computer
→
ReceivesAction
→
connected to the internet
|
0.83
|
|
computer
→
ReceivesAction
→
connected to the network
|
0.75
|
|
computer
→
ReceivesAction
→
connected
|
0.72
|
|
computer
→
ReceivesAction
→
connected to wireless network
|
0.69
|
|
computer
→
ReceivesAction
→
protected
|
0.68
|
|
computer
→
ReceivesAction
→
protected against virus
|
0.68
|
|
computer
→
ReceivesAction
→
powered
|
0.67
|
|
computer
→
ReceivesAction
→
lost
|
0.66
|
|
computer
→
ReceivesAction
→
given a domain name
|
0.66
|
|
computer
→
ReceivesAction
→
connected to each other
|
0.66
|
|
computer
→
ReceivesAction
→
configured
|
0.65
|
|
computer
→
ReceivesAction
→
connected to the lan
|
0.65
|
|
computer
→
ReceivesAction
→
connected to the router
|
0.65
|
|
computer
→
ReceivesAction
→
restarted
|
0.65
|
|
computer
→
ReceivesAction
→
infected
|
0.65
|
|
computer
→
ReceivesAction
→
repaired
|
0.65
|
|
computer
→
ReceivesAction
→
networked
|
0.65
|
|
computer
→
ReceivesAction
→
joined to domain
|
0.64
|
|
computer
→
ReceivesAction
→
programmed
|
0.64
|
|
computer
→
ReceivesAction
→
connected to same network
|
0.64
|
|
computer
→
ReceivesAction
→
connected to the printer
|
0.64
|
|
computer
→
ReceivesAction
→
booted
|
0.64
|
|
computer
→
ReceivesAction
→
removed
|
0.64
|
|
computer
→
ReceivesAction
→
free of virus
|
0.64
|
|
computer
→
ReceivesAction
→
given a set of numbers
|
0.63
|
|
computer
→
ReceivesAction
→
started
|
0.63
|
|
computer
→
ReceivesAction
→
updated
|
0.62
|
|
computer
→
ReceivesAction
→
cleaned
|
0.62
|
|
computer
→
ReceivesAction
→
connected to local network
|
0.62
|
|
computer
→
ReceivesAction
→
made
|
0.62
|
|
computer
→
ReceivesAction
→
permitted by license
|
0.61
|
|
computer
→
ReceivesAction
→
attached to the network
|
0.61
|
|
computer
→
ReceivesAction
→
fixed
|
0.61
|
|
computer
→
ReceivesAction
→
attached to the internet
|
0.61
|
|
computer
→
ReceivesAction
→
activated
|
0.61
|
|
computer
→
ReceivesAction
→
created
|
0.61
|
|
computer
→
ReceivesAction
→
handled by expert
|
0.61
|
|
computer
→
ReceivesAction
→
built
|
0.61
|
|
computer
→
ReceivesAction
→
connected by cable
|
0.60
|
|
computer
→
ReceivesAction
→
monitored
|
0.60
|
|
computer
→
ReceivesAction
→
operated
|
0.60
|
|
computer
→
ReceivesAction
→
connected to switch
|
0.60
|
|
computer
→
ReceivesAction
→
free of malware
|
0.60
|
|
computer
→
ReceivesAction
→
provided with an ip address
|
0.60
|
|
computer
→
ReceivesAction
→
tested
|
0.60
|
|
computer
→
ReceivesAction
→
designed
|
0.60
|
|
computer
→
ReceivesAction
→
upgraded to windows
|
0.60
|
|
computer
→
ReceivesAction
→
used by student
|
0.60
|
|
computer
→
ReceivesAction
→
installed
|
0.60
|
|
computer
→
ReceivesAction
→
used in business
|
0.60
|
|
computer
→
ReceivesAction
→
replaced
|
0.60
|
|
computer
→
ReceivesAction
→
linked
|
0.60
|
|
computer
→
ReceivesAction
→
checked
|
0.60
|
|
computer
→
ReceivesAction
→
connected to the hub
|
0.60
|
|
computer
→
ReceivesAction
→
locked
|
0.60
|
|
computer
→
ReceivesAction
→
upgraded
|
0.59
|
|
computer
→
ReceivesAction
→
sold
|
0.59
|
|
computer
→
ReceivesAction
→
recycled
|
0.59
|
|
computer
→
ReceivesAction
→
wiped
|
0.59
|
|
computer
→
ReceivesAction
→
connected to domain
|
0.58
|
|
computer
→
ReceivesAction
→
selected
|
0.58
|
|
computer
→
ReceivesAction
→
shutdown
|
0.58
|
|
computer
→
ReceivesAction
→
stored
|
0.58
|
|
computer
→
ReceivesAction
→
limited
|
0.58
|
|
computer
→
ReceivesAction
→
assigned an ip address
|
0.58
|
|
computer
→
ReceivesAction
→
hardwired
|
0.58
|
|
computer
→
ReceivesAction
→
used in school
|
0.58
|
|
computer
→
ReceivesAction
→
infected with malware
|
0.58
|
|
computer
→
ReceivesAction
→
restored
|
0.58
|
|
computer
→
ReceivesAction
→
infected with virus
|
0.57
|
|
computer
→
ReceivesAction
→
interconnected
|
0.57
|
|
computer
→
ReceivesAction
→
used in a wan networking enviro…
|
0.57
|
|
computer
→
ReceivesAction
→
invented
|
0.57
|
|
computer
→
ReceivesAction
→
connected to the web
|
0.57
|
|
computer
→
ReceivesAction
→
linked to the internet
|
0.57
|
|
computer
→
ReceivesAction
→
unlocked
|
0.57
|
|
computer
→
ReceivesAction
→
linked to the network
|
0.57
|
|
computer
→
ReceivesAction
→
protected by firewall
|
0.57
|
|
computer
→
ReceivesAction
→
shared
|
0.56
|
|
computer
→
ReceivesAction
→
supported
|
0.56
|
|
computer
→
ReceivesAction
→
trained
|
0.56
|
|
computer
→
ReceivesAction
→
scanned
|
0.56
|
|
computer
→
ReceivesAction
→
connected to the server
|
0.56
|
|
computer
→
ReceivesAction
→
controlled
|
0.56
|
|
computer
→
ReceivesAction
→
connected to the net
|
0.56
|
|
computer
→
ReceivesAction
→
connected by network
|
0.56
|
|
computer
→
ReceivesAction
→
equipped with windows
|
0.56
|
|
computer
→
ReceivesAction
→
protected against malicious sof…
|
0.56
|
|
computer
→
ReceivesAction
→
identified
|
0.56
|
|
computer
→
ReceivesAction
→
reformatted
|
0.56
|
|
computer
→
ReceivesAction
→
used by teacher
|
0.56
|
|
computer
→
ReceivesAction
→
connected to wireless
|
0.55
|
|
computer
→
ReceivesAction
→
coupled to the internet
|
0.55
|
|
computer
→
ReceivesAction
→
connected to the device
|
0.55
|
|
computer
→
ReceivesAction
→
protected by password
|
0.55
|
|
computer
→
ReceivesAction
→
patched
|
0.55
|
|
computer
→
ReceivesAction
→
registered
|
0.55
|
|
computer
→
ReceivesAction
→
infected with spyware
|
0.55
|
|
computer
→
ReceivesAction
→
managed
|
0.55
|
|
computer
→
ReceivesAction
→
used in home
|
0.55
|
|
computer
→
ReceivesAction
→
infected with ransomware
|
0.54
|
|
computer
→
ReceivesAction
→
equipped
|
0.54
|
|
computer
→
ReceivesAction
→
connected by telephone lines
|
0.54
|
|
computer
→
ReceivesAction
→
equipped with internet access
|
0.54
|
|
computer
→
ReceivesAction
→
connected via the internet
|
0.54
|
|
computer
→
ReceivesAction
→
rebooted
|
0.54
|
|
computer
→
ReceivesAction
→
used in education
|
0.54
|
|
computer
→
ReceivesAction
→
shown in fig
|
0.53
|
|
computer
→
ReceivesAction
→
serviced
|
0.53
|
|
computer
→
ReceivesAction
→
affected
|
0.53
|
|
computer
→
ReceivesAction
→
used by individual
|
0.53
|
|
computer
→
ReceivesAction
→
owned
|
0.53
|
|
computer
→
ReceivesAction
→
maintained
|
0.53
|
|
computer
→
ReceivesAction
→
equipped with software
|
0.53
|
|
computer
→
ReceivesAction
→
unable to connect
|
0.53
|
|
computer
→
ReceivesAction
→
hacked
|
0.52
|
|
computer
→
ReceivesAction
→
broken
|
0.52
|
|
computer
→
ReceivesAction
→
connected to local area network
|
0.52
|
|
computer
→
ReceivesAction
→
used in office
|
0.52
|
|
computer
→
ReceivesAction
→
modified
|
0.52
|
|
computer
→
ReceivesAction
→
used in government
|
0.52
|
|
computer
→
ReceivesAction
→
changed
|
0.52
|
|
computer
→
ReceivesAction
→
delivered
|
0.52
|
|
computer
→
ReceivesAction
→
set
|
0.52
|
|
computer
→
ReceivesAction
→
moved
|
0.52
|
|
computer
→
ReceivesAction
→
compromised
|
0.52
|
|
computer
→
ReceivesAction
→
shown
|
0.51
|
|
computer
→
ReceivesAction
→
attacked
|
0.51
|
|
computer
→
ReceivesAction
→
assembled
|
0.51
|
|
computer
→
ReceivesAction
→
wired
|
0.51
|
|
computer
→
ReceivesAction
→
managed by update management
|
0.51
|
|
computer
→
ReceivesAction
→
kept
|
0.51
|
|
computer
→
ReceivesAction
→
hidden
|
0.51
|
|
computer
→
ReceivesAction
→
connected to the campus network
|
0.51
|
|
computer
→
ReceivesAction
→
guarded
|
0.51
|
|
computer
→
ReceivesAction
→
protected against the latest sp…
|
0.51
|
|
computer
→
ReceivesAction
→
stolen
|
0.50
|
|
computer
→
ReceivesAction
→
formatted
|
0.50
|
|
computer
→
ReceivesAction
→
used by engineer
|
0.50
|
|
computer
→
ReceivesAction
→
connected to other computers
|
0.50
|
|
computer
→
ReceivesAction
→
isolated
|
0.49
|
|
computer
→
ReceivesAction
→
destroyed
|
0.49
|
|
computer
→
ReceivesAction
→
used in the classroom
|
0.49
|
|
computer
→
ReceivesAction
→
loaded
|
0.49
|
|
computer
→
ReceivesAction
→
adjusted
|
0.48
|
|
computer
→
ReceivesAction
→
protected against hazardous web…
|
0.48
|
|
computer
→
ReceivesAction
→
concerned
|
0.48
|
|
computer
→
ReceivesAction
→
coupled to receive datum
|
0.48
|
|
computer
→
ReceivesAction
→
placed in the border router's d…
|
0.48
|
|
computer
→
ReceivesAction
→
provided
|
0.47
|
|
computer
→
ReceivesAction
→
used in way
|
0.47
|
|
computer
→
ReceivesAction
→
shut
|
0.47
|
|
computer
→
ReceivesAction
→
developed
|
0.47
|
|
computer
→
ReceivesAction
→
disconnected
|
0.47
|
|
computer
→
ReceivesAction
→
equipped with microsoft office
|
0.46
|
|
computer
→
ReceivesAction
→
infected with trojan
|
0.46
|
|
computer
→
ReceivesAction
→
described
|
0.46
|
|
computer
→
ReceivesAction
→
disassembled
|
0.46
|
|
computer
→
ReceivesAction
→
required
|
0.46
|
|
computer
→
ReceivesAction
→
used by user
|
0.46
|
|
computer
→
ReceivesAction
→
released
|
0.45
|
|
computer
→
ReceivesAction
→
encrypted
|
0.45
|
|
computer
→
ReceivesAction
→
connected to same wireless netw…
|
0.45
|
|
computer
→
ReceivesAction
→
coupled to network
|
0.45
|
|
computer
→
ReceivesAction
→
introduced
|
0.45
|
|
computer
→
ReceivesAction
→
refurbished
|
0.45
|
|
computer
→
ReceivesAction
→
used as tool
|
0.45
|
|
computer
→
ReceivesAction
→
connected to same router
|
0.44
|
|
computer
→
ReceivesAction
→
used to access browser type
|
0.44
|
|
computer
→
ReceivesAction
→
unplugged
|
0.44
|
|
computer
→
ReceivesAction
→
used as control systems
|
0.44
|
|
computer
→
ReceivesAction
→
added
|
0.44
|
|
computer
→
ReceivesAction
→
connected via wifi
|
0.44
|
|
computer
→
ReceivesAction
→
connected to the modem
|
0.43
|
|
computer
→
ReceivesAction
→
embedded in another device
|
0.43
|
|
computer
→
ReceivesAction
→
connected to projector
|
0.43
|
|
computer
→
ReceivesAction
→
left unattended
|
0.43
|
|
computer
→
ReceivesAction
→
operable to communicate
|
0.42
|
|
computer
→
ReceivesAction
→
unable to cope
|
0.42
|
|
computer
→
ReceivesAction
→
produced
|
0.42
|
|
computer
→
ReceivesAction
→
connected via ethernet
|
0.42
|
|
computer
→
ReceivesAction
→
used in a lan networking enviro…
|
0.41
|
|
computer
→
ReceivesAction
→
unable to decipher the informat…
|
0.41
|
|
computer
→
ReceivesAction
→
protected by physical
|
0.41
|
|
computer
→
ReceivesAction
→
trusted
|
0.41
|
|
computer
→
ReceivesAction
→
used to access the ip address
|
0.41
|
|
computer
→
ReceivesAction
→
associated with the meeting spot
|
0.41
|
|
computer
→
ReceivesAction
→
priced
|
0.40
|
|
computer
→
ReceivesAction
→
protected by procedure
|
0.40
|
|
computer
→
ReceivesAction
→
protected by reasonable technol…
|
0.40
|
|
computer
→
ReceivesAction
→
sent
|
0.40
|
|
computer
→
ReceivesAction
→
damaged
|
0.40
|
|
computer
→
ReceivesAction
→
controlled by hacker
|
0.40
|
|
computer
→
ReceivesAction
→
equipped with pre-installed sof…
|
0.40
|
|
computer
→
ReceivesAction
→
interconnected via a communicat…
|
0.40
|
|
computer
→
ReceivesAction
→
used in bank
|
0.40
|
|
computer
→
ReceivesAction
→
managed by the editor
|
0.40
|
|
computer
→
ReceivesAction
→
connected to tv
|
0.40
|
|
computer
→
ReceivesAction
→
generated
|
0.40
|
|
computer
→
ReceivesAction
→
protected against trojan
|
0.40
|
|
computer
→
ReceivesAction
→
recovered
|
0.40
|
|
computer
→
ReceivesAction
→
used in hospital
|
0.40
|
|
computer
→
ReceivesAction
→
connected to the monitor
|
0.39
|
|
computer
→
ReceivesAction
→
connected to wireless router
|
0.39
|
|
computer
→
ReceivesAction
→
programed
|
0.39
|
|
computer
→
ReceivesAction
→
free of spyware
|
0.39
|
|
computer
→
ReceivesAction
→
managed by the owner of the web…
|
0.39
|
|
computer
→
ReceivesAction
→
connected via usb
|
0.39
|
|
computer
→
ReceivesAction
→
known in the art
|
0.39
|
|
computer
→
ReceivesAction
→
put to sleep
|
0.39
|
|
computer
→
ReceivesAction
→
recommended
|
0.39
|
|
computer
→
ReceivesAction
→
applied
|
0.39
|
|
computer
→
ReceivesAction
→
attached by a communications ne…
|
0.39
|
|
computer
→
ReceivesAction
→
opened
|
0.39
|
|
computer
→
ReceivesAction
→
attached
|
0.38
|
|
computer
→
ReceivesAction
→
easy to use
|
0.38
|
|
computer
→
ReceivesAction
→
affected by virus
|
0.37
|
|
computer
→
ReceivesAction
→
prone to virus
|
0.37
|
|
computer
→
ReceivesAction
→
hijacked
|
0.37
|
|
computer
→
ReceivesAction
→
blocked
|
0.37
|
|
computer
→
ReceivesAction
→
confused
|
0.37
|
|
computer
→
ReceivesAction
→
infected with malicious software
|
0.36
|
|
computer
→
ReceivesAction
→
frozen
|
0.35
|
|
computer
→
ReceivesAction
→
seized
|
0.35
|
|
computer
→
ReceivesAction
→
contaminated with spyware
|
0.34
|
|
computer
→
ReceivesAction
→
infected with other malware
|
0.33
|
|
computer
→
ReceivesAction
→
attacked by virus
|
0.33
|
|
computer
→
ReceivesAction
→
riddled with virus
|
0.33
|
|
computer
→
ReceivesAction
→
programmed by people
|
0.32
|
|
computer
→
ReceivesAction
→
unable to boot
|
0.32
|
|
computer
→
ReceivesAction
→
contaminated with virus
|
0.31
|
|
computer
→
ReceivesAction
→
targeted
|
0.30
|
|
computer
→
ReceivesAction
→
expanded as hardware
|
0.30
|
|
computer
→
ReceivesAction
→
expanded as programming
|
0.30
|
|
computer
→
ReceivesAction
→
expanded as software
|
0.30
|
|
computer
→
ReceivesAction
→
corrupted
|
0.28
|
|
computer
→
ReceivesAction
→
dropped
|
0.27
|
|
computer
→
ReceivesAction
→
logged
|
0.23
|
|