| computer → ReceivesAction → connected to the internet | 0.83 | |
| computer → ReceivesAction → connected to the network | 0.75 | |
| computer → ReceivesAction → connected | 0.72 | |
| computer → ReceivesAction → connected to wireless network | 0.69 | |
| computer → ReceivesAction → protected | 0.68 | |
| computer → ReceivesAction → protected against virus | 0.68 | |
| computer → ReceivesAction → powered | 0.67 | |
| computer → ReceivesAction → lost | 0.66 | |
| computer → ReceivesAction → given a domain name | 0.66 | |
| computer → ReceivesAction → connected to each other | 0.66 | |
| computer → ReceivesAction → configured | 0.65 | |
| computer → ReceivesAction → connected to the lan | 0.65 | |
| computer → ReceivesAction → connected to the router | 0.65 | |
| computer → ReceivesAction → restarted | 0.65 | |
| computer → ReceivesAction → infected | 0.65 | |
| computer → ReceivesAction → repaired | 0.65 | |
| computer → ReceivesAction → networked | 0.65 | |
| computer → ReceivesAction → joined to domain | 0.64 | |
| computer → ReceivesAction → programmed | 0.64 | |
| computer → ReceivesAction → connected to same network | 0.64 | |
| computer → ReceivesAction → connected to the printer | 0.64 | |
| computer → ReceivesAction → booted | 0.64 | |
| computer → ReceivesAction → removed | 0.64 | |
| computer → ReceivesAction → free of virus | 0.64 | |
| computer → ReceivesAction → given a set of numbers | 0.63 | |
| computer → ReceivesAction → started | 0.63 | |
| computer → ReceivesAction → updated | 0.62 | |
| computer → ReceivesAction → cleaned | 0.62 | |
| computer → ReceivesAction → connected to local network | 0.62 | |
| computer → ReceivesAction → made | 0.62 | |
| computer → ReceivesAction → permitted by license | 0.61 | |
| computer → ReceivesAction → attached to the network | 0.61 | |
| computer → ReceivesAction → fixed | 0.61 | |
| computer → ReceivesAction → attached to the internet | 0.61 | |
| computer → ReceivesAction → activated | 0.61 | |
| computer → ReceivesAction → created | 0.61 | |
| computer → ReceivesAction → handled by expert | 0.61 | |
| computer → ReceivesAction → built | 0.61 | |
| computer → ReceivesAction → connected by cable | 0.60 | |
| computer → ReceivesAction → monitored | 0.60 | |
| computer → ReceivesAction → operated | 0.60 | |
| computer → ReceivesAction → connected to switch | 0.60 | |
| computer → ReceivesAction → free of malware | 0.60 | |
| computer → ReceivesAction → provided with an ip address | 0.60 | |
| computer → ReceivesAction → tested | 0.60 | |
| computer → ReceivesAction → designed | 0.60 | |
| computer → ReceivesAction → upgraded to windows | 0.60 | |
| computer → ReceivesAction → used by student | 0.60 | |
| computer → ReceivesAction → installed | 0.60 | |
| computer → ReceivesAction → used in business | 0.60 | |
| computer → ReceivesAction → replaced | 0.60 | |
| computer → ReceivesAction → linked | 0.60 | |
| computer → ReceivesAction → checked | 0.60 | |
| computer → ReceivesAction → connected to the hub | 0.60 | |
| computer → ReceivesAction → locked | 0.60 | |
| computer → ReceivesAction → upgraded | 0.59 | |
| computer → ReceivesAction → sold | 0.59 | |
| computer → ReceivesAction → recycled | 0.59 | |
| computer → ReceivesAction → wiped | 0.59 | |
| computer → ReceivesAction → connected to domain | 0.58 | |
| computer → ReceivesAction → selected | 0.58 | |
| computer → ReceivesAction → shutdown | 0.58 | |
| computer → ReceivesAction → stored | 0.58 | |
| computer → ReceivesAction → limited | 0.58 | |
| computer → ReceivesAction → assigned an ip address | 0.58 | |
| computer → ReceivesAction → hardwired | 0.58 | |
| computer → ReceivesAction → used in school | 0.58 | |
| computer → ReceivesAction → infected with malware | 0.58 | |
| computer → ReceivesAction → restored | 0.58 | |
| computer → ReceivesAction → infected with virus | 0.57 | |
| computer → ReceivesAction → interconnected | 0.57 | |
| computer → ReceivesAction → used in a wan networking enviro… | 0.57 | |
| computer → ReceivesAction → invented | 0.57 | |
| computer → ReceivesAction → connected to the web | 0.57 | |
| computer → ReceivesAction → linked to the internet | 0.57 | |
| computer → ReceivesAction → unlocked | 0.57 | |
| computer → ReceivesAction → linked to the network | 0.57 | |
| computer → ReceivesAction → protected by firewall | 0.57 | |
| computer → ReceivesAction → shared | 0.56 | |
| computer → ReceivesAction → supported | 0.56 | |
| computer → ReceivesAction → trained | 0.56 | |
| computer → ReceivesAction → scanned | 0.56 | |
| computer → ReceivesAction → connected to the server | 0.56 | |
| computer → ReceivesAction → controlled | 0.56 | |
| computer → ReceivesAction → connected to the net | 0.56 | |
| computer → ReceivesAction → connected by network | 0.56 | |
| computer → ReceivesAction → equipped with windows | 0.56 | |
| computer → ReceivesAction → protected against malicious sof… | 0.56 | |
| computer → ReceivesAction → identified | 0.56 | |
| computer → ReceivesAction → reformatted | 0.56 | |
| computer → ReceivesAction → used by teacher | 0.56 | |
| computer → ReceivesAction → connected to wireless | 0.55 | |
| computer → ReceivesAction → coupled to the internet | 0.55 | |
| computer → ReceivesAction → connected to the device | 0.55 | |
| computer → ReceivesAction → protected by password | 0.55 | |
| computer → ReceivesAction → patched | 0.55 | |
| computer → ReceivesAction → registered | 0.55 | |
| computer → ReceivesAction → infected with spyware | 0.55 | |
| computer → ReceivesAction → managed | 0.55 | |
| computer → ReceivesAction → used in home | 0.55 | |
| computer → ReceivesAction → infected with ransomware | 0.54 | |
| computer → ReceivesAction → equipped | 0.54 | |
| computer → ReceivesAction → connected by telephone lines | 0.54 | |
| computer → ReceivesAction → equipped with internet access | 0.54 | |
| computer → ReceivesAction → connected via the internet | 0.54 | |
| computer → ReceivesAction → rebooted | 0.54 | |
| computer → ReceivesAction → used in education | 0.54 | |
| computer → ReceivesAction → shown in fig | 0.53 | |
| computer → ReceivesAction → serviced | 0.53 | |
| computer → ReceivesAction → affected | 0.53 | |
| computer → ReceivesAction → used by individual | 0.53 | |
| computer → ReceivesAction → owned | 0.53 | |
| computer → ReceivesAction → maintained | 0.53 | |
| computer → ReceivesAction → equipped with software | 0.53 | |
| computer → ReceivesAction → unable to connect | 0.53 | |
| computer → ReceivesAction → hacked | 0.52 | |
| computer → ReceivesAction → broken | 0.52 | |
| computer → ReceivesAction → connected to local area network | 0.52 | |
| computer → ReceivesAction → used in office | 0.52 | |
| computer → ReceivesAction → modified | 0.52 | |
| computer → ReceivesAction → used in government | 0.52 | |
| computer → ReceivesAction → changed | 0.52 | |
| computer → ReceivesAction → delivered | 0.52 | |
| computer → ReceivesAction → set | 0.52 | |
| computer → ReceivesAction → moved | 0.52 | |
| computer → ReceivesAction → compromised | 0.52 | |
| computer → ReceivesAction → shown | 0.51 | |
| computer → ReceivesAction → attacked | 0.51 | |
| computer → ReceivesAction → assembled | 0.51 | |
| computer → ReceivesAction → wired | 0.51 | |
| computer → ReceivesAction → managed by update management | 0.51 | |
| computer → ReceivesAction → kept | 0.51 | |
| computer → ReceivesAction → hidden | 0.51 | |
| computer → ReceivesAction → connected to the campus network | 0.51 | |
| computer → ReceivesAction → guarded | 0.51 | |
| computer → ReceivesAction → protected against the latest sp… | 0.51 | |
| computer → ReceivesAction → stolen | 0.50 | |
| computer → ReceivesAction → formatted | 0.50 | |
| computer → ReceivesAction → used by engineer | 0.50 | |
| computer → ReceivesAction → connected to other computers | 0.50 | |
| computer → ReceivesAction → isolated | 0.49 | |
| computer → ReceivesAction → destroyed | 0.49 | |
| computer → ReceivesAction → used in the classroom | 0.49 | |
| computer → ReceivesAction → loaded | 0.49 | |
| computer → ReceivesAction → adjusted | 0.48 | |
| computer → ReceivesAction → protected against hazardous web… | 0.48 | |
| computer → ReceivesAction → concerned | 0.48 | |
| computer → ReceivesAction → coupled to receive datum | 0.48 | |
| computer → ReceivesAction → placed in the border router's d… | 0.48 | |
| computer → ReceivesAction → provided | 0.47 | |
| computer → ReceivesAction → used in way | 0.47 | |
| computer → ReceivesAction → shut | 0.47 | |
| computer → ReceivesAction → developed | 0.47 | |
| computer → ReceivesAction → disconnected | 0.47 | |
| computer → ReceivesAction → equipped with microsoft office | 0.46 | |
| computer → ReceivesAction → infected with trojan | 0.46 | |
| computer → ReceivesAction → described | 0.46 | |
| computer → ReceivesAction → disassembled | 0.46 | |
| computer → ReceivesAction → required | 0.46 | |
| computer → ReceivesAction → used by user | 0.46 | |
| computer → ReceivesAction → released | 0.45 | |
| computer → ReceivesAction → encrypted | 0.45 | |
| computer → ReceivesAction → connected to same wireless netw… | 0.45 | |
| computer → ReceivesAction → coupled to network | 0.45 | |
| computer → ReceivesAction → introduced | 0.45 | |
| computer → ReceivesAction → refurbished | 0.45 | |
| computer → ReceivesAction → used as tool | 0.45 | |
| computer → ReceivesAction → connected to same router | 0.44 | |
| computer → ReceivesAction → used to access browser type | 0.44 | |
| computer → ReceivesAction → unplugged | 0.44 | |
| computer → ReceivesAction → used as control systems | 0.44 | |
| computer → ReceivesAction → added | 0.44 | |
| computer → ReceivesAction → connected via wifi | 0.44 | |
| computer → ReceivesAction → connected to the modem | 0.43 | |
| computer → ReceivesAction → embedded in another device | 0.43 | |
| computer → ReceivesAction → connected to projector | 0.43 | |
| computer → ReceivesAction → left unattended | 0.43 | |
| computer → ReceivesAction → operable to communicate | 0.42 | |
| computer → ReceivesAction → unable to cope | 0.42 | |
| computer → ReceivesAction → produced | 0.42 | |
| computer → ReceivesAction → connected via ethernet | 0.42 | |
| computer → ReceivesAction → used in a lan networking enviro… | 0.41 | |
| computer → ReceivesAction → unable to decipher the informat… | 0.41 | |
| computer → ReceivesAction → protected by physical | 0.41 | |
| computer → ReceivesAction → trusted | 0.41 | |
| computer → ReceivesAction → used to access the ip address | 0.41 | |
| computer → ReceivesAction → associated with the meeting spot | 0.41 | |
| computer → ReceivesAction → priced | 0.40 | |
| computer → ReceivesAction → protected by procedure | 0.40 | |
| computer → ReceivesAction → protected by reasonable technol… | 0.40 | |
| computer → ReceivesAction → sent | 0.40 | |
| computer → ReceivesAction → damaged | 0.40 | |
| computer → ReceivesAction → controlled by hacker | 0.40 | |
| computer → ReceivesAction → equipped with pre-installed sof… | 0.40 | |
| computer → ReceivesAction → interconnected via a communicat… | 0.40 | |
| computer → ReceivesAction → used in bank | 0.40 | |
| computer → ReceivesAction → managed by the editor | 0.40 | |
| computer → ReceivesAction → connected to tv | 0.40 | |
| computer → ReceivesAction → generated | 0.40 | |
| computer → ReceivesAction → protected against trojan | 0.40 | |
| computer → ReceivesAction → recovered | 0.40 | |
| computer → ReceivesAction → used in hospital | 0.40 | |
| computer → ReceivesAction → connected to the monitor | 0.39 | |
| computer → ReceivesAction → connected to wireless router | 0.39 | |
| computer → ReceivesAction → programed | 0.39 | |
| computer → ReceivesAction → free of spyware | 0.39 | |
| computer → ReceivesAction → managed by the owner of the web… | 0.39 | |
| computer → ReceivesAction → connected via usb | 0.39 | |
| computer → ReceivesAction → known in the art | 0.39 | |
| computer → ReceivesAction → put to sleep | 0.39 | |
| computer → ReceivesAction → recommended | 0.39 | |
| computer → ReceivesAction → applied | 0.39 | |
| computer → ReceivesAction → attached by a communications ne… | 0.39 | |
| computer → ReceivesAction → opened | 0.39 | |
| computer → ReceivesAction → attached | 0.38 | |
| computer → ReceivesAction → easy to use | 0.38 | |
| computer → ReceivesAction → affected by virus | 0.37 | |
| computer → ReceivesAction → prone to virus | 0.37 | |
| computer → ReceivesAction → hijacked | 0.37 | |
| computer → ReceivesAction → blocked | 0.37 | |
| computer → ReceivesAction → confused | 0.37 | |
| computer → ReceivesAction → infected with malicious software | 0.36 | |
| computer → ReceivesAction → frozen | 0.35 | |
| computer → ReceivesAction → seized | 0.35 | |
| computer → ReceivesAction → contaminated with spyware | 0.34 | |
| computer → ReceivesAction → infected with other malware | 0.33 | |
| computer → ReceivesAction → attacked by virus | 0.33 | |
| computer → ReceivesAction → riddled with virus | 0.33 | |
| computer → ReceivesAction → programmed by people | 0.32 | |
| computer → ReceivesAction → unable to boot | 0.32 | |
| computer → ReceivesAction → contaminated with virus | 0.31 | |
| computer → ReceivesAction → targeted | 0.30 | |
| computer → ReceivesAction → expanded as hardware | 0.30 | |
| computer → ReceivesAction → expanded as programming | 0.30 | |
| computer → ReceivesAction → expanded as software | 0.30 | |
| computer → ReceivesAction → corrupted | 0.28 | |
| computer → ReceivesAction → dropped | 0.27 | |
| computer → ReceivesAction → logged | 0.23 |