the process of storing information using less storage space by reducing the number of bits it takes up. | process of reducing memory of storage required by large files |
2 | 1 | large scale | a relatively small ratio between map units and ground units. this usually has higher resolution and covers much smaller regions and show more detail | features are larger because map is more zoomed in. |
0 | 0 | large scale | refers to maps on which objects are relatively large | 1:10,000 small area detail large representative fraction |
1 | 0 | large scale | a relatively small ratio between map units and ground units. this usually has higher resolution and covers much smaller regions and show more detail | refers to maps on which objects are relatively large |
1 | 0 | large scale | features are larger because map is more zoomed in. | small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods |
2 | 1 | large scale | generally, a map scale that shows a small area on the ground at a high level of detail. | refers to maps on which objects are relatively large |
1 | 0 | large scale | generally, a map scale that shows a small area on the ground at a high level of detail. | large scale = small area ex. school map |
0 | 0 | large scale | refers to maps on which objects are relatively large | a relatively small ratio between map units and ground units. large-scale maps usually have higher resolution and cover much smaller regions than small-scale maps. (large amounts of detail) |
1 | 0 | large scale | features are larger because map is more zoomed in. | large scale = small area ex. school map |
1 | 0 | large scale | large scale = small area ex. school map | small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods |
2 | 1 | large scale | features are larger because map is more zoomed in. | refers to maps on which objects are relatively large |
0 | 0 | large scale | less pronounced distortion due to projection | less generalization and closer to reality |
1 | 0 | large scale | a relatively small ratio between map units and ground units. this usually has higher resolution and covers much smaller regions and show more detail | 1:10,000 small area detail large representative fraction |
0 | 0 | large scale | 1:10,000 small area detail large representative fraction | small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods |
0 | 0 | large scale | refers to maps on which objects are relatively large | small ratio between map units and ground units, e.g. depicting small areas such as usgs topo maps or neighborhoods |
2 | 1 | large scale | large scale = small area ex. school map | a relatively small ratio between map units and ground units. large-scale maps usually have higher resolution and cover much smaller regions than small-scale maps. (large amounts of detail) |
1 | 0 | large scale | features are larger because map is more zoomed in. | generally, a map scale that shows a small area on the ground at a high level of detail. |
1 | 0 | black box | the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker | attacker has no knowledge of the network environment (external attack) |
0 | 0 | black box | blind test of system | attacker has no knowledge of the network environment (external attack) |
2 | 1 | black box | having no information about the system or environment when performing a penetration test | no knowledge of the system, tester is operating as if they were an outside attacker |
0 | 0 | black box | testing where only the inputs and outputs of a software module are tested without examining the inner working of the software | a process of testing where operations or actions are unknown or unspecified, can test for features not implemented. |
1 | 0 | black box | internals are hidden (eg 3rd party library); access only through documented external interfaces. | testing the software from an external perspective, i.e., with no prior knowledge of the software; only binary executable or intermediate byte code is available for analysis |
3 | 1 | black box | a test conducted when the assessor has no information or knowledge about the inner workings of the system or knowledge of the source code. | the assessor has no knowledge of the inner workings of the system or the source code. |
2 | 1 | black box | having no information about the system or environment when performing a penetration test | pentester knows nothing about systems under attack &"blind&" |
3 | 1 | black box | having no information about the system or environment when performing a penetration test | no prior knowledge of the system or network to be assessed |
3 | 1 | black box | outsider attack, attacker has no knowledge of the network environment | attacker has no knowledge of the network environment (external attack) |
3 | 1 | black box | the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker | testers have no knowledge of environment, just like an attacker |
3 | 1 | black box | testers conduct their work without any knowledge of the target environment. | a test method conducted when the assessor has no information or knowledge about the inner workings of the system or knowledge of the source code |
1 | 0 | black box | this term describes any mechanism that accepts input, performs some operation that cannot be seen on the input, and produces output. | a device that can be used solely in terms of input and output with regard to how it works. |
1 | 0 | black box | outsider attack, attacker has no knowledge of the network environment | no prior knowledge of the system or network to be assessed |
3 | 1 | black box | an analogy that programmers use to refer to hidden method implementation details. | the analogy that programmers use to refer to the details of hidden methods. |
2 | 1 | black box | a &"blind&" test the pentester knows nothing about the systems | testers have zero knowledge of the environment prior to starting a test. instead they approach the test with the same knowledge as an attacker. |
0 | 0 | black box | having no information about the system or environment when performing a penetration test | attacker has no knowledge of the network environment (external attack) |
0 | 0 | black box | outsider attack, attacker has no knowledge of the network environment | test without knowledge of system internals. |
1 | 0 | black box | test without knowledge of system internals. | having no information about the system or environment when performing a penetration test |
3 | 1 | black box | any device you can use without knowing how it works internally | a device you can use without understanding how it works. |
1 | 0 | black box | device, system, or object viewed in terms of input/output without any knowledge of its internal workings and a well explained interface ex) phone, tv, fridge | a term used to indicate any component of a computer-based system for whih the user need not to know the details of its internal operations |
1 | 0 | black box | you can examine what goes in and out of the method, but not the details of how it works inside. | an analogy that programmers use to refer to hidden method implementation details. |
2 | 1 | black box | no prior knowledge of the system or network to be assessed | pentester knows nothing about systems under attack &"blind&" |
2 | 1 | black box | blind test of system | testers have no knowledge of environment, just like an attacker |
3 | 1 | black box | blind test of system | test without knowledge of system internals. |
2 | 1 | black box | the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker | test without knowledge of system internals. |
0 | 0 | black box | users test; functionality, user input validation, output results and transitions and boundary cases | any component of a system for which the user need not know the details of its internal operation |
2 | 1 | black box | no knowledge of the system, tester is operating as if they were an outside attacker | pentester knows nothing about systems under attack &"blind&" |
3 | 1 | black box | a &"blind&" test the pentester knows nothing about the systems | a test where the tester has no knowledge of the network and systems being tested. |
2 | 1 | black box | manipulates line voltage for toll free calls | phreaking tool used to manipulate line voltages to steal long-distance service. |
1 | 0 | black box | blind test of system | pentester knows nothing about systems under attack &"blind&" |
3 | 1 | black box | testers have no knowledge of environment, just like an attacker | having no information about the system or environment when performing a penetration test |
1 | 0 | black box | the tester has no prior knowledge of the network infrastructure being tested. most closely mimics an attack from outside the organization | tester knows nothing of the network |
3 | 1 | black box | test without knowledge of the code | used to test the software without knowing the internal structure of code of program |
2 | 1 | black box | the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker | no prior knowledge of the system or network to be assessed |
2 | 1 | black box | no knowledge of the system, tester is operating as if they were an outside attacker | attacker has no knowledge of the network environment (external attack) |
3 | 1 | black box | the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker | having no information about the system or environment when performing a penetration test |
1 | 0 | black box | attacker has no knowledge of the network environment (external attack) | pentester knows nothing about systems under attack &"blind&" |
2 | 1 | black box | outsider attack, attacker has no knowledge of the network environment | pentester knows nothing about systems under attack &"blind&" |
1 | 0 | black box | outsider attack, attacker has no knowledge of the network environment | no knowledge of the system, tester is operating as if they were an outside attacker |
2 | 1 | black box | blind test of system | the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker |
2 | 1 | black box | it can be viewed only in terms of its input and output, without any knowledge of its internal workings | a device, system or object in computing which can be viewed in terms of its inputs and outputs, without requiring any knowledge of its internal workings. |
3 | 1 | black box | a device, system or object in computing which can be viewed in terms of its inputs and outputs, without requiring any knowledge of its internal workings. | a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. |
2 | 1 | black box | testers have no knowledge of environment, just like an attacker | no knowledge of the system, tester is operating as if they were an outside attacker |
3 | 1 | black box | blind test of system | no prior knowledge of the system or network to be assessed |
3 | 1 | black box | testers have no knowledge of environment, just like an attacker | no prior knowledge of the system or network to be assessed |
2 | 1 | black box | blind test of system | no knowledge of the system, tester is operating as if they were an outside attacker |
1 | 0 | black box | testers have no knowledge of environment, just like an attacker | attacker has no knowledge of the network environment (external attack) |
2 | 1 | black box | a system that can not be directly observed or easily undeestood | a system that is not easily observed |
2 | 1 | black box | test without knowledge of system internals. | pentester knows nothing about systems under attack &"blind&" |
3 | 1 | black box | the pen tester has absolutely no knowledge of the system and its functioning in the same manner as an outside attacker | no knowledge of the system, tester is operating as if they were an outside attacker |
1 | 0 | black box | blind test of system | having no information about the system or environment when performing a penetration test |
3 | 1 | black box | (penetration test) a penetration test in which the tester has no prior knowledge of the network infrastructure that is being tested. | a test where the tester has no knowledge of the network and systems being tested. |
0 | 0 | black box | aka functional testing. carried out independently of the code used in the program. makes sure the program functions to the specified requirements. | test without knowledge of the code |
2 | 1 | black box | you can examine what goes in and out of the method, but not the details of how it works inside. | the analogy that programmers use to refer to the details of hidden methods. |
2 | 1 | black box | outsider attack, attacker has no knowledge of the network environment | testers have no knowledge of environment, just like an attacker |
2 | 1 | black box | where you do not know how inputs are being transformed into outputs | a metaphor for a process or action that produces results in a non-transparent or non-observable manner. |
1 | 0 | black box | blind test of system | outsider attack, attacker has no knowledge of the network environment |
3 | 1 | black box | a test where the tester has no knowledge of the network and systems being tested. | testers have zero knowledge of the environment prior to starting a test. instead they approach the test with the same knowledge as an attacker. |
2 | 1 | black box | a type of penetration test. testers have zero knowledge of the environment prior to starting the test. | a test where the tester has no knowledge of the network and systems being tested. |
0 | 0 | black box | no prior knowledge of the system or network to be assessed | no knowledge of the system, tester is operating as if they were an outside attacker |
2 | 1 | black box | it can be viewed only in terms of its input and output, without any knowledge of its internal workings | a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. |
2 | 1 | black box | testing where only the inputs and outputs of a software module are tested without examining the inner working of the software | users test; functionality, user input validation, output results and transitions and boundary cases |
0 | 0 | black box | a complex system that cannot be directly observed and easily understood | occurs when an evaluation of program outcomes ignores, and does not identify, the process by which the program produced the effect |
0 | 0 | black box | a process of testing where operations or actions are unknown or unspecified, can test for features not implemented. | any component of a system for which the user need not know the details of its internal operation |
2 | 1 | black box | (penetration test) a penetration test in which the tester has no prior knowledge of the network infrastructure that is being tested. | a type of penetration test. testers have zero knowledge of the environment prior to starting the test. |
0 | 0 | black box | test without knowledge of system internals. | attacker has no knowledge of the network environment (external attack) |
3 | 1 | black box | testers have no knowledge of environment, just like an attacker | pentester knows nothing about systems under attack &"blind&" |
1 | 0 | black box | test without knowledge of system internals. | no prior knowledge of the system or network to be assessed |
1 | 0 | markup language | a language used to describe the content and structure of a document | the most common language for defining the structure and layout of web pages |
2 | 1 | markup language | series of commands used to format and organize a website | a series of commands used to format, organize and describe information on a webpage. |
2 | 1 | markup language | a language that uses tags to annotate the information in a document. | lets you annotate text to define how it should be displayed. |
1 | 0 | markup language | a document language that contains tags that describe a document's content and appearance. | the most common language for defining the structure and layout of web pages |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.