-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathdata.py
More file actions
2171 lines (1262 loc) · 152 KB
/
data.py
File metadata and controls
2171 lines (1262 loc) · 152 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
training_data = [
["Python is widely used for data science and AI applications.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
["Many developers prefer JavaScript for frontend web development.", {'entities': [[21, 31, 'PROGRAMMING_LANGUAGE']]}],
["Java and C++ are commonly taught in computer science curricula.", {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE'], [9, 12, 'PROGRAMMING_LANGUAGE']]}],
["Ruby on Rails revolutionized web development workflows.", {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
["Swift was developed by Apple for iOS and macOS development.", {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
["PHP powers a significant percentage of websites on the internet.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
["Rust offers memory safety without garbage collection.", {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
["Go was created at Google to address performance concerns in large systems.", {'entities': [[0, 2, 'PROGRAMMING_LANGUAGE']]}],
["Kotlin has become the preferred language for Android development.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
["TypeScript adds static typing to JavaScript.", {'entities': [[0, 10, 'PROGRAMMING_LANGUAGE'], [30, 40, 'PROGRAMMING_LANGUAGE']]}],
["COBOL is still used in many legacy banking systems.", {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
["Scala combines object-oriented and functional programming paradigms.", {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
["Haskell is known for its strong static typing and pure functional approach.", {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE']]}],
["R is primarily used for statistical computing and graphics.", {'entities': [[0, 1, 'PROGRAMMING_LANGUAGE']]}],
["Perl was once the dominant language for text processing and system administration.", {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
["Developers using C# often work with the .NET framework.", {'entities': [[16, 18, 'PROGRAMMING_LANGUAGE']]}],
["Julia was designed for high-performance numerical analysis and computational science.", {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
["Assembly language provides direct hardware access not available in high-level languages.", {'entities': [[0, 17, 'PROGRAMMING_LANGUAGE']]}],
["Objective-C was the primary language for iOS development before Swift.", {'entities': [[0, 11, 'PROGRAMMING_LANGUAGE'], [58, 63, 'PROGRAMMING_LANGUAGE']]}],
["Lua is commonly embedded in game engines for scripting.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
["Fortran remains relevant in scientific computing despite its age.", {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE']]}],
["MATLAB excels at matrix operations and numerical computing.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
["Clojure is a modern Lisp dialect running on the Java Virtual Machine.", {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE'], [22, 26, 'PROGRAMMING_LANGUAGE'], [47, 51, 'PROGRAMMING_LANGUAGE']]}],
["Groovy provides scripting capabilities for the Java platform.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE'], [45, 49, 'PROGRAMMING_LANGUAGE']]}],
["Erlang was designed for building massively scalable soft real-time systems.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
["Prolog is primarily used for logic programming and AI applications.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
["Dart is the language behind Flutter's cross-platform UI framework.", {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
["Ada is still used in safety-critical systems like aviation and defense.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
["Visual Basic .NET is integrated within Microsoft's development ecosystem.", {'entities': [[0, 18, 'PROGRAMMING_LANGUAGE']]}],
["F# combines functional programming with .NET infrastructure.", {'entities': [[0, 2, 'PROGRAMMING_LANGUAGE']]}],
["COBOL and Fortran are among the oldest programming languages still in use.", {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE'], [10, 17, 'PROGRAMMING_LANGUAGE']]}],
["Racket evolved from Scheme to become a language-building platform.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE'], [20, 26, 'PROGRAMMING_LANGUAGE']]}],
["Elixir builds on Erlang's VM for scalable, fault-tolerant applications.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE'], [16, 22, 'PROGRAMMING_LANGUAGE']]}],
["OCaml provides a blend of functional, imperative, and object-oriented paradigms.", {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
["Smalltalk pioneered many object-oriented programming concepts.", {'entities': [[0, 9, 'PROGRAMMING_LANGUAGE']]}],
["PowerShell is Microsoft's task automation and configuration management framework.", {'entities': [[0, 10, 'PROGRAMMING_LANGUAGE']]}],
["Bash scripting is essential for Linux system administration.", {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
["Crystal aims to have Ruby's elegance with C's performance.", {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE'], [22, 26, 'PROGRAMMING_LANGUAGE'], [39, 40, 'PROGRAMMING_LANGUAGE']]}],
["Nim combines Python's readability with C's efficiency.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE'], [13, 19, 'PROGRAMMING_LANGUAGE'], [39, 40, 'PROGRAMMING_LANGUAGE']]}],
["Zig provides an alternative to C with a focus on robustness and clarity.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE'], [28, 29, 'PROGRAMMING_LANGUAGE']]}],
["SQL is the standard language for database queries and manipulation.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
["VBA enables automation in Microsoft Office applications.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
["Pascal was designed to encourage good programming practices.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
["BASIC was created to make programming accessible to beginners.", {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
["PL/SQL extends SQL with procedural programming features for Oracle databases.", {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE'], [16, 19, 'PROGRAMMING_LANGUAGE']]}],
["D aims to improve upon C++ while maintaining compatibility.", {'entities': [[0, 1, 'PROGRAMMING_LANGUAGE'], [23, 26, 'PROGRAMMING_LANGUAGE']]}],
["Python and JavaScript consistently rank among the most popular programming languages.", {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE'], [11, 21, 'PROGRAMMING_LANGUAGE']]}],
["Developers often use C for embedded systems programming.", {'entities': [[20, 21, 'PROGRAMMING_LANGUAGE']]}],
["PHP and JavaScript are fundamental web development languages.", {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE'], [8, 18, 'PROGRAMMING_LANGUAGE']]}],
["Both Java and Python offer extensive libraries for various applications.", {'entities': [[5, 9, 'PROGRAMMING_LANGUAGE'], [14, 20, 'PROGRAMMING_LANGUAGE']]}],
["React has transformed how developers build user interfaces.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
["Angular provides a comprehensive solution for single-page applications.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
["TensorFlow and PyTorch are the leading machine learning frameworks.", {'entities': [[0, 10, 'FRAMEWORK_LIBRARY'], [15, 22, 'FRAMEWORK_LIBRARY']]}],
["Django simplifies web development with Python.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Node.js enables JavaScript to run on the server side.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
["Spring Boot streamlines Java application development.", {'entities': [[0, 11, 'FRAMEWORK_LIBRARY']]}],
["Vue.js has gained popularity for its simplicity and flexibility.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Pandas is the go-to library for data manipulation in Python.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Express is a minimal web framework for Node.js applications.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY'], [37, 44, 'FRAMEWORK_LIBRARY']]}],
["NumPy forms the foundation of scientific computing in Python.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
["Selenium automates browser testing for web applications.", {'entities': [[0, 8, 'FRAMEWORK_LIBRARY']]}],
["Flask offers a lightweight alternative to Django for Python web development.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY'], [40, 46, 'FRAMEWORK_LIBRARY']]}],
["jQuery dominated front-end development before modern frameworks appeared.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Requests simplifies HTTP operations in Python applications.", {'entities': [[0, 8, 'FRAMEWORK_LIBRARY']]}],
["Scikit-learn provides machine learning tools for Python developers.", {'entities': [[0, 12, 'FRAMEWORK_LIBRARY']]}],
["Bootstrap makes responsive web design accessible to developers.", {'entities': [[0, 9, 'FRAMEWORK_LIBRARY']]}],
["Matplotlib creates publication-quality visualizations in Python.", {'entities': [[0, 10, 'FRAMEWORK_LIBRARY']]}],
["Laravel is a popular PHP framework with elegant syntax.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
["Unity powers games across multiple platforms and devices.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
["Keras provides a high-level API for TensorFlow and other neural network libraries.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY'], [34, 44, 'FRAMEWORK_LIBRARY']]}],
["Ruby on Rails pioneered convention over configuration in web frameworks.", {'entities': [[0, 13, 'FRAMEWORK_LIBRARY']]}],
["Apache Kafka handles real-time data streaming at scale.", {'entities': [[0, 12, 'FRAMEWORK_LIBRARY']]}],
["Symfony components are used in many PHP projects including Laravel.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY'], [51, 58, 'FRAMEWORK_LIBRARY']]}],
["Redux manages state in complex React applications.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY'], [32, 37, 'FRAMEWORK_LIBRARY']]}],
["Lodash simplifies JavaScript data manipulation operations.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Hadoop processes large datasets across distributed computing clusters.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Jest is a popular testing framework for JavaScript applications.", {'entities': [[0, 4, 'FRAMEWORK_LIBRARY']]}],
["Unreal Engine powers many high-fidelity video games and simulations.", {'entities': [[0, 13, 'FRAMEWORK_LIBRARY']]}],
["Electron enables building desktop applications with web technologies.", {'entities': [[0, 8, 'FRAMEWORK_LIBRARY']]}],
["Tailwind CSS has changed how developers approach styling web applications.", {'entities': [[0, 12, 'FRAMEWORK_LIBRARY']]}],
["ASP.NET Core provides cross-platform web application development for .NET.", {'entities': [[0, 11, 'FRAMEWORK_LIBRARY']]}],
["Hibernate simplifies database operations in Java applications.", {'entities': [[0, 9, 'FRAMEWORK_LIBRARY']]}],
["Svelte compiles components to highly efficient JavaScript at build time.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["OpenCV is essential for computer vision applications.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Xamarin allows developers to build native mobile apps with C#.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
["FastAPI creates high-performance Python APIs with minimal code.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
["Pytest offers advanced testing capabilities for Python projects.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
["Spark processes data at scale for big data applications.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
["Docker Compose simplifies multi-container Docker application management.", {'entities': [[0, 13, 'FRAMEWORK_LIBRARY'], [43, 49, 'FRAMEWORK_LIBRARY']]}],
["Gatsby generates static websites with React and GraphQL.", {'entities': [[0, 6, 'FRAMEWORK_LIBRARY'], [36, 41, 'FRAMEWORK_LIBRARY']]}],
["Next.js provides server-side rendering capabilities for React applications.", {'entities': [[0, 7, 'FRAMEWORK_LIBRARY'], [56, 61, 'FRAMEWORK_LIBRARY']]}],
["Spring Security handles authentication and authorization in Java applications.", {'entities': [[0, 15, 'FRAMEWORK_LIBRARY']]}],
["Kubernetes orchestrates containerized applications at scale.", {'entities': [[0, 10, 'FRAMEWORK_LIBRARY']]}],
["JUnit is the standard testing framework for Java applications.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
["Mocha is a flexible JavaScript test framework running on Node.js.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY'], [51, 58, 'FRAMEWORK_LIBRARY']]}],
["Numpy and Pandas form the backbone of data analysis in Python.", {'entities': [[0, 5, 'FRAMEWORK_LIBRARY'], [10, 16, 'FRAMEWORK_LIBRARY']]}],
["Both React and Angular compete for frontend development mindshare.", {'entities': [[5, 10, 'FRAMEWORK_LIBRARY'], [15, 22, 'FRAMEWORK_LIBRARY']]}],
["Developers using Spring Boot often incorporate Hibernate for database operations.", {'entities': [[16, 27, 'FRAMEWORK_LIBRARY'], [45, 54, 'FRAMEWORK_LIBRARY']]}],
["NLTK provides tools for natural language processing in Python applications.", {'entities': [[0, 4, 'FRAMEWORK_LIBRARY']]}],
["The new Nvidia RTX 4090 offers unprecedented gaming performance.", {'entities': [[8, 22, 'HARDWARE']]}],
["Intel Core i9 processors target high-performance computing applications.", {'entities': [[0, 13, 'HARDWARE']]}],
["Raspberry Pi is popular for DIY electronics projects.", {'entities': [[0, 12, 'HARDWARE']]}],
["AMD Ryzen CPUs offer excellent performance for the price.", {'entities': [[0, 9, 'HARDWARE']]}],
["SSD storage provides faster data access than traditional hard drives.", {'entities': [[0, 3, 'HARDWARE']]}],
["Apple M1 chips deliver impressive performance with low power consumption.", {'entities': [[0, 8, 'HARDWARE']]}],
["Arduino boards are commonly used in introductory electronics courses.", {'entities': [[0, 7, 'HARDWARE']]}],
["The latest Samsung 990 PRO SSD achieves sequential read speeds of 7,450 MB/s.", {'entities': [[11, 25, 'HARDWARE']]}],
["Mechanical keyboards are preferred by many programmers for their tactile feedback.", {'entities': [[0, 20, 'HARDWARE']]}],
["HDMI cables connect displays to computers and media devices.", {'entities': [[0, 11, 'HARDWARE']]}],
["Logitech MX Master mouse features ergonomic design and customizable buttons.", {'entities': [[0, 18, 'HARDWARE']]}],
["DRAM is volatile memory that requires constant power to maintain data.", {'entities': [[0, 4, 'HARDWARE']]}],
["Dell XPS laptops balance performance and portability for professionals.", {'entities': [[0, 8, 'HARDWARE']]}],
["TPM modules provide hardware-based security functions.", {'entities': [[0, 3, 'HARDWARE']]}],
["Nvidia A100 GPUs accelerate machine learning workloads in data centers.", {'entities': [[0, 11, 'HARDWARE']]}],
["Western Digital hard drives offer high capacity storage solutions.", {'entities': [[0, 15, 'HARDWARE']]}],
["USB-C ports are becoming the standard connector for modern devices.", {'entities': [[0, 5, 'HARDWARE']]}],
["AirPods Pro deliver active noise cancellation in a compact design.", {'entities': [[0, 11, 'HARDWARE']]}],
["Motherboards connect all components of a computer system.", {'entities': [[0, 12, 'HARDWARE']]}],
["Qualcomm Snapdragon processors power many Android smartphones.", {'entities': [[0, 19, 'HARDWARE']]}],
["Kingston RAM modules provide reliable memory expansion options.", {'entities': [[0, 13, 'HARDWARE']]}],
["OLED displays offer superior contrast and color reproduction.", {'entities': [[0, 11, 'HARDWARE']]}],
["ASUS ROG gaming laptops target enthusiast gamers with high-end components.", {'entities': [[0, 8, 'HARDWARE']]}],
["CPU coolers prevent processors from overheating during intensive tasks.", {'entities': [[0, 10, 'HARDWARE']]}],
["Seagate external hard drives provide portable backup solutions.", {'entities': [[0, 23, 'HARDWARE']]}],
["Power supply units convert AC to DC power for computer components.", {'entities': [[0, 17, 'HARDWARE']]}],
["Graphics cards handle rendering tasks to offload the CPU.", {'entities': [[0, 14, 'HARDWARE'], [46, 49, 'HARDWARE']]}],
["FPGA chips can be reprogrammed for different processing tasks.", {'entities': [[0, 4, 'HARDWARE']]}],
["Sound cards process audio signals for high-quality sound output.", {'entities': [[0, 11, 'HARDWARE']]}],
["Network interface cards connect computers to networks.", {'entities': [[0, 24, 'HARDWARE']]}],
["Webcams became essential hardware during the remote work boom.", {'entities': [[0, 7, 'HARDWARE']]}],
["The Samsung 980 PRO and WD Black SN850 compete in the high-end NVMe market.", {'entities': [[4, 19, 'HARDWARE'], [24, 36, 'HARDWARE'], [61, 65, 'HARDWARE']]}],
["Mesh routers provide whole-home WiFi coverage without dead spots.", {'entities': [[0, 12, 'HARDWARE'], [30, 34, 'HARDWARE']]}],
["Intel Xeon processors are designed for server applications.", {'entities': [[0, 10, 'HARDWARE']]}],
["Surge protectors safeguard electronic devices from power spikes.", {'entities': [[0, 15, 'HARDWARE']]}],
["LG UltraFine monitors are popular among creative professionals.", {'entities': [[0, 13, 'HARDWARE']]}],
["Bluetooth speakers enable wireless audio streaming from mobile devices.", {'entities': [[0, 18, 'HARDWARE']]}],
["Solid state drives have largely replaced HDDs in modern laptops.", {'entities': [[0, 19, 'HARDWARE'], [38, 42, 'HARDWARE']]}],
["Thunderbolt ports offer high-speed data transfer and display output.", {'entities': [[0, 15, 'HARDWARE']]}],
["The IBM Model M keyboard remains popular decades after its introduction.", {'entities': [[4, 17, 'HARDWARE']]}],
["RAID arrays combine multiple drives for improved performance or redundancy.", {'entities': [[0, 11, 'HARDWARE']]}],
["Both AMD Radeon and Nvidia GeForce compete in the consumer GPU market.", {'entities': [[5, 15, 'HARDWARE'], [20, 33, 'HARDWARE'], [58, 61, 'HARDWARE']]}],
["Ethernet cables connect devices to local area networks.", {'entities': [[0, 15, 'HARDWARE']]}],
["Smart watches monitor health metrics and deliver notifications.", {'entities': [[0, 12, 'HARDWARE']]}],
["CPU and GPU temperatures should be monitored during intensive tasks.", {'entities': [[0, 3, 'HARDWARE'], [8, 11, 'HARDWARE']]}],
["The Raspberry Pi 5 and Arduino Mega offer different capabilities for maker projects.", {'entities': [[4, 18, 'HARDWARE'], [23, 35, 'HARDWARE']]}],
["PCIe slots allow expansion cards to connect to the motherboard.", {'entities': [[0, 9, 'HARDWARE'], [25, 40, 'HARDWARE'], [58, 69, 'HARDWARE']]}],
["The Apple MacBook Pro features the latest M3 chipset.", {'entities': [[4, 20, 'HARDWARE'], [39, 41, 'HARDWARE']]}],
["RAM and SSD upgrades can significantly improve system performance.", {'entities': [[0, 3, 'HARDWARE'], [8, 11, 'HARDWARE']]}],
["K-means clustering groups data points based on feature similarity.", {'entities': [[0, 16, 'ALGORITHM_MODEL']]}],
["BERT revolutionized natural language processing with bidirectional context.", {'entities': [[0, 4, 'ALGORITHM_MODEL']]}],
["Random Forest combines multiple decision trees to improve prediction accuracy.", {'entities': [[0, 13, 'ALGORITHM_MODEL'], [32, 45, 'ALGORITHM_MODEL']]}],
["GPT-4 demonstrates remarkable natural language generation capabilities.", {'entities': [[0, 5, 'ALGORITHM_MODEL']]}],
["Linear regression finds the relationship between independent and dependent variables.", {'entities': [[0, 16, 'ALGORITHM_MODEL']]}],
["The PageRank algorithm was fundamental to Google's early search engine success.", {'entities': [[4, 20, 'ALGORITHM_MODEL']]}],
["ResNet introduced residual connections to train deeper neural networks.", {'entities': [[0, 6, 'ALGORITHM_MODEL']]}],
["Dijkstra's algorithm finds the shortest path in a weighted graph.", {'entities': [[0, 19, 'ALGORITHM_MODEL']]}],
["Naive Bayes classifiers are based on applying Bayes' theorem with independence assumptions.", {'entities': [[0, 11, 'ALGORITHM_MODEL'], [42, 56, 'ALGORITHM_MODEL']]}],
["Transformer models have largely replaced RNNs for sequence modeling tasks.", {'entities': [[0, 11, 'ALGORITHM_MODEL'], [38, 42, 'ALGORITHM_MODEL']]}],
["YOLO enables real-time object detection in computer vision applications.", {'entities': [[0, 4, 'ALGORITHM_MODEL']]}],
["A* search algorithm efficiently finds paths in graph traversal problems.", {'entities': [[0, 17, 'ALGORITHM_MODEL']]}],
["LSTM networks are designed to handle the vanishing gradient problem in sequence data.", {'entities': [[0, 4, 'ALGORITHM_MODEL']]}],
["XGBoost implements gradient boosting with regularization features.", {'entities': [[0, 7, 'ALGORITHM_MODEL'], [19, 36, 'ALGORITHM_MODEL']]}],
["Convolutional Neural Networks excel at image processing tasks.", {'entities': [[0, 29, 'ALGORITHM_MODEL']]}],
["The SHA-256 algorithm generates fixed-size hash values.", {'entities': [[4, 11, 'ALGORITHM_MODEL']]}],
["Decision trees split data based on feature values to make predictions.", {'entities': [[0, 14, 'ALGORITHM_MODEL']]}],
["LLaMA and Llama 2 are open-source large language models.", {'entities': [[0, 5, 'ALGORITHM_MODEL'], [10, 17, 'ALGORITHM_MODEL']]}],
["Support Vector Machines find optimal hyperplanes to separate data classes.", {'entities': [[0, 23, 'ALGORITHM_MODEL']]}],
["Q-learning is a model-free reinforcement learning algorithm.", {'entities': [[0, 10, 'ALGORITHM_MODEL'], [25, 48, 'ALGORITHM_MODEL']]}],
["RSA encryption relies on the computational difficulty of factoring large prime numbers.", {'entities': [[0, 3, 'ALGORITHM_MODEL']]}],
["AlphaGo demonstrated superhuman performance in the game of Go.", {'entities': [[0, 7, 'ALGORITHM_MODEL']]}],
["Principal Component Analysis reduces data dimensionality while preserving variance.", {'entities': [[0, 28, 'ALGORITHM_MODEL']]}],
["T5 and BART are encoder-decoder transformer models for text generation.", {'entities': [[0, 2, 'ALGORITHM_MODEL'], [7, 11, 'ALGORITHM_MODEL'], [27, 37, 'ALGORITHM_MODEL']]}],
["K-nearest neighbors classification is intuitive but computationally expensive.", {'entities': [[0, 20, 'ALGORITHM_MODEL']]}],
["Binary search requires sorted data to efficiently locate values.", {'entities': [[0, 13, 'ALGORITHM_MODEL']]}],
["GANs consist of generator and discriminator networks competing against each other.", {'entities': [[0, 4, 'ALGORITHM_MODEL']]}],
["Quicksort typically outperforms other sorting algorithms for random data.", {'entities': [[0, 9, 'ALGORITHM_MODEL']]}],
["Word2Vec maps words to vector representations capturing semantic relationships.", {'entities': [[0, 8, 'ALGORITHM_MODEL']]}],
["DBSCAN clusters data based on density without requiring a predefined number of clusters.", {'entities': [[0, 6, 'ALGORITHM_MODEL']]}],
["Markov chains model sequences where each state depends only on the previous state.", {'entities': [[0, 13, 'ALGORITHM_MODEL']]}],
["ARIMA models forecast time series data with seasonal components.", {'entities': [[0, 5, 'ALGORITHM_MODEL']]}],
["The Fast Fourier Transform efficiently converts signals between time and frequency domains.", {'entities': [[4, 25, 'ALGORITHM_MODEL']]}],
["Logistic regression predicts binary outcomes despite its name suggesting regression.", {'entities': [[0, 18, 'ALGORITHM_MODEL']]}],
["MobileNet optimizes convolutional neural networks for mobile devices.", {'entities': [[0, 9, 'ALGORITHM_MODEL'], [20, 49, 'ALGORITHM_MODEL']]}],
["Bubble sort is simple to implement but inefficient for large datasets.", {'entities': [[0, 11, 'ALGORITHM_MODEL']]}],
["U-Net architecture excels at image segmentation tasks.", {'entities': [[0, 5, 'ALGORITHM_MODEL']]}],
["The AES encryption standard provides strong security for sensitive data.", {'entities': [[4, 7, 'ALGORITHM_MODEL']]}],
["Gradient descent iteratively minimizes error functions in machine learning models.", {'entities': [[0, 16, 'ALGORITHM_MODEL']]}],
["The minimax algorithm is fundamental to strategic decision-making in game theory.", {'entities': [[4, 19, 'ALGORITHM_MODEL']]}],
["ViT applies transformer architecture to image recognition tasks.", {'entities': [[0, 3, 'ALGORITHM_MODEL'], [12, 22, 'ALGORITHM_MODEL']]}],
["Hierarchical clustering organizes data into a tree-like structure of nested clusters.", {'entities': [[0, 22, 'ALGORITHM_MODEL']]}],
["MD5 hashing is no longer considered secure for cryptographic applications.", {'entities': [[0, 3, 'ALGORITHM_MODEL']]}],
["Deep Q-Networks combine Q-learning with deep neural networks.", {'entities': [[0, 16, 'ALGORITHM_MODEL'], [25, 35, 'ALGORITHM_MODEL'], [41, 62, 'ALGORITHM_MODEL']]}],
["The Apriori algorithm identifies frequent itemsets in transaction databases.", {'entities': [[4, 20, 'ALGORITHM_MODEL']]}],
["Both BERT and RoBERTa have advanced the state of natural language understanding.", {'entities': [[5, 9, 'ALGORITHM_MODEL'], [14, 21, 'ALGORITHM_MODEL']]}],
["GPT-3 and DALL-E demonstrate different applications of transformer architectures.", {'entities': [[0, 5, 'ALGORITHM_MODEL'], [10, 16, 'ALGORITHM_MODEL'], [59, 69, 'ALGORITHM_MODEL']]}],
["CNN and RNN architectures serve different purposes in deep learning.", {'entities': [[0, 3, 'ALGORITHM_MODEL'], [8, 11, 'ALGORITHM_MODEL'], [55, 68, 'ALGORITHM_MODEL']]}],
["The combination of Random Forest and Gradient Boosting often yields robust predictions.", {'entities': [[17, 30, 'ALGORITHM_MODEL'], [35, 51, 'ALGORITHM_MODEL']]}],
["HTTP forms the foundation of data communication on the web.", {'entities': [[0, 4, 'PROTOCOL']]}],
["HTTPS adds encryption to HTTP for secure communication.", {'entities': [[0, 5, 'PROTOCOL'], [24, 28, 'PROTOCOL']]}],
["TCP ensures reliable, ordered data delivery between applications.", {'entities': [[0, 3, 'PROTOCOL']]}],
["UDP prioritizes speed over reliability for real-time applications.", {'entities': [[0, 3, 'PROTOCOL']]}],
["SSH provides secure remote access to systems and servers.", {'entities': [[0, 3, 'PROTOCOL']]}],
["FTP is commonly used for transferring files between clients and servers.", {'entities': [[0, 3, 'PROTOCOL']]}],
["SMTP handles email transmission between servers.", {'entities': [[0, 4, 'PROTOCOL']]}],
["DNS translates domain names to IP addresses for network routing.", {'entities': [[0, 3, 'PROTOCOL'], [34, 36, 'PROTOCOL']]}],
["DHCP automatically assigns IP addresses to devices on a network.", {'entities': [[0, 4, 'PROTOCOL'], [26, 28, 'PROTOCOL']]}],
["IMAP allows email clients to access messages stored on mail servers.", {'entities': [[0, 4, 'PROTOCOL']]}],
["Bluetooth enables wireless communication between nearby devices.", {'entities': [[0, 9, 'PROTOCOL']]}],
["POP3 downloads email from servers to local clients.", {'entities': [[0, 4, 'PROTOCOL']]}],
["LDAP provides directory services for user authentication.", {'entities': [[0, 4, 'PROTOCOL']]}],
["MQTT is designed for IoT devices with limited bandwidth and processing power.", {'entities': [[0, 4, 'PROTOCOL'], [19, 22, 'PROTOCOL']]}],
["WebSockets enable real-time bidirectional communication in web applications.", {'entities': [[0, 11, 'PROTOCOL']]}],
["NTP synchronizes clocks across computer networks.", {'entities': [[0, 3, 'PROTOCOL']]}],
["SIP is a signaling protocol for initiating and maintaining real-time sessions.", {'entities': [[0, 3, 'PROTOCOL']]}],
["SNMP monitors and manages network devices and their functions.", {'entities': [[0, 4, 'PROTOCOL']]}],
["TLS provides privacy and data integrity between communicating applications.", {'entities': [[0, 3, 'PROTOCOL']]}],
["RTP transports audio and video over IP networks for streaming applications.", {'entities': [[0, 3, 'PROTOCOL'], [35, 37, 'PROTOCOL']]}],
["RTSP controls streaming media servers in real-time applications.", {'entities': [[0, 4, 'PROTOCOL']]}],
["SMB allows file and printer sharing between networked computers.", {'entities': [[0, 3, 'PROTOCOL']]}],
["BGP routes traffic between autonomous systems on the internet.", {'entities': [[0, 3, 'PROTOCOL']]}],
["OAuth provides secure delegated access to server resources.", {'entities': [[0, 5, 'PROTOCOL']]}],
["IPv6 expands the address space available for internet-connected devices.", {'entities': [[0, 4, 'PROTOCOL']]}],
["ARP maps IP addresses to MAC addresses on local networks.", {'entities': [[0, 3, 'PROTOCOL'], [9, 11, 'PROTOCOL'], [22, 25, 'PROTOCOL']]}],
["XMPP enables real-time communication and presence information.", {'entities': [[0, 4, 'PROTOCOL']]}],
["ICMP sends error messages and operational information about network conditions.", {'entities': [[0, 4, 'PROTOCOL']]}],
["BitTorrent distributes file sharing across peer-to-peer networks.", {'entities': [[0, 10, 'PROTOCOL']]}],
["IPsec secures IP communication by authenticating and encrypting packets.", {'entities': [[0, 5, 'PROTOCOL'], [14, 16, 'PROTOCOL']]}],
["gRPC enables efficient communication between microservices.", {'entities': [[0, 4, 'PROTOCOL']]}],
["WebRTC enables real-time communication directly in web browsers.", {'entities': [[0, 6, 'PROTOCOL']]}],
["Telnet provides text-based remote login functionality.", {'entities': [[0, 6, 'PROTOCOL']]}],
["OSPF routes packets within a single autonomous system.", {'entities': [[0, 4, 'PROTOCOL']]}],
["QUIC improves performance of connection-oriented web applications.", {'entities': [[0, 4, 'PROTOCOL']]}],
["WPA3 secures wireless networks with stronger encryption methods.", {'entities': [[0, 4, 'PROTOCOL']]}],
["CoAP is designed for internet of things devices with limited resources.", {'entities': [[0, 4, 'PROTOCOL']]}],
["SFTP adds encryption to FTP for secure file transfers.", {'entities': [[0, 4, 'PROTOCOL'], [21, 24, 'PROTOCOL']]}],
["REST defines a set of constraints for creating web services.", {'entities': [[0, 4, 'PROTOCOL']]}],
["SOAP exchanges structured information in web services implementation.", {'entities': [[0, 4, 'PROTOCOL']]}],
["RDP enables remote connections to another computer over a network.", {'entities': [[0, 3, 'PROTOCOL']]}],
["NetBIOS provides services for local network communications.", {'entities': [[0, 7, 'PROTOCOL']]}],
["ZigBee is designed for low-power wireless personal area networks.", {'entities': [[0, 6, 'PROTOCOL']]}],
["IGMP manages multicast group memberships on IP networks.", {'entities': [[0, 4, 'PROTOCOL'], [43, 45, 'PROTOCOL']]}],
["Z-Wave enables wireless communication for home automation devices.", {'entities': [[0, 6, 'PROTOCOL']]}],
["LwM2M standardizes communication between IoT devices and servers.", {'entities': [[0, 5, 'PROTOCOL'], [33, 36, 'PROTOCOL']]}],
["Modbus connects industrial electronic devices in automation systems.", {'entities': [[0, 6, 'PROTOCOL']]}],
["Both HTTP and HTTPS protocols are fundamental to web communication.", {'entities': [[5, 9, 'PROTOCOL'], [14, 19, 'PROTOCOL']]}],
["SSH and SFTP provide secure alternatives to Telnet and FTP respectively.", {'entities': [[0, 3, 'PROTOCOL'], [8, 12, 'PROTOCOL'], [45, 51, 'PROTOCOL'], [56, 59, 'PROTOCOL']]}],
["The combination of TCP and IP forms the foundation of internet communication.", {'entities': [[17, 20, 'PROTOCOL'], [25, 27, 'PROTOCOL']]}],
["SSL/TLS protocols encrypt data transmitted between web clients and servers.", {'entities': [[0, 7, 'PROTOCOL']]}],
["NFC enables short-range wireless communication between compatible devices.", {'entities': [[0, 3, 'PROTOCOL']]}],
["LoRaWAN is designed for wide-area networks with low power requirements.", {'entities': [[0, 7, 'PROTOCOL']]}],
["IMAP and POP3 are email retrieval protocols with different capabilities.", {'entities': [[0, 4, 'PROTOCOL'], [9, 13, 'PROTOCOL']]}],
["DNS and DHCP are critical network services for modern internet connectivity.", {'entities': [[0, 3, 'PROTOCOL'], [8, 12, 'PROTOCOL']]}],
["SMTP, IMAP, and POP3 handle different aspects of email communication.", {'entities': [[0, 4, 'PROTOCOL'], [6, 10, 'PROTOCOL'], [16, 20, 'PROTOCOL']]}],
["The WebSocket protocol enables full-duplex communication channels over TCP.", {'entities': [[4, 13, 'PROTOCOL'], [66, 69, 'PROTOCOL']]}],
["Both UDP and TCP operate at the transport layer of the OSI model.", {'entities': [[5, 8, 'PROTOCOL'], [13, 16, 'PROTOCOL'], [54, 57, 'PROTOCOL']]}],
["MQTT and CoAP are lightweight protocols designed for IoT applications.", {'entities': [[0, 4, 'PROTOCOL'], [9, 13, 'PROTOCOL'], [35, 38, 'PROTOCOL']]}],
["HTTP/3 uses QUIC instead of TCP for improved performance.", {'entities': [[0, 6, 'PROTOCOL'], [12, 16, 'PROTOCOL'], [28, 31, 'PROTOCOL']]}],
["PDF documents preserve formatting across different platforms.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["JPEG compression balances image quality with file size.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["JSON is widely used for data interchange between web services.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["MP3 files revolutionized digital music distribution.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["HTML documents form the structure of web pages.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["CSV files store tabular data in plain text format.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["XML provides a flexible way to define structured data.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["PNG supports lossless compression and transparency.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["DOCX is the default format for Microsoft Word documents.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["MP4 containers can store video, audio, and subtitle tracks.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["XLSX spreadsheets organize data in rows and columns.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["GIF images support animation and were popular in early web design.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["SVG graphics scale without losing quality at any resolution.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["TIFF images are commonly used in publishing and professional photography.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["WAV files provide uncompressed audio with high fidelity.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["YAML offers a human-readable data serialization standard.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["ZIP archives compress multiple files into a single container.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["EXE files are executable programs on Windows systems.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["RAR provides efficient compression for file archives.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["PPTX presentations include slides, notes, and multimedia elements.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["WEBP images offer better compression than JPEG with similar quality.", {'entities': [[0, 4, 'FILE_FORMAT'], [44, 48, 'FILE_FORMAT']]}],
["OBJ files store 3D geometry data for models and scenes.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["EPUB is the standard format for digital books and publications.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["MOV files are Apple's QuickTime video container format.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["SQL scripts define database schemas and operations.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["FLAC provides lossless audio compression for archival purposes.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["PSD files preserve Photoshop editing capabilities and layers.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["AVI is an older video container format developed by Microsoft.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["OGG is an open container format for multimedia content.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["TXT files contain plain text without formatting information.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["ICO files contain icons for Windows applications and websites.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["BMP images store bitmap data without compression.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["AVIF is a newer image format offering efficient compression.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["MKV containers support multiple video, audio, and subtitle tracks.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["TTF and OTF are font file formats with different capabilities.", {'entities': [[0, 3, 'FILE_FORMAT'], [8, 11, 'FILE_FORMAT']]}],
["DWG files contain proprietary AutoCAD drawing data.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["APK packages contain Android application files.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["RTF documents support basic text formatting across platforms.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["SRT files contain subtitle timing information for videos.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["STL files describe surface geometry for 3D printing.", {'entities': [[0, 3, 'FILE_FORMAT']]}],
["HDF5 provides a hierarchical data format for scientific datasets.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["HEIC images offer high efficiency compression on Apple devices.", {'entities': [[0, 4, 'FILE_FORMAT']]}],
["PDF, DOCX, and XLSX are common document formats in business environments.", {'entities': [[0, 3, 'FILE_FORMAT'], [5, 9, 'FILE_FORMAT'], [15, 19, 'FILE_FORMAT']]}],
["JPEG, PNG, and GIF are widely used image formats on the web.", {'entities': [[0, 4, 'FILE_FORMAT'], [6, 9, 'FILE_FORMAT'], [15, 18, 'FILE_FORMAT']]}],
["MP3, WAV, and FLAC represent different approaches to audio compression.", {'entities': [[0, 3, 'FILE_FORMAT'], [5, 8, 'FILE_FORMAT'], [14, 18, 'FILE_FORMAT']]}],
["CSV and JSON are popular formats for data exchange between systems.", {'entities': [[0, 3, 'FILE_FORMAT'], [8, 12, 'FILE_FORMAT']]}],
["Both XML and YAML provide structured data serialization options.", {'entities': [[5, 8, 'FILE_FORMAT'], [13, 17, 'FILE_FORMAT']]}],
["MP4 and MKV containers store video content with different feature sets.", {'entities': [[0, 3, 'FILE_FORMAT'], [8, 11, 'FILE_FORMAT']]}],
["The choice between PNG and JPEG depends on the image content and use case.", {'entities': [[17, 20, 'FILE_FORMAT'], [25, 29, 'FILE_FORMAT']]}],
["A firewall protects networks by filtering incoming and outgoing traffic.", {'entities': [[2, 10, 'CYBERSECURITY_TERM']]}],
["Malware includes viruses, trojans, and other malicious software.", {'entities': [[0, 7, 'CYBERSECURITY_TERM'], [17, 24, 'CYBERSECURITY_TERM'], [26, 33, 'CYBERSECURITY_TERM']]}],
["Zero-day vulnerabilities are unknown to software vendors and lack patches.", {'entities': [[0, 8, 'CYBERSECURITY_TERM'], [9, 23, 'CYBERSECURITY_TERM']]}],
["Phishing attacks trick users into revealing sensitive information.", {'entities': [[0, 8, 'CYBERSECURITY_TERM'], [9, 16, 'CYBERSECURITY_TERM']]}],
["Encryption converts data into unreadable code to prevent unauthorized access.", {'entities': [[0, 10, 'CYBERSECURITY_TERM']]}],
["A VPN creates a secure connection over public networks.", {'entities': [[2, 5, 'CYBERSECURITY_TERM']]}],
["Two-factor authentication adds an extra layer of security beyond passwords.", {'entities': [[0, 27, 'CYBERSECURITY_TERM']]}],
["Ransomware encrypts files and demands payment for decryption keys.", {'entities': [[0, 10, 'CYBERSECURITY_TERM'], [54, 70, 'CYBERSECURITY_TERM']]}],
["SQL injection attacks exploit vulnerable database queries.", {'entities': [[0, 13, 'CYBERSECURITY_TERM'], [14, 21, 'CYBERSECURITY_TERM']]}],
["DDoS attacks overwhelm servers with excessive traffic.", {'entities': [[0, 4, 'CYBERSECURITY_TERM'], [5, 12, 'CYBERSECURITY_TERM']]}],
["A security token provides temporary authentication credentials.", {'entities': [[2, 16, 'CYBERSECURITY_TERM'], [36, 50, 'CYBERSECURITY_TERM']]}],
["Penetration testing evaluates system security by simulating attacks.", {'entities': [[0, 19, 'CYBERSECURITY_TERM']]}],
["A honeypot attracts attackers to monitor their tactics.", {'entities': [[2, 10, 'CYBERSECURITY_TERM']]}],
["Social engineering manipulates people into divulging confidential information.", {'entities': [[0, 18, 'CYBERSECURITY_TERM']]}],
["An intrusion detection system monitors networks for suspicious activity.", {'entities': [[3, 30, 'CYBERSECURITY_TERM']]}],
["Biometric authentication uses physical characteristics for identity verification.", {'entities': [[0, 25, 'CYBERSECURITY_TERM'], [66, 88, 'CYBERSECURITY_TERM']]}],
["A man-in-the-middle attack intercepts communications between two parties.", {'entities': [[2, 24, 'CYBERSECURITY_TERM'], [25, 31, 'CYBERSECURITY_TERM']]}],
["The principle of least privilege restricts access rights to the minimum necessary.", {'entities': [[4, 32, 'CYBERSECURITY_TERM']]}],
["A rootkit enables unauthorized access to a computer while hiding its existence.", {'entities': [[2, 9, 'CYBERSECURITY_TERM'], [27, 33, 'CYBERSECURITY_TERM']]}],
["Threat modeling identifies and prioritizes potential security risks.", {'entities': [[0, 15, 'CYBERSECURITY_TERM'], [45, 60, 'CYBERSECURITY_TERM']]}],
["Exploit kits automate cyberattacks using known vulnerabilities.", {'entities': [[0, 12, 'CYBERSECURITY_TERM'], [22, 34, 'CYBERSECURITY_TERM'], [41, 55, 'CYBERSECURITY_TERM']]}],
["Hash functions generate fixed-size outputs from variable-size inputs.", {'entities': [[0, 14, 'CYBERSECURITY_TERM']]}],
["Spyware collects information without the user's knowledge or consent.", {'entities': [[0, 7, 'CYBERSECURITY_TERM']]}],
["Access control lists define permissions for system resources.", {'entities': [[0, 20, 'CYBERSECURITY_TERM'], [28, 39, 'CYBERSECURITY_TERM']]}],
["A sandbox isolates programs to prevent malicious code from spreading.", {'entities': [[2, 9, 'CYBERSECURITY_TERM'], [41, 55, 'CYBERSECURITY_TERM']]}],
["A backdoor provides unauthorized access to a system while bypassing security measures.", {'entities': [[2, 10, 'CYBERSECURITY_TERM'], [29, 35, 'CYBERSECURITY_TERM']]}],
["Cryptojacking hijacks computing resources to mine cryptocurrency.", {'entities': [[0, 13, 'CYBERSECURITY_TERM']]}],
["A cross-site scripting attack injects malicious code into trusted websites.", {'entities': [[2, 27, 'CYBERSECURITY_TERM'], [28, 34, 'CYBERSECURITY_TERM'], [42, 56, 'CYBERSECURITY_TERM']]}],
["Buffer overflow exploits occur when programs write data beyond allocated memory.", {'entities': [[0, 15, 'CYBERSECURITY_TERM'], [16, 24, 'CYBERSECURITY_TERM']]}],
["Digital signatures verify the authenticity and integrity of messages.", {'entities': [[0, 18, 'CYBERSECURITY_TERM'], [33, 45, 'CYBERSECURITY_TERM'], [50, 59, 'CYBERSECURITY_TERM']]}],
["Keyloggers record keystrokes to capture sensitive information.", {'entities': [[0, 10, 'CYBERSECURITY_TERM']]}],
["A botnet consists of compromised computers controlled by attackers.", {'entities': [[2, 8, 'CYBERSECURITY_TERM'], [22, 33, 'CYBERSECURITY_TERM']]}],
["The CIA triad defines confidentiality, integrity, and availability goals.", {'entities': [[4, 13, 'CYBERSECURITY_TERM'], [22, 37, 'CYBERSECURITY_TERM'], [39, 48, 'CYBERSECURITY_TERM'], [54, 66, 'CYBERSECURITY_TERM']]}],
["Security through obscurity relies on secrecy rather than robust design.", {'entities': [[0, 28, 'CYBERSECURITY_TERM']]}],
["CSRF attacks trick users into performing unwanted actions on authenticated websites.", {'entities': [[0, 4, 'CYBERSECURITY_TERM'], [5, 12, 'CYBERSECURITY_TERM'], [54, 67, 'CYBERSECURITY_TERM']]}],
["A zero-trust model assumes no implicit trust in any user or system.", {'entities': [[2, 18, 'CYBERSECURITY_TERM'], [34, 39, 'CYBERSECURITY_TERM']]}],
["The cyber kill chain describes stages of cyberattacks for defensive planning.", {'entities': [[4, 19, 'CYBERSECURITY_TERM'], [39, 51, 'CYBERSECURITY_TERM']]}],
["Vulnerability scanning identifies potential security weaknesses in systems.", {'entities': [[0, 23, 'CYBERSECURITY_TERM'], [42, 61, 'CYBERSECURITY_TERM']]}],
["A denial-of-service attack makes resources unavailable to intended users.", {'entities': [[2, 25, 'CYBERSECURITY_TERM'], [26, 32, 'CYBERSECURITY_TERM']]}],
["Both phishing and spear phishing attempt to steal sensitive information, but target different scopes.", {'entities': [[5, 13, 'CYBERSECURITY_TERM'], [18, 32, 'CYBERSECURITY_TERM'], [50, 72, 'CYBERSECURITY_TERM']]}],
["Encryption and hashing protect data in different ways with distinct security purposes.", {'entities': [[0, 10, 'CYBERSECURITY_TERM'], [15, 22, 'CYBERSECURITY_TERM'], [40, 49, 'CYBERSECURITY_TERM'], [61, 69, 'CYBERSECURITY_TERM']]}],
["A combination of firewalls, IDS, and antivirus software creates defense in depth.", {'entities': [[16, 25, 'CYBERSECURITY_TERM'], [27, 30, 'CYBERSECURITY_TERM'], [36, 45, 'CYBERSECURITY_TERM'], [66, 81, 'CYBERSECURITY_TERM']]}],
["Threat actors include hackers, nation-states, and insider threats.", {'entities': [[0, 13, 'CYBERSECURITY_TERM'], [22, 29, 'CYBERSECURITY_TERM'], [31, 44, 'CYBERSECURITY_TERM'], [50, 65, 'CYBERSECURITY_TERM']]}],
["Both authentication and authorization are critical for access control systems.", {'entities': [[5, 19, 'CYBERSECURITY_TERM'], [24, 36, 'CYBERSECURITY_TERM'], [54, 68, 'CYBERSECURITY_TERM']]}],
["The security team conducted penetration testing and vulnerability scanning to identify weaknesses.", {'entities': [[25, 44, 'CYBERSECURITY_TERM'], [49, 72, 'CYBERSECURITY_TERM']]}],
["A secure SDLC integrates security throughout the software development lifecycle.", {'entities': [[9, 13, 'CYBERSECURITY_TERM'], [25, 33, 'CYBERSECURITY_TERM'], [48, 74, 'CYBERSECURITY_TERM']]}],
["Implementing MFA reduces the risk of credential theft and account takeovers.", {'entities': [[13, 16, 'CYBERSECURITY_TERM'], [38, 55, 'CYBERSECURITY_TERM'], [60, 78, 'CYBERSECURITY_TERM']]}],
["Security incidents require proper incident response and forensic analysis.", {'entities': [[0, 19, 'CYBERSECURITY_TERM'], [37, 54, 'CYBERSECURITY_TERM'], [59, 75, 'CYBERSECURITY_TERM']]}],
['React is a JavaScript library for building user interfaces.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['Angular is a platform for building mobile and desktop apps.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Vue.js is a progressive JavaScript framework.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Django is a high-level Python web framework.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Flask is a lightweight Python web framework.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['Spring is a framework for building Java applications.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Laravel is a PHP framework for web artisans.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Express.js is a Node.js web application framework.', {'entities': [[0, 10, 'FRAMEWORK_LIBRARY']]}],
['Ruby on Rails is a server-side web application framework.', {'entities': [[0, 13, 'FRAMEWORK_LIBRARY']]}],
['TensorFlow is an open-source machine learning library.', {'entities': [[0, 10, 'FRAMEWORK_LIBRARY']]}],
['PyTorch is a machine learning library developed by Facebook.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Keras is a high-level neural networks API.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['Bootstrap is a front-end framework for responsive design.', {'entities': [[0, 9, 'FRAMEWORK_LIBRARY']]}],
['jQuery is a fast and concise JavaScript library.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Ember.js is a framework for ambitious web applications.', {'entities': [[0, 8, 'FRAMEWORK_LIBRARY']]}],
['Svelte is a modern JavaScript framework.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Next.js is a React framework for server-side rendering.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Nuxt.js is a Vue.js framework for universal applications.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Flutter is a UI toolkit for building natively compiled apps.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Xamarin is a framework for building cross-platform apps.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Cordova is a platform for building mobile apps with web tech.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Ionic is a framework for building hybrid mobile apps.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['ASP.NET is a framework for building web applications.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Symfony is a PHP framework for web projects.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['CakePHP is a rapid development framework for PHP.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['CodeIgniter is a lightweight PHP framework.', {'entities': [[0, 11, 'FRAMEWORK_LIBRARY']]}],
['Zend Framework is a PHP framework for enterprise apps.', {'entities': [[0, 14, 'FRAMEWORK_LIBRARY']]}],
['Hibernate is a Java framework for object-relational mapping.', {'entities': [[0, 9, 'FRAMEWORK_LIBRARY']]}],
['Struts is a framework for building Java web applications.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Play Framework is a reactive web framework for Java.', {'entities': [[0, 14, 'FRAMEWORK_LIBRARY']]}],
['Grails is a Groovy-based framework for web applications.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Meteor is a full-stack JavaScript framework.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Backbone.js is a lightweight JavaScript framework.', {'entities': [[0, 11, 'FRAMEWORK_LIBRARY']]}],
['Aurelia is a modern JavaScript framework.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Polymer is a library for building web components.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Three.js is a JavaScript library for 3D graphics.', {'entities': [[0, 8, 'FRAMEWORK_LIBRARY']]}],
['D3.js is a JavaScript library for data visualization.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['Chart.js is a simple JavaScript charting library.', {'entities': [[0, 8, 'FRAMEWORK_LIBRARY']]}],
['Socket.IO is a library for real-time web applications.', {'entities': [[0, 9, 'FRAMEWORK_LIBRARY']]}],
['Axios is a promise-based HTTP client for the browser.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['Lodash is a utility library for JavaScript.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Moment.js is a library for parsing and formatting dates.', {'entities': [[0, 9, 'FRAMEWORK_LIBRARY']]}],
['Underscore.js is a JavaScript utility library.', {'entities': [[0, 13, 'FRAMEWORK_LIBRARY']]}],
['Redux is a state management library for JavaScript apps.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['MobX is a state management library for React apps.', {'entities': [[0, 4, 'FRAMEWORK_LIBRARY']]}],
['GraphQL is a query language for APIs.', {'entities': [[0, 7, 'FRAMEWORK_LIBRARY']]}],
['Apollo is a GraphQL client for React applications.', {'entities': [[0, 6, 'FRAMEWORK_LIBRARY']]}],
['Jest is a JavaScript testing framework.', {'entities': [[0, 4, 'FRAMEWORK_LIBRARY']]}],
['Mocha is a JavaScript test framework for Node.js.', {'entities': [[0, 5, 'FRAMEWORK_LIBRARY']]}],
['Chai is an assertion library for Node.js.', {'entities': [[0, 4, 'FRAMEWORK_LIBRARY']]}],
['Python is a popular programming language.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['Java is widely used for enterprise applications.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['JavaScript is essential for web development.', {'entities': [[0, 10, 'PROGRAMMING_LANGUAGE']]}],
['C++ is known for its performance and efficiency.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['Ruby is often used for building web applications.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['Go is a statically typed language developed by Google.', {'entities': [[0, 2, 'PROGRAMMING_LANGUAGE']]}],
['Swift is the primary language for iOS development.', {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
['Kotlin is fully interoperable with Java.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['Rust is gaining popularity for system-level programming.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['TypeScript adds static typing to JavaScript.', {'entities': [[0, 10, 'PROGRAMMING_LANGUAGE']]}],
['PHP is commonly used for server-side scripting.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['Perl is known for its text processing capabilities.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['Scala combines object-oriented and functional programming.', {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
['Dart is used for building mobile and web apps.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['Haskell is a purely functional programming language.', {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE']]}],
['Lua is often embedded in applications for scripting.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['Elixir is built on the Erlang virtual machine.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['Clojure is a dialect of Lisp for the JVM.', {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE']]}],
['F# is a functional-first language for .NET.', {'entities': [[0, 2, 'PROGRAMMING_LANGUAGE']]}],
['R is widely used for statistical computing.', {'entities': [[0, 1, 'PROGRAMMING_LANGUAGE']]}],
['Objective-C was the main language for macOS development.', {'entities': [[0, 11, 'PROGRAMMING_LANGUAGE']]}],
['Bash is a shell scripting language for Unix systems.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['PowerShell is a task automation framework.', {'entities': [[0, 11, 'PROGRAMMING_LANGUAGE']]}],
['Groovy is a dynamic language for the Java platform.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['Julia is designed for high-performance numerical analysis.', {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
['Ada is used in safety-critical systems.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['COBOL is still used in legacy systems.', {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
['Fortran is used in scientific computing.', {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE']]}],
['Prolog is a logic programming language.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['Erlang is known for its concurrency support.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['OCaml is a functional language with type inference.', {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
['Smalltalk is an object-oriented programming language.', {'entities': [[0, 9, 'PROGRAMMING_LANGUAGE']]}],
['Scheme is a minimalist dialect of Lisp.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['Racket is a general-purpose programming language.', {'entities': [[0, 6, 'PROGRAMMING_LANGUAGE']]}],
['VHDL is used for hardware description.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['Verilog is another hardware description language.', {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE']]}],
['ABAP is used for SAP application development.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['D is a systems programming language.', {'entities': [[0, 1, 'PROGRAMMING_LANGUAGE']]}],
['Nim is a statically typed compiled language.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['Zig is a general-purpose programming language.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['Crystal is inspired by Ruby and focuses on performance.', {'entities': [[0, 7, 'PROGRAMMING_LANGUAGE']]}],
['Elm is a functional language for front-end development.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['ReasonML is a syntax extension for OCaml.', {'entities': [[0, 8, 'PROGRAMMING_LANGUAGE']]}],
['PureScript is a strongly-typed functional language.', {'entities': [[0, 10, 'PROGRAMMING_LANGUAGE']]}],
['Idris is a general-purpose functional language.', {'entities': [[0, 5, 'PROGRAMMING_LANGUAGE']]}],
['ATS is a language with formal verification features.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['Agda is a dependently typed functional language.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['Coq is used for formal verification of software.', {'entities': [[0, 3, 'PROGRAMMING_LANGUAGE']]}],
['Isabelle is a proof assistant and programming language.', {'entities': [[0, 9, 'PROGRAMMING_LANGUAGE']]}],
['Lean is a functional programming language.', {'entities': [[0, 4, 'PROGRAMMING_LANGUAGE']]}],
['The CPU is the brain of the computer.', {'entities': [[4, 7, 'HARDWARE']]}],
['GPUs are essential for rendering graphics.', {'entities': [[0, 4, 'HARDWARE']]}],
['SSDs are faster than traditional hard drives.', {'entities': [[0, 4, 'HARDWARE']]}],
['The motherboard connects all the components.', {'entities': [[4, 15, 'HARDWARE']]}],
['RAM is used for temporary data storage.', {'entities': [[0, 3, 'HARDWARE']]}],
['The power supply unit provides electricity to the system.', {'entities': [[4, 20, 'HARDWARE']]}],
['A cooling fan prevents the system from overheating.', {'entities': [[2, 13, 'HARDWARE']]}],
['The keyboard and mouse are input devices.', {'entities': [[4, 12, 'HARDWARE'], [17, 22, 'HARDWARE']]}],
['The monitor displays the output from the computer.', {'entities': [[4, 11, 'HARDWARE']]}],
['A printer is used to produce physical copies of documents.', {'entities': [[2, 9, 'HARDWARE']]}],
['The hard drive stores all the data permanently.', {'entities': [[4, 14, 'HARDWARE']]}],
['The graphics card enhances visual performance.', {'entities': [[4, 18, 'HARDWARE']]}],
['The sound card improves audio quality.', {'entities': [[4, 14, 'HARDWARE']]}],
['A network adapter connects the computer to the internet.', {'entities': [[2, 17, 'HARDWARE']]}],
['The optical drive reads CDs and DVDs.', {'entities': [[4, 17, 'HARDWARE']]}],
['A USB flash drive is portable and convenient.', {'entities': [[2, 16, 'HARDWARE']]}],
['The case houses all the internal components.', {'entities': [[4, 8, 'HARDWARE']]}],
['The heatsink dissipates heat from the CPU.', {'entities': [[4, 12, 'HARDWARE']]}],
['A microphone is used for voice input.', {'entities': [[2, 12, 'HARDWARE']]}],
['The scanner converts physical documents into digital files.', {'entities': [[4, 11, 'HARDWARE']]}],
['A webcam is used for video conferencing.', {'entities': [[2, 8, 'HARDWARE']]}],
['The router connects multiple devices to the internet.', {'entities': [[4, 10, 'HARDWARE']]}],
['A modem converts digital signals to analog signals.', {'entities': [[2, 7, 'HARDWARE']]}],
['The touchpad is an alternative to a mouse.', {'entities': [[4, 12, 'HARDWARE']]}],
['A joystick is used for gaming and simulations.', {'entities': [[2, 10, 'HARDWARE']]}],
['The projector displays images on a large screen.', {'entities': [[4, 13, 'HARDWARE']]}],
['A barcode scanner reads product information.', {'entities': [[2, 18, 'HARDWARE']]}],
['The server rack organizes multiple servers.', {'entities': [[4, 15, 'HARDWARE']]}],
['A docking station connects laptops to peripherals.', {'entities': [[2, 16, 'HARDWARE']]}],
['The stylus is used for drawing on touchscreens.', {'entities': [[4, 10, 'HARDWARE']]}],
['A VR headset provides an immersive experience.', {'entities': [[2, 12, 'HARDWARE']]}],
['The smartwatch tracks fitness and health metrics.', {'entities': [[4, 13, 'HARDWARE']]}],
['A drone is used for aerial photography.', {'entities': [[2, 7, 'HARDWARE']]}],
['The e-reader is designed for reading digital books.', {'entities': [[4, 12, 'HARDWARE']]}],
['A 3D printer creates physical objects from digital models.', {'entities': [[2, 12, 'HARDWARE']]}],
['The smart thermostat regulates home temperature.', {'entities': [[4, 19, 'HARDWARE']]}],
['A fitness tracker monitors physical activity.', {'entities': [[2, 16, 'HARDWARE']]}],
['The gaming console provides entertainment.', {'entities': [[4, 18, 'HARDWARE']]}],
['A smart speaker responds to voice commands.', {'entities': [[2, 14, 'HARDWARE']]}],
['The external hard drive provides additional storage.', {'entities': [[4, 21, 'HARDWARE']]}],
['A graphics tablet is used for digital art.', {'entities': [[2, 17, 'HARDWARE']]}],
['The NAS device stores data for network access.', {'entities': [[4, 13, 'HARDWARE']]}],
['A biometric scanner verifies identity.', {'entities': [[2, 18, 'HARDWARE']]}],
['The smart lock secures doors with digital keys.', {'entities': [[4, 13, 'HARDWARE']]}],
['A robotic vacuum cleans floors automatically.', {'entities': [[2, 17, 'HARDWARE']]}],
['The smart bulb can be controlled via a smartphone.', {'entities': [[4, 13, 'HARDWARE']]}],
['A home assistant device manages smart home systems.', {'entities': [[2, 22, 'HARDWARE']]}],
['The gaming headset provides immersive audio.', {'entities': [[4, 18, 'HARDWARE']]}],
['A thermal printer produces receipts and labels.', {'entities': [[2, 17, 'HARDWARE']]}],
['The point-of-sale system processes transactions.', {'entities': [[4, 22, 'HARDWARE']]}],
['The k-means algorithm is used for clustering data.', {'entities': [[4, 11, 'ALGORITHM_MODEL']]}],
['Linear regression is a statistical modeling technique.', {'entities': [[0, 16, 'ALGORITHM_MODEL']]}],
['Decision trees are used for classification tasks.', {'entities': [[0, 14, 'ALGORITHM_MODEL']]}],
['The random forest algorithm improves prediction accuracy.', {'entities': [[4, 19, 'ALGORITHM_MODEL']]}],
['Support vector machines are powerful for classification.', {'entities': [[0, 22, 'ALGORITHM_MODEL']]}],
['Neural networks are inspired by the human brain.', {'entities': [[0, 15, 'ALGORITHM_MODEL']]}],
['The gradient boosting algorithm is used in machine learning.', {'entities': [[4, 22, 'ALGORITHM_MODEL']]}],
['K-nearest neighbors is a simple classification algorithm.', {'entities': [[0, 19, 'ALGORITHM_MODEL']]}],
['Principal component analysis reduces dimensionality.', {'entities': [[0, 26, 'ALGORITHM_MODEL']]}],
['The Apriori algorithm is used for association rule mining.', {'entities': [[4, 18, 'ALGORITHM_MODEL']]}],
['Naive Bayes is a probabilistic classification model.', {'entities': [[0, 11, 'ALGORITHM_MODEL']]}],
['The PageRank algorithm ranks web pages by importance.', {'entities': [[4, 14, 'ALGORITHM_MODEL']]}],
['Logistic regression is used for binary classification.', {'entities': [[0, 19, 'ALGORITHM_MODEL']]}],
['The AdaBoost algorithm improves weak classifiers.', {'entities': [[4, 13, 'ALGORITHM_MODEL']]}],
['Hidden Markov models are used for sequence prediction.', {'entities': [[0, 20, 'ALGORITHM_MODEL']]}],
['The DBSCAN algorithm is used for density-based clustering.', {'entities': [[4, 12, 'ALGORITHM_MODEL']]}],
['XGBoost is a popular gradient boosting framework.', {'entities': [[0, 7, 'ALGORITHM_MODEL']]}],
['The EM algorithm is used for parameter estimation.', {'entities': [[4, 14, 'ALGORITHM_MODEL']]}],
['The Perceptron is a simple neural network model.', {'entities': [[4, 14, 'ALGORITHM_MODEL']]}],
['The t-SNE algorithm is used for data visualization.', {'entities': [[4, 10, 'ALGORITHM_MODEL']]}],
['The Q-learning algorithm is used in reinforcement learning.', {'entities': [[4, 17, 'ALGORITHM_MODEL']]}],
['The Viterbi algorithm is used for decoding sequences.', {'entities': [[4, 18, 'ALGORITHM_MODEL']]}],
['The LSTM model is used for sequential data processing.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The GAN model generates realistic data samples.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The CNN model is widely used in image processing.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The RNN model is used for time series analysis.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The BERT model is used for natural language processing.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The GPT model generates human-like text.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The YOLO algorithm is used for object detection.', {'entities': [[4, 9, 'ALGORITHM_MODEL']]}],
['The SVM model is used for classification and regression.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The KNN algorithm is simple and effective.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The PCA algorithm reduces the number of variables.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The ARIMA model is used for time series forecasting.', {'entities': [[4, 10, 'ALGORITHM_MODEL']]}],
['The Markov chain model predicts future states.', {'entities': [[4, 17, 'ALGORITHM_MODEL']]}],
['The Monte Carlo algorithm is used for simulations.', {'entities': [[4, 18, 'ALGORITHM_MODEL']]}],
['The Dijkstra algorithm finds the shortest path.', {'entities': [[4, 17, 'ALGORITHM_MODEL']]}],
['The Floyd-Warshall algorithm solves all-pairs shortest paths.', {'entities': [[4, 22, 'ALGORITHM_MODEL']]}],
['The Bellman-Ford algorithm handles negative weights.', {'entities': [[4, 19, 'ALGORITHM_MODEL']]}],
['The Kruskal algorithm is used for finding minimum spanning trees.', {'entities': [[4, 15, 'ALGORITHM_MODEL']]}],
['The Prim algorithm is another approach for minimum spanning trees.', {'entities': [[4, 10, 'ALGORITHM_MODEL']]}],
['The A* algorithm is used for pathfinding in games.', {'entities': [[4, 9, 'ALGORITHM_MODEL']]}],
['The RSA algorithm is used for encryption.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The AES algorithm is a symmetric encryption standard.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The DES algorithm is an older encryption method.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The SHA algorithm is used for hashing data.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The MD5 algorithm is used for checksums.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The ElGamal algorithm is used for public-key cryptography.', {'entities': [[4, 15, 'ALGORITHM_MODEL']]}],
['The Diffie-Hellman algorithm enables secure key exchange.', {'entities': [[4, 20, 'ALGORITHM_MODEL']]}],
['The ECC algorithm is used for elliptic curve cryptography.', {'entities': [[4, 8, 'ALGORITHM_MODEL']]}],
['The Simplex algorithm is used for linear programming.', {'entities': [[4, 15, 'ALGORITHM_MODEL']]}],
['HTTP is the foundation of data communication on the web.', {'entities': [[0, 4, 'PROTOCOL']]}],
['HTTPS ensures secure communication over the internet.', {'entities': [[0, 5, 'PROTOCOL']]}],
['FTP is used for transferring files between systems.', {'entities': [[0, 3, 'PROTOCOL']]}],
['SMTP is the protocol for sending emails.', {'entities': [[0, 4, 'PROTOCOL']]}],
['POP3 is used for retrieving emails from a server.', {'entities': [[0, 4, 'PROTOCOL']]}],
['IMAP allows users to manage emails on a server.', {'entities': [[0, 4, 'PROTOCOL']]}],
['TCP ensures reliable data delivery.', {'entities': [[0, 3, 'PROTOCOL']]}],
['UDP is faster but less reliable than TCP.', {'entities': [[0, 3, 'PROTOCOL']]}],
['DNS translates domain names into IP addresses.', {'entities': [[0, 3, 'PROTOCOL']]}],
['DHCP assigns IP addresses to devices on a network.', {'entities': [[0, 4, 'PROTOCOL']]}],
['SSH provides secure remote access to systems.', {'entities': [[0, 3, 'PROTOCOL']]}],
['Telnet is an older protocol for remote access.', {'entities': [[0, 6, 'PROTOCOL']]}],
['RDP is used for remote desktop connections.', {'entities': [[0, 3, 'PROTOCOL']]}],
['SNMP is used for managing network devices.', {'entities': [[0, 4, 'PROTOCOL']]}],
['NTP synchronizes clocks across networks.', {'entities': [[0, 3, 'PROTOCOL']]}],
['ICMP is used for error reporting in networks.', {'entities': [[0, 4, 'PROTOCOL']]}],
['ARP resolves IP addresses to MAC addresses.', {'entities': [[0, 3, 'PROTOCOL']]}],
['RTP is used for delivering audio and video over the internet.', {'entities': [[0, 3, 'PROTOCOL']]}],
['RTSP controls streaming media servers.', {'entities': [[0, 4, 'PROTOCOL']]}],
['SIP is used for initiating communication sessions.', {'entities': [[0, 3, 'PROTOCOL']]}],
['LDAP is used for accessing directory services.', {'entities': [[0, 4, 'PROTOCOL']]}],
['BGP is a protocol for routing between autonomous systems.', {'entities': [[0, 3, 'PROTOCOL']]}],
['OSPF is a routing protocol for IP networks.', {'entities': [[0, 4, 'PROTOCOL']]}],
['EIGRP is a Cisco proprietary routing protocol.', {'entities': [[0, 5, 'PROTOCOL']]}],
['RIP is a simple routing protocol.', {'entities': [[0, 3, 'PROTOCOL']]}],
['IPsec provides secure communication over IP networks.', {'entities': [[0, 5, 'PROTOCOL']]}],
['SSL ensures secure communication between clients and servers.', {'entities': [[0, 3, 'PROTOCOL']]}],
['TLS is the successor to SSL.', {'entities': [[0, 3, 'PROTOCOL']]}],
['SFTP provides secure file transfers.', {'entities': [[0, 4, 'PROTOCOL']]}],
['TFTP is a simpler version of FTP.', {'entities': [[0, 4, 'PROTOCOL']]}],
['MQTT is a lightweight messaging protocol.', {'entities': [[0, 4, 'PROTOCOL']]}],
['CoAP is a protocol for constrained devices.', {'entities': [[0, 4, 'PROTOCOL']]}],
['WebSocket enables real-time communication.', {'entities': [[0, 10, 'PROTOCOL']]}],
['HTTP/2 improves web performance.', {'entities': [[0, 6, 'PROTOCOL']]}],
['QUIC is a modern transport protocol.', {'entities': [[0, 4, 'PROTOCOL']]}],
['SMB is used for file sharing in Windows networks.', {'entities': [[0, 3, 'PROTOCOL']]}],
['NFS allows file sharing between Unix systems.', {'entities': [[0, 3, 'PROTOCOL']]}],
['AFP is used for file sharing in macOS.', {'entities': [[0, 3, 'PROTOCOL']]}],
['NetBIOS is an older protocol for network communication.', {'entities': [[0, 7, 'PROTOCOL']]}],
['PPTP is a VPN protocol.', {'entities': [[0, 4, 'PROTOCOL']]}],
['L2TP is used for VPN connections.', {'entities': [[0, 4, 'PROTOCOL']]}],
['OpenVPN is an open-source VPN protocol.', {'entities': [[0, 8, 'PROTOCOL']]}],
['IKE is used for key exchange in VPNs.', {'entities': [[0, 3, 'PROTOCOL']]}],
['GRE is a tunneling protocol.', {'entities': [[0, 3, 'PROTOCOL']]}],
['STP prevents loops in network topologies.', {'entities': [[0, 3, 'PROTOCOL']]}],
['VLAN is used for segmenting networks.', {'entities': [[0, 4, 'PROTOCOL']]}],
['CDP is a Cisco discovery protocol.', {'entities': [[0, 3, 'PROTOCOL']]}],
['LLDP is a vendor-neutral discovery protocol.', {'entities': [[0, 4, 'PROTOCOL']]}],
['RADIUS is used for network authentication.', {'entities': [[0, 6, 'PROTOCOL']]}],
['TACACS+ is a Cisco authentication protocol.', {'entities': [[0, 8, 'PROTOCOL']]}],
['PDF is a popular format for documents.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['JPEG is commonly used for images.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['PNG supports lossless compression.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['MP3 is a widely used audio format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['MP4 is a common video format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['DOCX is the default format for Word documents.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['XLSX is used for Excel spreadsheets.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['PPTX is the format for PowerPoint presentations.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['TXT is a simple text file format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['CSV is used for storing tabular data.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['JSON is a lightweight data interchange format.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['XML is used for structured data storage.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['HTML is the standard format for web pages.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['CSS is used for styling web pages.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['ZIP is a common compression format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['RAR is another compression format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['GIF is used for animated images.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['BMP is a bitmap image format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['TIFF is used for high-quality images.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['SVG is a vector image format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['WAV is a lossless audio format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['FLAC is a high-quality audio format.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['AVI is a video container format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['MKV is a versatile video format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['MOV is a video format developed by Apple.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['OGG is an open multimedia container format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['WEBM is a video format for the web.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['ISO is a disk image format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['DMG is a disk image format for macOS.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['EXE is an executable file format for Windows.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['APK is the file format for Android apps.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['IPA is the file format for iOS apps.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['PY is the file extension for Python scripts.', {'entities': [[0, 2, 'FILE_FORMAT']]}],
['JAR is a Java archive file format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['SQL is a file format for database scripts.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['LOG is a file format for storing logs.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['INI is a configuration file format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['YAML is a human-readable data format.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['TOML is a configuration file format.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['RTF is a text file format with formatting.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['ODT is an open document text format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['ODS is an open document spreadsheet format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['ODP is an open document presentation format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['EPUB is an e-book file format.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['MOBI is another e-book file format.', {'entities': [[0, 4, 'FILE_FORMAT']]}],
['PSD is the file format for Photoshop documents.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['AI is the file format for Adobe Illustrator.', {'entities': [[0, 2, 'FILE_FORMAT']]}],
['DWG is a CAD file format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['STL is a file format for 3D models.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['FBX is a 3D model exchange format.', {'entities': [[0, 3, 'FILE_FORMAT']]}],
['Phishing is a common cyber attack.', {'entities': [[0, 8, 'CYBERSECURITY_TERM']]}],
['Malware is software designed to harm systems.', {'entities': [[0, 6, 'CYBERSECURITY_TERM']]}],
['Ransomware encrypts files and demands payment.', {'entities': [[0, 11, 'CYBERSECURITY_TERM']]}],
['A firewall protects networks from unauthorized access.', {'entities': [[2, 10, 'CYBERSECURITY_TERM']]}],
['Encryption ensures data confidentiality.', {'entities': [[0, 10, 'CYBERSECURITY_TERM']]}],
['Two-factor authentication adds an extra layer of security.', {'entities': [[0, 24, 'CYBERSECURITY_TERM']]}],
['A VPN provides secure remote access.', {'entities': [[2, 5, 'CYBERSECURITY_TERM']]}],
['A zero-day exploit targets unknown vulnerabilities.', {'entities': [[2, 16, 'CYBERSECURITY_TERM']]}],
['Social engineering manipulates users into revealing information.', {'entities': [[0, 18, 'CYBERSECURITY_TERM']]}],
['A DDoS attack overwhelms a server with traffic.', {'entities': [[2, 10, 'CYBERSECURITY_TERM']]}],
['A botnet is a network of infected devices.', {'entities': [[2, 8, 'CYBERSECURITY_TERM']]}],
['A keylogger records keystrokes.', {'entities': [[2, 11, 'CYBERSECURITY_TERM']]}],
['A trojan horse disguises itself as legitimate software.', {'entities': [[2, 15, 'CYBERSECURITY_TERM']]}],
['A worm spreads without user interaction.', {'entities': [[2, 6, 'CYBERSECURITY_TERM']]}],
['A rootkit provides unauthorized access to a system.', {'entities': [[2, 9, 'CYBERSECURITY_TERM']]}],
['Penetration testing identifies system vulnerabilities.', {'entities': [[0, 19, 'CYBERSECURITY_TERM']]}],
['A honeypot lures attackers to study their methods.', {'entities': [[2, 9, 'CYBERSECURITY_TERM']]}],
['A security patch fixes vulnerabilities.', {'entities': [[2, 16, 'CYBERSECURITY_TERM']]}],
['A vulnerability scanner detects weaknesses.', {'entities': [[2, 23, 'CYBERSECURITY_TERM']]}],
['A brute force attack tries all possible passwords.', {'entities': [[2, 16, 'CYBERSECURITY_TERM']]}],
['A man-in-the-middle attack intercepts communication.', {'entities': [[2, 24, 'CYBERSECURITY_TERM']]}],
['A SQL injection attack exploits database vulnerabilities.', {'entities': [[2, 17, 'CYBERSECURITY_TERM']]}],