Difference between revisions of "Template:Computer science"

From blackwiki
Jump to navigation Jump to search
(IEEE and OSI Model are not a networking related field of CS, neither is DoD for Security)
((rv).)
Line 52: Line 52:
 
  |list1  = [[Computer data storage]]{{·}} [[:Category:Database theory|Database theory]]{{·}} [[Data mining]]{{·}} [[Data modeling]]{{·}} [[Geographic information system]]
 
  |list1  = [[Computer data storage]]{{·}} [[:Category:Database theory|Database theory]]{{·}} [[Data mining]]{{·}} [[Data modeling]]{{·}} [[Geographic information system]]
 
  |group2 = [[Computer_networking|Networking]]
 
  |group2 = [[Computer_networking|Networking]]
  |list2  = [[Communication]]{{·}} [[Teletraffic engineering|Traffic Engineering]]{{·}} [[Broadcast network|Broadcasting]]{{·}} [[Network topology]]{{·}} [[Cryptography]]{{·}} [[World Wide Web]]{{·}} [[Semantic Web]]{{·}} [[Internetworking]]{{·}} [[Public switched telephone network|PSTN]] / [[Synchronous optical networking|SONET]]{{·}} [[IPTV]]
+
  |list2  = [[Communication]]{{·}} [[Teletraffic engineering|Traffic Engineering]]{{·}} [[Broadcast network|Broadcasting]]{{·}} [[Network topology]]{{·}} [[OSI model]]{{·}} [[Cryptography]]{{·}} [[World Wide Web]]{{·}} [[Semantic Web]]{{·}} [[Internetworking]]{{·}} [[Public switched telephone network|PSTN]] / [[Synchronous optical networking|SONET]]{{·}} [[Institute of Electrical and Electronics Engineers|IEEE]]{{·}} [[IPTV]]
 
  |group3 = [[Computer security|Security]]
 
  |group3 = [[Computer security|Security]]
  |list3  = [[Intelligence]]{{·}} [[Encryption]]{{·}} [[Cryptographic protocol|Protocol]]s{{·}} [[Spam (electronic)|Spam]]{{·}} [[Online predator]]{{·}} [[Identity theft]]{{·}} [[Internet privacy]]{{·}} [[Trusted Computing]]{{·}} [[Adware|Advertising Ethics]]{{·}} [[Computer forensics]]{{·}} [[Computer surveillance]]
+
  |list3  = [[Intelligence]]{{·}} [[Encryption]]{{·}} [[Cryptographic protocol|Protocol]]s{{·}} [[Spam (electronic)|Spam]]{{·}} [[Online predator]]{{·}} [[Identity theft]]{{·}} [[Internet privacy]]{{·}} [[Trusted Computing]]{{·}} [[Adware|Advertising Ethics]]{{·}} [[Computer forensics]]{{·}} [[Computer surveillance]]{{·}} [[United States Department of Defense|DoD]]
 
}}
 
}}
  
 
|below  = NOTE: Computer science can also be split up into different topics or fields according to the [[ACM Computing Classification System]].
 
|below  = NOTE: Computer science can also be split up into different topics or fields according to the [[ACM Computing Classification System]].
 
}}
 
}}

Revision as of 21:09, 12 May 2009