internet
→
ReceivesAction
→
governed
|
0.66
|
|
internet
→
ReceivesAction
→
connected
|
0.65
|
|
internet
→
ReceivesAction
→
built
|
0.64
|
|
internet
→
ReceivesAction
→
managed
|
0.61
|
|
internet
→
ReceivesAction
→
designed
|
0.61
|
|
internet
→
ReceivesAction
→
accessed
|
0.60
|
|
internet
→
ReceivesAction
→
limited
|
0.60
|
|
internet
→
ReceivesAction
→
operated by other third parties
|
0.60
|
|
internet
→
ReceivesAction
→
operated by third party vendors
|
0.58
|
|
internet
→
ReceivesAction
→
utilized
|
0.55
|
|
internet
→
ReceivesAction
→
created
|
0.55
|
|
internet
→
ReceivesAction
→
used by government
|
0.55
|
|
internet
→
ReceivesAction
→
treated
|
0.54
|
|
internet
→
ReceivesAction
→
controlled by corporation
|
0.53
|
|
internet
→
ReceivesAction
→
meant to be free
|
0.53
|
|
internet
→
ReceivesAction
→
invented
|
0.53
|
|
internet
→
ReceivesAction
→
used by academia
|
0.53
|
|
internet
→
ReceivesAction
→
capitalized
|
0.52
|
|
internet
→
ReceivesAction
→
distributed
|
0.52
|
|
internet
→
ReceivesAction
→
developed
|
0.51
|
|
internet
→
ReceivesAction
→
linked
|
0.51
|
|
internet
→
ReceivesAction
→
controlled
|
0.51
|
|
internet
→
ReceivesAction
→
made available
|
0.51
|
|
internet
→
ReceivesAction
→
shared
|
0.51
|
|
internet
→
ReceivesAction
→
based
|
0.51
|
|
internet
→
ReceivesAction
→
connected to each other
|
0.50
|
|
internet
→
ReceivesAction
→
used by the military
|
0.50
|
|
internet
→
ReceivesAction
→
concerned
|
0.49
|
|
internet
→
ReceivesAction
→
interconnected
|
0.49
|
|
internet
→
ReceivesAction
→
used as tool
|
0.49
|
|
internet
→
ReceivesAction
→
regulated
|
0.48
|
|
internet
→
ReceivesAction
→
updated
|
0.48
|
|
internet
→
ReceivesAction
→
used via computer
|
0.47
|
|
internet
→
ReceivesAction
→
used by people
|
0.47
|
|
internet
→
ReceivesAction
→
used to gather information
|
0.47
|
|
internet
→
ReceivesAction
→
crowded
|
0.47
|
|
internet
→
ReceivesAction
→
applied
|
0.47
|
|
internet
→
ReceivesAction
→
full of scam
|
0.46
|
|
internet
→
ReceivesAction
→
subject to interruption
|
0.46
|
|
internet
→
ReceivesAction
→
fragmented
|
0.46
|
|
internet
→
ReceivesAction
→
full of opportunity
|
0.46
|
|
internet
→
ReceivesAction
→
restricted
|
0.46
|
|
internet
→
ReceivesAction
→
introduced
|
0.46
|
|
internet
→
ReceivesAction
→
abbreviated as iot
|
0.45
|
|
internet
→
ReceivesAction
→
described
|
0.45
|
|
internet
→
ReceivesAction
→
embedded with sensor
|
0.44
|
|
internet
→
ReceivesAction
→
run
|
0.44
|
|
internet
→
ReceivesAction
→
considered as the best option
|
0.44
|
|
internet
→
ReceivesAction
→
controlled by government
|
0.44
|
|
internet
→
ReceivesAction
→
protected
|
0.44
|
|
internet
→
ReceivesAction
→
made
|
0.43
|
|
internet
→
ReceivesAction
→
used by business
|
0.43
|
|
internet
→
ReceivesAction
→
viewed
|
0.43
|
|
internet
→
ReceivesAction
→
used by millions of people
|
0.43
|
|
internet
→
ReceivesAction
→
censored
|
0.42
|
|
internet
→
ReceivesAction
→
monitored
|
0.42
|
|
internet
→
ReceivesAction
→
full of information
|
0.42
|
|
internet
→
ReceivesAction
→
on the verge
|
0.42
|
|
internet
→
ReceivesAction
→
described as a network of netwo…
|
0.42
|
|
internet
→
ReceivesAction
→
established
|
0.42
|
|
internet
→
ReceivesAction
→
referred as the net
|
0.41
|
|
internet
→
ReceivesAction
→
embedded with software
|
0.41
|
|
internet
→
ReceivesAction
→
full of knowledge
|
0.41
|
|
internet
→
ReceivesAction
→
good for society
|
0.41
|
|
internet
→
ReceivesAction
→
embedded with electronic
|
0.41
|
|
internet
→
ReceivesAction
→
maintained at image
|
0.41
|
|
internet
→
ReceivesAction
→
conceived
|
0.41
|
|
internet
→
ReceivesAction
→
embedded with network connectiv…
|
0.41
|
|
internet
→
ReceivesAction
→
full of video
|
0.40
|
|
internet
→
ReceivesAction
→
commercialized
|
0.40
|
|
internet
→
ReceivesAction
→
broken
|
0.40
|
|
internet
→
ReceivesAction
→
included in rate
|
0.40
|
|
internet
→
ReceivesAction
→
loaded with expertise
|
0.40
|
|
internet
→
ReceivesAction
→
full of article
|
0.39
|
|
internet
→
ReceivesAction
→
embedded with actuator
|
0.39
|
|
internet
→
ReceivesAction
→
used by everyone
|
0.39
|
|
internet
→
ReceivesAction
→
full of blog
|
0.39
|
|
internet
→
ReceivesAction
→
facilitated by bi- or multi-lat…
|
0.39
|
|
internet
→
ReceivesAction
→
facilitated by protocol
|
0.39
|
|
internet
→
ReceivesAction
→
facilitated by technical specs
|
0.39
|
|
internet
→
ReceivesAction
→
flooded with meme
|
0.39
|
|
internet
→
ReceivesAction
→
paid
|
0.39
|
|
internet
→
ReceivesAction
→
structured
|
0.39
|
|
internet
→
ReceivesAction
→
loaded with understanding
|
0.38
|
|
internet
→
ReceivesAction
→
used as medium
|
0.38
|
|
internet
→
ReceivesAction
→
full of website
|
0.38
|
|
internet
→
ReceivesAction
→
banned
|
0.38
|
|
internet
→
ReceivesAction
→
included in the rent
|
0.38
|
|
internet
→
ReceivesAction
→
discovered
|
0.37
|
|
internet
→
ReceivesAction
→
full of understanding
|
0.37
|
|
internet
→
ReceivesAction
→
launched
|
0.37
|
|
internet
→
ReceivesAction
→
unfettered by federal or state …
|
0.37
|
|
internet
→
ReceivesAction
→
changed
|
0.37
|
|
internet
→
ReceivesAction
→
full of expertise
|
0.37
|
|
internet
→
ReceivesAction
→
installed
|
0.37
|
|
internet
→
ReceivesAction
→
interrupted
|
0.37
|
|
internet
→
ReceivesAction
→
designed to be open
|
0.36
|
|
internet
→
ReceivesAction
→
fixed
|
0.36
|
|
internet
→
ReceivesAction
→
flooded with blog
|
0.36
|
|
internet
→
ReceivesAction
→
kept free
|
0.36
|
|
internet
→
ReceivesAction
→
maintained at thousands of sites
|
0.36
|
|
internet
→
ReceivesAction
→
abuzz with speculation
|
0.36
|
|
internet
→
ReceivesAction
→
disconnected
|
0.36
|
|
internet
→
ReceivesAction
→
free of error
|
0.36
|
|
internet
→
ReceivesAction
→
full of story
|
0.36
|
|
internet
→
ReceivesAction
→
maintained at the information
|
0.36
|
|
internet
→
ReceivesAction
→
removed
|
0.36
|
|
internet
→
ReceivesAction
→
transformed
|
0.36
|
|
internet
→
ReceivesAction
→
used in school
|
0.36
|
|
internet
→
ReceivesAction
→
loaded with knowledge
|
0.35
|
|
internet
→
ReceivesAction
→
never invented
|
0.35
|
|
internet
→
ReceivesAction
→
full of people
|
0.35
|
|
internet
→
ReceivesAction
→
coined in 1999
|
0.35
|
|
internet
→
ReceivesAction
→
dominated by google
|
0.35
|
|
internet
→
ReceivesAction
→
flooded with article
|
0.35
|
|
internet
→
ReceivesAction
→
formed
|
0.35
|
|
internet
→
ReceivesAction
→
full of blog posts
|
0.35
|
|
internet
→
ReceivesAction
→
privatized
|
0.35
|
|
internet
→
ReceivesAction
→
shaped by society
|
0.35
|
|
internet
→
ReceivesAction
→
treated as utility
|
0.35
|
|
internet
→
ReceivesAction
→
used over the world
|
0.35
|
|
internet
→
ReceivesAction
→
subject to loss
|
0.34
|
|
internet
→
ReceivesAction
→
full of misinformation
|
0.34
|
|
internet
→
ReceivesAction
→
full of image
|
0.33
|
|
internet
→
ReceivesAction
→
full of tip
|
0.33
|
|
internet
→
ReceivesAction
→
easy to use
|
0.33
|
|
internet
→
ReceivesAction
→
subject to corruption
|
0.33
|
|
internet
→
ReceivesAction
→
full of lie
|
0.32
|
|
internet
→
ReceivesAction
→
abused
|
0.32
|
|
internet
→
ReceivesAction
→
leveraged
|
0.32
|
|
internet
→
ReceivesAction
→
full of tutorial
|
0.32
|
|
internet
→
ReceivesAction
→
integrated
|
0.32
|
|
internet
→
ReceivesAction
→
blamed
|
0.32
|
|
internet
→
ReceivesAction
→
subject to possible interception
|
0.31
|
|
internet
→
ReceivesAction
→
full of forum
|
0.31
|
|
internet
→
ReceivesAction
→
full of idea
|
0.31
|
|
internet
→
ReceivesAction
→
set
|
0.31
|
|
internet
→
ReceivesAction
→
blocked
|
0.31
|
|
internet
→
ReceivesAction
→
compromised
|
0.31
|
|
internet
→
ReceivesAction
→
full of recipe
|
0.31
|
|
internet
→
ReceivesAction
→
full of resource
|
0.31
|
|
internet
→
ReceivesAction
→
restored
|
0.31
|
|
internet
→
ReceivesAction
→
upset
|
0.31
|
|
internet
→
ReceivesAction
→
full of trick
|
0.30
|
|
internet
→
ReceivesAction
→
full of half-truths
|
0.29
|
|
internet
→
ReceivesAction
→
used to send text
|
0.29
|
|
internet
→
ReceivesAction
→
subject to alteration of commun…
|
0.29
|
|
internet
→
ReceivesAction
→
destroyed
|
0.29
|
|
internet
→
ReceivesAction
→
improved
|
0.29
|
|
internet
→
ReceivesAction
→
integrated into everyday life
|
0.29
|
|
internet
→
ReceivesAction
→
prone to failure
|
0.29
|
|
internet
→
ReceivesAction
→
abuzz with rumor
|
0.28
|
|
internet
→
ReceivesAction
→
complexed
|
0.28
|
|
internet
→
ReceivesAction
→
full of advice
|
0.28
|
|
internet
→
ReceivesAction
→
full of news
|
0.28
|
|
internet
→
ReceivesAction
→
full of possibility
|
0.28
|
|
internet
→
ReceivesAction
→
full of virus
|
0.28
|
|
internet
→
ReceivesAction
→
used by anyone
|
0.28
|
|
internet
→
ReceivesAction
→
accessed by numerous means
|
0.28
|
|
internet
→
ReceivesAction
→
checked
|
0.27
|
|
internet
→
ReceivesAction
→
flooded with information
|
0.27
|
|
internet
→
ReceivesAction
→
full of thief
|
0.27
|
|
internet
→
ReceivesAction
→
hacked
|
0.27
|
|
internet
→
ReceivesAction
→
used by terrorist
|
0.27
|
|
internet
→
ReceivesAction
→
built on trust
|
0.26
|
|
internet
→
ReceivesAction
→
full of book
|
0.26
|
|
internet
→
ReceivesAction
→
full of review
|
0.26
|
|
internet
→
ReceivesAction
→
linked through the service
|
0.26
|
|
internet
→
ReceivesAction
→
used by consumer
|
0.26
|
|
internet
→
ReceivesAction
→
used to sell access devices
|
0.26
|
|
internet
→
ReceivesAction
→
used to sell counterfeit goods
|
0.26
|
|
internet
→
ReceivesAction
→
used to sell firearm
|
0.26
|
|
internet
→
ReceivesAction
→
used to sell malware
|
0.26
|
|
internet
→
ReceivesAction
→
used to sell other computer hac…
|
0.26
|
|
internet
→
ReceivesAction
→
used to sell toxic chemicals
|
0.26
|
|
internet
→
ReceivesAction
→
required
|
0.26
|
|
internet
→
ReceivesAction
→
complicated to understood
|
0.26
|
|
internet
→
ReceivesAction
→
compromised by a computer virus
|
0.26
|
|
internet
→
ReceivesAction
→
expanded
|
0.26
|
|
internet
→
ReceivesAction
→
flooded with website
|
0.26
|
|
internet
→
ReceivesAction
→
subject to alteration
|
0.26
|
|
internet
→
ReceivesAction
→
mentioned
|
0.25
|
|
internet
→
ReceivesAction
→
full of troll
|
0.25
|
|
internet
→
ReceivesAction
→
expected
|
0.20
|
|