Assertion list
operating system (aspect of computer ) → ReceivesAction

Results from Ascent++: 94
operating systemReceivesAction installed 0.66
operating systemReceivesAction updated 0.61
operating systemReceivesAction kept 0.61
operating systemReceivesAction supported 0.59
operating systemReceivesAction developed by microsoft 0.57
operating systemReceivesAction utilized 0.57
operating systemReceivesAction stored on disk storage 0.53
operating systemReceivesAction installed on the computer 0.51
operating systemReceivesAction reinstalled 0.51
operating systemReceivesAction embedded within firmware of the… 0.49
operating systemReceivesAction stored in rom 0.48
operating systemReceivesAction developed 0.47
operating systemReceivesAction restored 0.46
operating systemReceivesAction used on the computer 0.46
operating systemReceivesAction released 0.44
operating systemReceivesAction booted 0.44
operating systemReceivesAction deployed 0.44
operating systemReceivesAction changed 0.43
operating systemReceivesAction described in fig 0.43
operating systemReceivesAction loaded into ram 0.42
operating systemReceivesAction stored in memory 0.42
operating systemReceivesAction described in greater detail 0.41
operating systemReceivesAction instructed to trust content 0.41
operating systemReceivesAction limited 0.41
operating systemReceivesAction patched 0.40
operating systemReceivesAction run 0.40
operating systemReceivesAction built 0.39
operating systemReceivesAction designed to reduce consequent h… 0.39
operating systemReceivesAction concerned 0.38
operating systemReceivesAction shown in ram 0.38
operating systemReceivesAction protected 0.36
operating systemReceivesAction started 0.35
operating systemReceivesAction used as working operating system 0.35
operating systemReceivesAction comprised of instruction 0.34
operating systemReceivesAction loaded into memory 0.34
operating systemReceivesAction susceptible to virus 0.34
operating systemReceivesAction updated with the latest securit… 0.34
operating systemReceivesAction based 0.32
operating systemReceivesAction designed for mobile devices 0.32
operating systemReceivesAction utilized to control the operati… 0.32
operating systemReceivesAction written 0.32
operating systemReceivesAction bought with the computer 0.30
operating systemReceivesAction pre 0.30
operating systemReceivesAction released in 1999 0.30
operating systemReceivesAction restarted 0.30
operating systemReceivesAction stored on mass storage 0.30
operating systemReceivesAction used by the visitor 0.30
operating systemReceivesAction activated 0.28
operating systemReceivesAction based on the linux kernel 0.28
operating systemReceivesAction developed by apple 0.28
operating systemReceivesAction distributed among the operating… 0.28
operating systemReceivesAction encrypted 0.28
operating systemReceivesAction executed within virtual machine 0.28
operating systemReceivesAction installed on known secure compu… 0.28
operating systemReceivesAction repaired 0.28
operating systemReceivesAction responsible for security 0.28
operating systemReceivesAction shown to conform to their defin… 0.28
operating systemReceivesAction used in academia 0.28
operating systemReceivesAction damaged 0.27
operating systemReceivesAction affected 0.25
operating systemReceivesAction associated with customer contro… 0.25
operating systemReceivesAction based on next's nextstep 0.25
operating systemReceivesAction based on the computer's process… 0.25
operating systemReceivesAction built on the windows nt kernel 0.25
operating systemReceivesAction certified by the open group 0.25
operating systemReceivesAction comprised of computer program i… 0.25
operating systemReceivesAction designated by the service agent 0.25
operating systemReceivesAction displayed on the monitor 0.25
operating systemReceivesAction installed on hard drive 0.25
operating systemReceivesAction installed on the desktop 0.25
operating systemReceivesAction known in the art 0.25
operating systemReceivesAction performed 0.25
operating systemReceivesAction prepared with sysprep 0.25
operating systemReceivesAction protected by normal two level h… 0.25
operating systemReceivesAction released in 2001 0.25
operating systemReceivesAction run on any computer 0.25
operating systemReceivesAction shown 0.25
operating systemReceivesAction stored in read-only memory 0.25
operating systemReceivesAction stored on storage 1024 0.25
operating systemReceivesAction upgraded to windows 0.25
operating systemReceivesAction used including other suitable o… 0.25
operating systemReceivesAction used including palm os 0.25
operating systemReceivesAction compromised 0.25
operating systemReceivesAction improved 0.23
operating systemReceivesAction re 0.23
operating systemReceivesAction easy to use 0.21
operating systemReceivesAction simplified for use 0.21
operating systemReceivesAction chosen for the ibm pc 0.19
operating systemReceivesAction installed to domain 0.19
operating systemReceivesAction infected 0.16
operating systemReceivesAction presented as a phone operating … 0.16
operating systemReceivesAction tested 0.16
operating systemReceivesAction used in other embodiments 0.16
operating systemReceivesAction selected 0.09