Assertion list
computer (primary) → ReceivesAction

Results from Ascent++: 238
computerReceivesAction connected to the internet 0.83
computerReceivesAction connected to the network 0.75
computerReceivesAction connected 0.72
computerReceivesAction connected to wireless network 0.69
computerReceivesAction protected 0.68
computerReceivesAction protected against virus 0.68
computerReceivesAction powered 0.67
computerReceivesAction lost 0.66
computerReceivesAction given a domain name 0.66
computerReceivesAction connected to each other 0.66
computerReceivesAction configured 0.65
computerReceivesAction connected to the lan 0.65
computerReceivesAction connected to the router 0.65
computerReceivesAction restarted 0.65
computerReceivesAction infected 0.65
computerReceivesAction repaired 0.65
computerReceivesAction networked 0.65
computerReceivesAction joined to domain 0.64
computerReceivesAction programmed 0.64
computerReceivesAction connected to same network 0.64
computerReceivesAction connected to the printer 0.64
computerReceivesAction booted 0.64
computerReceivesAction removed 0.64
computerReceivesAction free of virus 0.64
computerReceivesAction given a set of numbers 0.63
computerReceivesAction started 0.63
computerReceivesAction updated 0.62
computerReceivesAction cleaned 0.62
computerReceivesAction connected to local network 0.62
computerReceivesAction made 0.62
computerReceivesAction permitted by license 0.61
computerReceivesAction attached to the network 0.61
computerReceivesAction fixed 0.61
computerReceivesAction attached to the internet 0.61
computerReceivesAction activated 0.61
computerReceivesAction created 0.61
computerReceivesAction handled by expert 0.61
computerReceivesAction built 0.61
computerReceivesAction connected by cable 0.60
computerReceivesAction monitored 0.60
computerReceivesAction operated 0.60
computerReceivesAction connected to switch 0.60
computerReceivesAction free of malware 0.60
computerReceivesAction provided with an ip address 0.60
computerReceivesAction tested 0.60
computerReceivesAction designed 0.60
computerReceivesAction upgraded to windows 0.60
computerReceivesAction used by student 0.60
computerReceivesAction installed 0.60
computerReceivesAction used in business 0.60
computerReceivesAction replaced 0.60
computerReceivesAction linked 0.60
computerReceivesAction checked 0.60
computerReceivesAction connected to the hub 0.60
computerReceivesAction locked 0.60
computerReceivesAction upgraded 0.59
computerReceivesAction sold 0.59
computerReceivesAction recycled 0.59
computerReceivesAction wiped 0.59
computerReceivesAction connected to domain 0.58
computerReceivesAction selected 0.58
computerReceivesAction shutdown 0.58
computerReceivesAction stored 0.58
computerReceivesAction limited 0.58
computerReceivesAction assigned an ip address 0.58
computerReceivesAction hardwired 0.58
computerReceivesAction used in school 0.58
computerReceivesAction infected with malware 0.58
computerReceivesAction restored 0.58
computerReceivesAction infected with virus 0.57
computerReceivesAction interconnected 0.57
computerReceivesAction used in a wan networking enviro… 0.57
computerReceivesAction invented 0.57
computerReceivesAction connected to the web 0.57
computerReceivesAction linked to the internet 0.57
computerReceivesAction unlocked 0.57
computerReceivesAction linked to the network 0.57
computerReceivesAction protected by firewall 0.57
computerReceivesAction shared 0.56
computerReceivesAction supported 0.56
computerReceivesAction trained 0.56
computerReceivesAction scanned 0.56
computerReceivesAction connected to the server 0.56
computerReceivesAction controlled 0.56
computerReceivesAction connected to the net 0.56
computerReceivesAction connected by network 0.56
computerReceivesAction equipped with windows 0.56
computerReceivesAction protected against malicious sof… 0.56
computerReceivesAction identified 0.56
computerReceivesAction reformatted 0.56
computerReceivesAction used by teacher 0.56
computerReceivesAction connected to wireless 0.55
computerReceivesAction coupled to the internet 0.55
computerReceivesAction connected to the device 0.55
computerReceivesAction protected by password 0.55
computerReceivesAction patched 0.55
computerReceivesAction registered 0.55
computerReceivesAction infected with spyware 0.55
computerReceivesAction managed 0.55
computerReceivesAction used in home 0.55
computerReceivesAction infected with ransomware 0.54
computerReceivesAction equipped 0.54
computerReceivesAction connected by telephone lines 0.54
computerReceivesAction equipped with internet access 0.54
computerReceivesAction connected via the internet 0.54
computerReceivesAction rebooted 0.54
computerReceivesAction used in education 0.54
computerReceivesAction shown in fig 0.53
computerReceivesAction serviced 0.53
computerReceivesAction affected 0.53
computerReceivesAction used by individual 0.53
computerReceivesAction owned 0.53
computerReceivesAction maintained 0.53
computerReceivesAction equipped with software 0.53
computerReceivesAction unable to connect 0.53
computerReceivesAction hacked 0.52
computerReceivesAction broken 0.52
computerReceivesAction connected to local area network 0.52
computerReceivesAction used in office 0.52
computerReceivesAction modified 0.52
computerReceivesAction used in government 0.52
computerReceivesAction changed 0.52
computerReceivesAction delivered 0.52
computerReceivesAction set 0.52
computerReceivesAction moved 0.52
computerReceivesAction compromised 0.52
computerReceivesAction shown 0.51
computerReceivesAction attacked 0.51
computerReceivesAction assembled 0.51
computerReceivesAction wired 0.51
computerReceivesAction managed by update management 0.51
computerReceivesAction kept 0.51
computerReceivesAction hidden 0.51
computerReceivesAction connected to the campus network 0.51
computerReceivesAction guarded 0.51
computerReceivesAction protected against the latest sp… 0.51
computerReceivesAction stolen 0.50
computerReceivesAction formatted 0.50
computerReceivesAction used by engineer 0.50
computerReceivesAction connected to other computers 0.50
computerReceivesAction isolated 0.49
computerReceivesAction destroyed 0.49
computerReceivesAction used in the classroom 0.49
computerReceivesAction loaded 0.49
computerReceivesAction adjusted 0.48
computerReceivesAction protected against hazardous web… 0.48
computerReceivesAction concerned 0.48
computerReceivesAction coupled to receive datum 0.48
computerReceivesAction placed in the border router's d… 0.48
computerReceivesAction provided 0.47
computerReceivesAction used in way 0.47
computerReceivesAction shut 0.47
computerReceivesAction developed 0.47
computerReceivesAction disconnected 0.47
computerReceivesAction equipped with microsoft office 0.46
computerReceivesAction infected with trojan 0.46
computerReceivesAction described 0.46
computerReceivesAction disassembled 0.46
computerReceivesAction required 0.46
computerReceivesAction used by user 0.46
computerReceivesAction released 0.45
computerReceivesAction encrypted 0.45
computerReceivesAction connected to same wireless netw… 0.45
computerReceivesAction coupled to network 0.45
computerReceivesAction introduced 0.45
computerReceivesAction refurbished 0.45
computerReceivesAction used as tool 0.45
computerReceivesAction connected to same router 0.44
computerReceivesAction used to access browser type 0.44
computerReceivesAction unplugged 0.44
computerReceivesAction used as control systems 0.44
computerReceivesAction added 0.44
computerReceivesAction connected via wifi 0.44
computerReceivesAction connected to the modem 0.43
computerReceivesAction embedded in another device 0.43
computerReceivesAction connected to projector 0.43
computerReceivesAction left unattended 0.43
computerReceivesAction operable to communicate 0.42
computerReceivesAction unable to cope 0.42
computerReceivesAction produced 0.42
computerReceivesAction connected via ethernet 0.42
computerReceivesAction used in a lan networking enviro… 0.41
computerReceivesAction unable to decipher the informat… 0.41
computerReceivesAction protected by physical 0.41
computerReceivesAction trusted 0.41
computerReceivesAction used to access the ip address 0.41
computerReceivesAction associated with the meeting spot 0.41
computerReceivesAction priced 0.40
computerReceivesAction protected by procedure 0.40
computerReceivesAction protected by reasonable technol… 0.40
computerReceivesAction sent 0.40
computerReceivesAction damaged 0.40
computerReceivesAction controlled by hacker 0.40
computerReceivesAction equipped with pre-installed sof… 0.40
computerReceivesAction interconnected via a communicat… 0.40
computerReceivesAction used in bank 0.40
computerReceivesAction managed by the editor 0.40
computerReceivesAction connected to tv 0.40
computerReceivesAction generated 0.40
computerReceivesAction protected against trojan 0.40
computerReceivesAction recovered 0.40
computerReceivesAction used in hospital 0.40
computerReceivesAction connected to the monitor 0.39
computerReceivesAction connected to wireless router 0.39
computerReceivesAction programed 0.39
computerReceivesAction free of spyware 0.39
computerReceivesAction managed by the owner of the web… 0.39
computerReceivesAction connected via usb 0.39
computerReceivesAction known in the art 0.39
computerReceivesAction put to sleep 0.39
computerReceivesAction recommended 0.39
computerReceivesAction applied 0.39
computerReceivesAction attached by a communications ne… 0.39
computerReceivesAction opened 0.39
computerReceivesAction attached 0.38
computerReceivesAction easy to use 0.38
computerReceivesAction affected by virus 0.37
computerReceivesAction prone to virus 0.37
computerReceivesAction hijacked 0.37
computerReceivesAction blocked 0.37
computerReceivesAction confused 0.37
computerReceivesAction infected with malicious software 0.36
computerReceivesAction frozen 0.35
computerReceivesAction seized 0.35
computerReceivesAction contaminated with spyware 0.34
computerReceivesAction infected with other malware 0.33
computerReceivesAction attacked by virus 0.33
computerReceivesAction riddled with virus 0.33
computerReceivesAction programmed by people 0.32
computerReceivesAction unable to boot 0.32
computerReceivesAction contaminated with virus 0.31
computerReceivesAction targeted 0.30
computerReceivesAction expanded as hardware 0.30
computerReceivesAction expanded as programming 0.30
computerReceivesAction expanded as software 0.30
computerReceivesAction corrupted 0.28
computerReceivesAction dropped 0.27
computerReceivesAction logged 0.23