personal computer
→
ReceivesAction
→
connected to the internet
|
0.72
|
|
personal computer
→
ReceivesAction
→
networked
|
0.55
|
|
personal computer
→
ReceivesAction
→
used in a wan networking enviro…
|
0.54
|
|
personal computer
→
ReceivesAction
→
guarded
|
0.53
|
|
personal computer
→
ReceivesAction
→
used at home
|
0.49
|
|
personal computer
→
ReceivesAction
→
introduced
|
0.41
|
|
personal computer
→
ReceivesAction
→
released in 1977
|
0.34
|
|
personal computer
→
ReceivesAction
→
shown in fig
|
0.34
|
|
personal computer
→
ReceivesAction
→
based on an intel microprocessor
|
0.32
|
|
personal computer
→
ReceivesAction
→
coupled to remote server
|
0.32
|
|
personal computer
→
ReceivesAction
→
infected
|
0.32
|
|
personal computer
→
ReceivesAction
→
fixed
|
0.28
|
|
personal computer
→
ReceivesAction
→
designed as single-user systems
|
0.25
|
|
personal computer
→
ReceivesAction
→
programmed with electronic form
|
0.25
|
|
personal computer
→
ReceivesAction
→
rented
|
0.25
|
|
personal computer
→
ReceivesAction
→
hacked
|
0.16
|
|