laptop
→
ReceivesAction
→
powered
|
0.68
|
|
laptop
→
ReceivesAction
→
returned
|
0.67
|
|
laptop
→
ReceivesAction
→
closed
|
0.67
|
|
laptop
→
ReceivesAction
→
stolen
|
0.66
|
|
laptop
→
ReceivesAction
→
connected to the internet
|
0.65
|
|
laptop
→
ReceivesAction
→
encrypted
|
0.64
|
|
laptop
→
ReceivesAction
→
recovered
|
0.62
|
|
laptop
→
ReceivesAction
→
purchased
|
0.61
|
|
laptop
→
ReceivesAction
→
required
|
0.60
|
|
laptop
→
ReceivesAction
→
repaired
|
0.60
|
|
laptop
→
ReceivesAction
→
checked
|
0.57
|
|
laptop
→
ReceivesAction
→
connected to projector
|
0.56
|
|
laptop
→
ReceivesAction
→
removed
|
0.56
|
|
laptop
→
ReceivesAction
→
delivered
|
0.56
|
|
laptop
→
ReceivesAction
→
tested
|
0.56
|
|
laptop
→
ReceivesAction
→
charged
|
0.55
|
|
laptop
→
ReceivesAction
→
chosen
|
0.55
|
|
laptop
→
ReceivesAction
→
lost
|
0.55
|
|
laptop
→
ReceivesAction
→
replaced
|
0.54
|
|
laptop
→
ReceivesAction
→
carried in backpack
|
0.54
|
|
laptop
→
ReceivesAction
→
created
|
0.54
|
|
laptop
→
ReceivesAction
→
distributed
|
0.54
|
|
laptop
→
ReceivesAction
→
powered by intel core
|
0.54
|
|
laptop
→
ReceivesAction
→
updated
|
0.53
|
|
laptop
→
ReceivesAction
→
disassembled
|
0.53
|
|
laptop
→
ReceivesAction
→
limited
|
0.53
|
|
laptop
→
ReceivesAction
→
developed
|
0.52
|
|
laptop
→
ReceivesAction
→
on par
|
0.52
|
|
laptop
→
ReceivesAction
→
meant to be portable
|
0.52
|
|
laptop
→
ReceivesAction
→
covered
|
0.52
|
|
laptop
→
ReceivesAction
→
designed in such a way
|
0.51
|
|
laptop
→
ReceivesAction
→
used by student
|
0.51
|
|
laptop
→
ReceivesAction
→
upgraded
|
0.51
|
|
laptop
→
ReceivesAction
→
unplugged
|
0.50
|
|
laptop
→
ReceivesAction
→
used in education
|
0.50
|
|
laptop
→
ReceivesAction
→
connected to keyboard
|
0.50
|
|
laptop
→
ReceivesAction
→
designed for portability
|
0.50
|
|
laptop
→
ReceivesAction
→
protected against hazardous web…
|
0.49
|
|
laptop
→
ReceivesAction
→
protected against virus
|
0.49
|
|
laptop
→
ReceivesAction
→
used in a variety of settings
|
0.49
|
|
laptop
→
ReceivesAction
→
designed for child
|
0.49
|
|
laptop
→
ReceivesAction
→
designed for mobility
|
0.48
|
|
laptop
→
ReceivesAction
→
used at home
|
0.48
|
|
laptop
→
ReceivesAction
→
connected by cable
|
0.48
|
|
laptop
→
ReceivesAction
→
designed for mobile use
|
0.48
|
|
laptop
→
ReceivesAction
→
connected to a docking station
|
0.47
|
|
laptop
→
ReceivesAction
→
protected against the latest sp…
|
0.46
|
|
laptop
→
ReceivesAction
→
installed
|
0.46
|
|
laptop
→
ReceivesAction
→
ideal for student
|
0.46
|
|
laptop
→
ReceivesAction
→
covered under extended warranty
|
0.46
|
|
laptop
→
ReceivesAction
→
infected by malware
|
0.45
|
|
laptop
→
ReceivesAction
→
backed by a one-year warranty
|
0.45
|
|
laptop
→
ReceivesAction
→
designed
|
0.45
|
|
laptop
→
ReceivesAction
→
configured
|
0.44
|
|
laptop
→
ReceivesAction
→
folded shut
|
0.44
|
|
laptop
→
ReceivesAction
→
restarted
|
0.44
|
|
laptop
→
ReceivesAction
→
designed for gaming
|
0.44
|
|
laptop
→
ReceivesAction
→
available in white
|
0.43
|
|
laptop
→
ReceivesAction
→
concerned
|
0.43
|
|
laptop
→
ReceivesAction
→
used on the go
|
0.43
|
|
laptop
→
ReceivesAction
→
designed for gamer
|
0.43
|
|
laptop
→
ReceivesAction
→
released
|
0.43
|
|
laptop
→
ReceivesAction
→
of high quality
|
0.43
|
|
laptop
→
ReceivesAction
→
shipped with gaming laptops
|
0.43
|
|
laptop
→
ReceivesAction
→
stored in rear padded compartme…
|
0.42
|
|
laptop
→
ReceivesAction
→
categorized
|
0.42
|
|
laptop
→
ReceivesAction
→
dedicated
|
0.42
|
|
laptop
→
ReceivesAction
→
released in 2018
|
0.42
|
|
laptop
→
ReceivesAction
→
damaged
|
0.42
|
|
laptop
→
ReceivesAction
→
available in the market
|
0.42
|
|
laptop
→
ReceivesAction
→
used to play game
|
0.41
|
|
laptop
→
ReceivesAction
→
announced
|
0.41
|
|
laptop
→
ReceivesAction
→
connected to power
|
0.41
|
|
laptop
→
ReceivesAction
→
go to be protected against the …
|
0.40
|
|
laptop
→
ReceivesAction
→
easy to carry
|
0.40
|
|
laptop
→
ReceivesAction
→
serviced
|
0.40
|
|
laptop
→
ReceivesAction
→
sold by sony
|
0.40
|
|
laptop
→
ReceivesAction
→
loaded with windows
|
0.39
|
|
laptop
→
ReceivesAction
→
used in class
|
0.39
|
|
laptop
→
ReceivesAction
→
protected
|
0.39
|
|
laptop
→
ReceivesAction
→
overpriced
|
0.39
|
|
laptop
→
ReceivesAction
→
recycled
|
0.39
|
|
laptop
→
ReceivesAction
→
provided
|
0.39
|
|
laptop
→
ReceivesAction
→
owned
|
0.39
|
|
laptop
→
ReceivesAction
→
docked
|
0.39
|
|
laptop
→
ReceivesAction
→
locked
|
0.39
|
|
laptop
→
ReceivesAction
→
shipped
|
0.39
|
|
laptop
→
ReceivesAction
→
reported missing
|
0.38
|
|
laptop
→
ReceivesAction
→
equipped with intel cpus
|
0.38
|
|
laptop
→
ReceivesAction
→
allowed
|
0.38
|
|
laptop
→
ReceivesAction
→
introduced
|
0.38
|
|
laptop
→
ReceivesAction
→
seized
|
0.38
|
|
laptop
→
ReceivesAction
→
broken
|
0.37
|
|
laptop
→
ReceivesAction
→
available in the u.s.
|
0.37
|
|
laptop
→
ReceivesAction
→
kept
|
0.37
|
|
laptop
→
ReceivesAction
→
plugged into main
|
0.37
|
|
laptop
→
ReceivesAction
→
powered by processor
|
0.37
|
|
laptop
→
ReceivesAction
→
used by professional
|
0.37
|
|
laptop
→
ReceivesAction
→
manufactured by asus
|
0.37
|
|
laptop
→
ReceivesAction
→
connected to ac power
|
0.36
|
|
laptop
→
ReceivesAction
→
never be left unattended
|
0.36
|
|
laptop
→
ReceivesAction
→
plugged into the wall
|
0.36
|
|
laptop
→
ReceivesAction
→
provided for the training
|
0.36
|
|
laptop
→
ReceivesAction
→
left unattended
|
0.36
|
|
laptop
→
ReceivesAction
→
used on comforter
|
0.36
|
|
laptop
→
ReceivesAction
→
contaminated with spyware attack
|
0.36
|
|
laptop
→
ReceivesAction
→
featured on the site
|
0.35
|
|
laptop
→
ReceivesAction
→
available in blue
|
0.35
|
|
laptop
→
ReceivesAction
→
aimed at user
|
0.34
|
|
laptop
→
ReceivesAction
→
announced at ces
|
0.34
|
|
laptop
→
ReceivesAction
→
refurbished
|
0.34
|
|
laptop
→
ReceivesAction
→
run
|
0.34
|
|
laptop
→
ReceivesAction
→
used to take note
|
0.34
|
|
laptop
→
ReceivesAction
→
carried
|
0.34
|
|
laptop
→
ReceivesAction
→
fixed
|
0.34
|
|
laptop
→
ReceivesAction
→
distributed among student
|
0.34
|
|
laptop
→
ReceivesAction
→
equipped with displayport
|
0.34
|
|
laptop
→
ReceivesAction
→
equipped with ssd
|
0.34
|
|
laptop
→
ReceivesAction
→
renewed
|
0.34
|
|
laptop
→
ReceivesAction
→
easy to disassemble
|
0.33
|
|
laptop
→
ReceivesAction
→
closed at any time
|
0.33
|
|
laptop
→
ReceivesAction
→
discovered
|
0.33
|
|
laptop
→
ReceivesAction
→
reported stolen
|
0.33
|
|
laptop
→
ReceivesAction
→
shown in fig
|
0.33
|
|
laptop
→
ReceivesAction
→
sold by dell
|
0.33
|
|
laptop
→
ReceivesAction
→
stolen in january
|
0.33
|
|
laptop
→
ReceivesAction
→
used to create process
|
0.33
|
|
laptop
→
ReceivesAction
→
contaminated with trojan
|
0.33
|
|
laptop
→
ReceivesAction
→
infected by adware
|
0.33
|
|
laptop
→
ReceivesAction
→
ready to use
|
0.32
|
|
laptop
→
ReceivesAction
→
held
|
0.32
|
|
laptop
→
ReceivesAction
→
included in the recall
|
0.32
|
|
laptop
→
ReceivesAction
→
left on bed
|
0.32
|
|
laptop
→
ReceivesAction
→
used by employee
|
0.32
|
|
laptop
→
ReceivesAction
→
destroyed
|
0.32
|
|
laptop
→
ReceivesAction
→
recharged
|
0.31
|
|
laptop
→
ReceivesAction
→
customized
|
0.31
|
|
laptop
→
ReceivesAction
→
good for gaming
|
0.31
|
|
laptop
→
ReceivesAction
→
issued
|
0.30
|
|
laptop
→
ReceivesAction
→
disposed
|
0.30
|
|
laptop
→
ReceivesAction
→
hidden
|
0.30
|
|
laptop
→
ReceivesAction
→
manufactured by company r
|
0.30
|
|
laptop
→
ReceivesAction
→
sent for repair
|
0.30
|
|
laptop
→
ReceivesAction
→
utilised to create program
|
0.30
|
|
laptop
→
ReceivesAction
→
infected with virus
|
0.30
|
|
laptop
→
ReceivesAction
→
designed for use
|
0.29
|
|
laptop
→
ReceivesAction
→
powered by an intel core i5 pro…
|
0.29
|
|
laptop
→
ReceivesAction
→
recommended
|
0.29
|
|
laptop
→
ReceivesAction
→
configured with a 4k screen
|
0.29
|
|
laptop
→
ReceivesAction
→
donated
|
0.29
|
|
laptop
→
ReceivesAction
→
linked to brazil
|
0.29
|
|
laptop
→
ReceivesAction
→
linked to switzerland
|
0.29
|
|
laptop
→
ReceivesAction
→
used in malaysia
|
0.29
|
|
laptop
→
ReceivesAction
→
compromised
|
0.29
|
|
laptop
→
ReceivesAction
→
confiscated
|
0.28
|
|
laptop
→
ReceivesAction
→
plugged into a power source
|
0.28
|
|
laptop
→
ReceivesAction
→
banned
|
0.28
|
|
laptop
→
ReceivesAction
→
powered by intel core i7 proces…
|
0.28
|
|
laptop
→
ReceivesAction
→
rebooted
|
0.28
|
|
laptop
→
ReceivesAction
→
stolen in 2013
|
0.28
|
|
laptop
→
ReceivesAction
→
used at school
|
0.28
|
|
laptop
→
ReceivesAction
→
available in japan
|
0.27
|
|
laptop
→
ReceivesAction
→
connected via usb
|
0.27
|
|
laptop
→
ReceivesAction
→
deployed
|
0.27
|
|
laptop
→
ReceivesAction
→
exchanged
|
0.27
|
|
laptop
→
ReceivesAction
→
expected
|
0.27
|
|
laptop
→
ReceivesAction
→
insured
|
0.27
|
|
laptop
→
ReceivesAction
→
invented
|
0.27
|
|
laptop
→
ReceivesAction
→
loaded with the following
|
0.27
|
|
laptop
→
ReceivesAction
→
manufactured by company p
|
0.27
|
|
laptop
→
ReceivesAction
→
operated
|
0.27
|
|
laptop
→
ReceivesAction
→
ordered
|
0.27
|
|
laptop
→
ReceivesAction
→
powered through typing
|
0.27
|
|
laptop
→
ReceivesAction
→
reassembled
|
0.27
|
|
laptop
→
ReceivesAction
→
replaced by tablet
|
0.27
|
|
laptop
→
ReceivesAction
→
returned in person
|
0.27
|
|
laptop
→
ReceivesAction
→
returned to the student
|
0.27
|
|
laptop
→
ReceivesAction
→
sold to government
|
0.27
|
|
laptop
→
ReceivesAction
→
treated
|
0.27
|
|
laptop
→
ReceivesAction
→
unveiled in march
|
0.27
|
|
laptop
→
ReceivesAction
→
used by friend
|
0.27
|
|
laptop
→
ReceivesAction
→
used in tent
|
0.27
|
|
laptop
→
ReceivesAction
→
used to convert blood pressure
|
0.27
|
|
laptop
→
ReceivesAction
→
wired
|
0.27
|
|
laptop
→
ReceivesAction
→
advertised
|
0.27
|
|
laptop
→
ReceivesAction
→
brought
|
0.27
|
|
laptop
→
ReceivesAction
→
easy to transport
|
0.27
|
|
laptop
→
ReceivesAction
→
equipped with an hd webcam
|
0.26
|
|
laptop
→
ReceivesAction
→
clogged in few weeks
|
0.26
|
|
laptop
→
ReceivesAction
→
expensive to repair
|
0.26
|
|
laptop
→
ReceivesAction
→
infected
|
0.26
|
|
laptop
→
ReceivesAction
→
attached
|
0.25
|
|
laptop
→
ReceivesAction
→
available in china
|
0.25
|
|
laptop
→
ReceivesAction
→
available in march
|
0.25
|
|
laptop
→
ReceivesAction
→
based on a-series apus
|
0.25
|
|
laptop
→
ReceivesAction
→
based on amd’s e2
|
0.25
|
|
laptop
→
ReceivesAction
→
described in the quote process
|
0.25
|
|
laptop
→
ReceivesAction
→
hardwired
|
0.25
|
|
laptop
→
ReceivesAction
→
managed
|
0.25
|
|
laptop
→
ReceivesAction
→
monitored
|
0.25
|
|
laptop
→
ReceivesAction
→
occurred in somalia
|
0.25
|
|
laptop
→
ReceivesAction
→
optimized for specific uses
|
0.25
|
|
laptop
→
ReceivesAction
→
powered by seventh generation
|
0.25
|
|
laptop
→
ReceivesAction
→
pushed
|
0.25
|
|
laptop
→
ReceivesAction
→
sold in the year
|
0.25
|
|
laptop
→
ReceivesAction
→
stolen on april
|
0.25
|
|
laptop
→
ReceivesAction
→
stored in locked room
|
0.25
|
|
laptop
→
ReceivesAction
→
used in hotel
|
0.25
|
|
laptop
→
ReceivesAction
→
compared to other laptops
|
0.25
|
|
laptop
→
ReceivesAction
→
packed with feature
|
0.25
|
|
laptop
→
ReceivesAction
→
prone to damage
|
0.25
|
|
laptop
→
ReceivesAction
→
equipped with hard drive of 1 tb
|
0.24
|
|
laptop
→
ReceivesAction
→
likely to stolen
|
0.24
|
|
laptop
→
ReceivesAction
→
meant for everyday use
|
0.23
|
|
laptop
→
ReceivesAction
→
coupled with 4 gb gb of ram
|
0.23
|
|
laptop
→
ReceivesAction
→
without doubt
|
0.23
|
|
laptop
→
ReceivesAction
→
transported
|
0.22
|
|
laptop
→
ReceivesAction
→
attacked by virus
|
0.22
|
|
laptop
→
ReceivesAction
→
damaged beyond repair
|
0.22
|
|
laptop
→
ReceivesAction
→
infected in few weeks
|
0.22
|
|
laptop
→
ReceivesAction
→
lost in u.s. airports
|
0.22
|
|
laptop
→
ReceivesAction
→
searched
|
0.22
|
|
laptop
→
ReceivesAction
→
allowed in classroom
|
0.20
|
|
laptop
→
ReceivesAction
→
abused
|
0.20
|
|
laptop
→
ReceivesAction
→
added
|
0.20
|
|
laptop
→
ReceivesAction
→
advanced
|
0.20
|
|
laptop
→
ReceivesAction
→
available in two colors
|
0.20
|
|
laptop
→
ReceivesAction
→
designed by expert
|
0.20
|
|
laptop
→
ReceivesAction
→
easy to steal
|
0.20
|
|
laptop
→
ReceivesAction
→
had
|
0.20
|
|
laptop
→
ReceivesAction
→
hard to beat
|
0.20
|
|
laptop
→
ReceivesAction
→
restored
|
0.20
|
|
laptop
→
ReceivesAction
→
ruined
|
0.20
|
|
laptop
→
ReceivesAction
→
stuck
|
0.20
|
|
laptop
→
ReceivesAction
→
available in europe
|
0.18
|
|
laptop
→
ReceivesAction
→
avoided
|
0.18
|
|
laptop
→
ReceivesAction
→
deemed as the most advantageous…
|
0.18
|
|
laptop
→
ReceivesAction
→
improved
|
0.18
|
|
laptop
→
ReceivesAction
→
left on train
|
0.18
|
|
laptop
→
ReceivesAction
→
loaded with feature
|
0.18
|
|
laptop
→
ReceivesAction
→
loaded with powerful features
|
0.18
|
|
laptop
→
ReceivesAction
→
powered by mains electricity
|
0.18
|
|
laptop
→
ReceivesAction
→
refurbished to apple’s strict g…
|
0.18
|
|
laptop
→
ReceivesAction
→
reported
|
0.18
|
|
laptop
→
ReceivesAction
→
stolen for the information
|
0.18
|
|
laptop
→
ReceivesAction
→
stolen in new york
|
0.18
|
|
laptop
→
ReceivesAction
→
used using rechargeable battery
|
0.18
|
|
laptop
→
ReceivesAction
→
cared
|
0.16
|
|
laptop
→
ReceivesAction
→
carried around campus
|
0.16
|
|
laptop
→
ReceivesAction
→
configured with decent-sized sc…
|
0.16
|
|
laptop
→
ReceivesAction
→
designed to compete with apple’…
|
0.16
|
|
laptop
→
ReceivesAction
→
designed to compete with dell
|
0.16
|
|
laptop
→
ReceivesAction
→
destroyed by the fbi
|
0.16
|
|
laptop
→
ReceivesAction
→
good for travel
|
0.16
|
|
laptop
→
ReceivesAction
→
good for video editing
|
0.16
|
|
laptop
→
ReceivesAction
→
ideal for family
|
0.16
|
|
laptop
→
ReceivesAction
→
inserted
|
0.16
|
|
laptop
→
ReceivesAction
→
overclocked
|
0.16
|
|
laptop
→
ReceivesAction
→
priced at amazon
|
0.16
|
|
laptop
→
ReceivesAction
→
started in almost all cases
|
0.16
|
|
laptop
→
ReceivesAction
→
stolen in a street robbery
|
0.16
|
|
laptop
→
ReceivesAction
→
stolen in the u.s.
|
0.16
|
|
laptop
→
ReceivesAction
→
used to be expensive
|
0.16
|
|
laptop
→
ReceivesAction
→
withheld
|
0.16
|
|