University of Auckland    Department of Computer Science     Stage One Wiki     Search results Web Site Map
For query "Computer"

Search results - Stage One Wiki

There is no page titled ":Computer". You can create this page.

For more information about searching Stage One Wiki, see Searching Stage One Wiki.

Showing below up to 20 results starting with #1.


View (previous 20) (next 20) (20 | 50 | 100 | 250 | 500).

Article title matches

  1. Computer Science Department (30 bytes)
  2. Computer science department (658 bytes)
    25: computer science link [[department of computer science]]
  3. Computer science 111G (51 bytes)

Page text matches

  1. Pwu034 (167 bytes)
    2: This is Ivy. I take Computer Science 111/111G just for my personal interest.
    3: Because I want to learn more about how does a computer works.
  2. Programming (1946 bytes)
    8: ...hat can be performed by a machine, particularly a computer. Programming languages can be used to create prog...
    10: ...pecification of their syntax and semantics, since computers require precisely defined instructions. Some (su...
    12: ...amming languages have been created, mainly in the computer field,[1] with many more being created every year...
    16: ...s provide various ways of specifying programs for computers to run. Unlike natural languages, programming la...
  3. Shareware (3740 bytes)
    5: ...oftware - except you get to use them, on your own computer, before paying for them.
    17: ... various cracking methods includes - turning your computer clock back before the expiration date, dissemble ...
    28: ...te 70's) there were few programs available. Many "computer hobbyists" simply wrote their own programs when t...
  4. Laboratory (3206 bytes)
    7: ...in room 175 (303S-175) on the first floor the the Computer Sciences Building (Building 303S).
    9: ...GCL(GroundFloor Computer Lab) and the (FirstFloor Computer Lab) are only available for science students.
    10: ...r (eg computer science, physics, maths stats...), computers cannot be logged in.
  5. Lectures (1334 bytes)
    1: ...about the subject they are interested for example Computer science 111. A lecture usually consists of one tu...
  6. Fascinating Facts Concerning Computers (2134 bytes)
    1: ...'few fascinating facts''' to keep you clued up on computers and their related technology.
    5: A '''computer''' = defined to be a machine that manipulates dat...
    10: ...king on cogs weighs and leavers and the like. The computers we refer to today however are electronic and wor...
    11: ...wer as several hundred modern personal computers. Computers have come an awful long way in such a short time...
    12: ...ess.com/2006/12/23/googles-new-facilities-largest-computer-in-the-world/]
  7. Asuw002 (174 bytes)
    9: [http://www.cs.auckland.ac.nz Computer Science Department]
  8. System Requirements guide (2757 bytes)
    5: ...now minimum system requirements mean that if your computer meets them the application will either barely run...
    24: ...ating system and program which are quite rare for computers that run Microsoft Windows which are commonly 32...
    34: #ram is limited to 196gb but computers with this much ram are very rare
    44: *Assess your computers ability to run games [http://www.systemrequirem...
  9. Click here (3941 bytes)
    1: == Courses in the Computer Science Department ==
    6: *COMPSCI 105 SS C Principles of Computer Science
    9: *COMPSCI 380 SS C/T Undergraduate Project in Computer Science
    13: *COMPSCI 105 S1 T Principles of Computer Science
    14: *COMPSCI 105 S2 C Principles of Computer Science
  10. Here! (1749 bytes)
    11: ... intended for students who may wish to advance in Computer Science or in Information Systems and Operations ...
  11. My Course Descriptions (1749 bytes)
    11: ... intended for students who may wish to advance in Computer Science or in Information Systems and Operations ...
  12. Internet (2192 bytes)
    4: ...uilt specifically for a single use. One prevalent computer networking method was based on the central mainfr...
    8: ...ool when you have multiple windows open. On a Mac computer running Vista you can use the Command Key + TAB t...
    19: ...'In these days, there are huge people who use the computers with internet. The internet is developed very qu...
  13. Printer Chargers (3230 bytes)
    1: ...t an online submission, as is available for other computer science courses. Especially as we are expected ...
    3: ...on area diagonal from Munchy Mart and next to the computer commons on that floor. Using your student ID and...
    9: ...http://www.scl.ec.auckland.ac.nz/ Science Faculty Computer Labs] and click on the '''Transfer Quotas''' link...
    11: ...o be aware that the default color of print in the Computer Science labs might be color, so just remeber to c...
  14. Blog (6431 bytes)
    31: ...and pictures transmitted live from a<br> wearable computer and EyeTap device to a web site.
  15. History of the Mouse (494 bytes)
    3: ...GUI) to eating through the wires and crashing the Computer.<br><br>
    11: computer component that is used to link the computer monitor and the keyboard.
  16. Binary prefix (63684 bytes)
    1: ... two. In certain contexts in computing, such as [[computer memory]] sizes, units of information storage and ...
    3: ...vely. Therefore it became common practice amongst computer professionals to use these prefixes for the binar...
    5: ...reId=10151&langId=-1&categoryId=16155&SR=nav:shop:computers:desktops:ss&ref=http%3A//www.sony.com/index.php ...
    11: Early computers used one of two addressing methods to access the...
    13: ...Corporation | title = Control Data 6400/6500/6600 Computer Systems Reference Manual | year = 1965-1967 | pag...
  17. Ywu151 (384 bytes)
    5: ...and my degree is Bachelor of Social Work and this computer science paper is my general education paper.
  18. Upat021 (233 bytes)
    1: ='''Hello Computer Science Student'''=
    10: *Computer Science 111G
  19. Compsci111 (419 bytes)
    9: **Computer Science 111
  20. Web browser (520 bytes)
    11: ...t almost impossible for people to infiltrate your computer. At a recent competition called Pwn2Own, hackers ...

View (previous 20) (next 20) (20 | 50 | 100 | 250 | 500).



Search in namespaces :

List redirects   Search for

Options
Log in