温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.eb.com/browse/Computers/2
点击访问原文链接

Computers Browse - Page 2 | Britannica

SUBSCRIBESUBSCRIBESUBSCRIBEHomeHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyGames & QuizzesVideosOn This DayOne Good FactDictionaryNew ArticlesHistory & SocietyLifestyles & Social IssuesPhilosophy & ReligionPolitics, Law & GovernmentWorld HistoryScience & TechHealth & MedicineScienceTechnologyBiographiesBrowse BiographiesAnimals & NatureBirds, Reptiles & Other VertebratesEnvironmentFossils & Geologic TimeInsects & Other InvertebratesMammalsPlantsGeography & TravelGeography & TravelArts & CultureEntertainment & Pop CultureLiteratureSports & RecreationVisual ArtsImage GalleriesPodcastsSummariesTop QuestionsLists and StoriesBritannica KidsAsk the ChatbotGames & QuizzesHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyVideosHomeTechnologyComputersBack To Computers Page260-COMCOM-HINHIT-NECNEG-SYSTAB-ZUScomputer scienceIntroductionAlgorithms, Complexity, ProgrammingArchitecture, Organization, AlgorithmsData, Algorithms, StorageNetworking, Communication, ProtocolsParallel, Distributed, ComputingProgramming Languages, Syntax, AlgorithmsEthics, Security, Privacycomputer scripting languagecomputer simulationcomputer viruscomputer visioncomputer wormcomputer-aided software engineeringcomputer-integrated manufacturingconcurrent programmingconnectionismcontent filtercontent management systemcontrol unitConway, LynnCook, Stephen ArthurcoprocessorCorbató, FernandoCray, Seymourcross-validationcryptologyIntroductionEncryption, Security, PrivacyEncryption, Ciphers, SecurityVigenere, Ciphers, EncryptionProduct CiphersSecret Sharing, Encryption, DecryptionCryptanalysis, Encryption, DecryptionAncient, Codes, CiphersWWI, WWII, CodesEncryption, Security, ElectronicsData Encryption, Advanced Encryption, StandardsCSSCYCDahl, Ole-Johandata compressiondata encryptiondata miningIntroductionPattern Mining, Algorithms, Techniquesdata processingdata structuredatabasedatabase management systemDavies, DonaldDeep BluedeepfakeDeepSeekDellDENDRALDennard, Robert H.diffusion modeldigital computerdigital twindigital-to-analog conversionDijkstra, EdsgerDirectXdistributed computingDLLDNA computingDorsey, JackdriverEckert, J. PresperEDSACEllison, Larryembedded processorEmerson, E. AllenEngelbart, DouglasENIACEPROMexpert systemFeigenbaum, Edward AlbertFirefoxFireWireflash memoryfloppy diskFloyd, Robert WForrester, Jay WrightFORTRANfourth-generation languagefree softwareFree Software FoundationfreewareFujitsu LimitedGarriott, RichardGates, Billgenetic algorithmGhonim, WaelGIFGISGitGitHubGoGoogle DocsGoogle GeminiGranville, Evelyngraphical user interfacegraphics processing unitGray, James NicholasHamilton, MargaretHamming, Richard Wesleyhard diskhardwareHartmanis, JurisHartree, Douglas R.Harvard Mark Ihash tablehashtagHassabis, DemisHastings, ReedHewlett, WilliamHewlett-Packard CompanyHillis, DannyHinton, Geoffrey260-COMCOM-HINHIT-NECNEG-SYSTAB-ZUSHomeTechnologyComputersFacebookXYouTubeInstagramAbout Us & Legal InfoAdvertisingContact UsPrivacy PolicyTerms of UseEqual Opportunity

智能索引记录