| personal computer → ReceivesAction → connected to the internet | 0.72 | |
| personal computer → ReceivesAction → networked | 0.55 | |
| personal computer → ReceivesAction → used in a wan networking enviro… | 0.54 | |
| personal computer → ReceivesAction → guarded | 0.53 | |
| personal computer → ReceivesAction → used at home | 0.49 | |
| personal computer → ReceivesAction → introduced | 0.41 | |
| personal computer → ReceivesAction → released in 1977 | 0.34 | |
| personal computer → ReceivesAction → shown in fig | 0.34 | |
| personal computer → ReceivesAction → based on an intel microprocessor | 0.32 | |
| personal computer → ReceivesAction → coupled to remote server | 0.32 | |
| personal computer → ReceivesAction → infected | 0.32 | |
| personal computer → ReceivesAction → fixed | 0.28 | |
| personal computer → ReceivesAction → designed as single-user systems | 0.25 | |
| personal computer → ReceivesAction → programmed with electronic form | 0.25 | |
| personal computer → ReceivesAction → rented | 0.25 | |
| personal computer → ReceivesAction → hacked | 0.16 |