computer network
→
ReceivesAction
→
connected
|
0.66
|
|
computer network
→
ReceivesAction
→
connected via cable
|
0.47
|
|
computer network
→
ReceivesAction
→
embodied as a fibre channel fcn…
|
0.36
|
|
computer network
→
ReceivesAction
→
embodied as an ethernet network
|
0.36
|
|
computer network
→
ReceivesAction
→
connected to communication
|
0.34
|
|
computer network
→
ReceivesAction
→
interconnected by router
|
0.32
|
|
computer network
→
ReceivesAction
→
characterized by their size
|
0.29
|
|
computer network
→
ReceivesAction
→
connected to navigation
|
0.29
|
|
computer network
→
ReceivesAction
→
used by business
|
0.29
|
|
computer network
→
ReceivesAction
→
hacked
|
0.26
|
|
computer network
→
ReceivesAction
→
characterized by their purpose
|
0.25
|
|
computer network
→
ReceivesAction
→
classified as metropolitan area…
|
0.25
|
|
computer network
→
ReceivesAction
→
classified as personal area net…
|
0.25
|
|
computer network
→
ReceivesAction
→
classified as wide area networks
|
0.25
|
|
computer network
→
ReceivesAction
→
connected through ethernet cabl…
|
0.25
|
|
computer network
→
ReceivesAction
→
connected through phone lines
|
0.25
|
|
computer network
→
ReceivesAction
→
connected through wirelessly
|
0.25
|
|
computer network
→
ReceivesAction
→
designed to give internet access
|
0.25
|
|
computer network
→
ReceivesAction
→
implemented in accordance
|
0.25
|
|
computer network
→
ReceivesAction
→
shown
|
0.25
|
|
computer network
→
ReceivesAction
→
used to deploy computer viruses
|
0.16
|
|
computer network
→
ReceivesAction
→
used to deploy computer worms
|
0.16
|
|