Related Words Logo

Reverse Dictionary

examples: unpleasantly moistusing pretentious wordsinhabitant of earth

Click words for definitions

hacker hack immune protection dongle guarded patent copyright sheltered shelter pc computerize cad input unprotected cam indefensible download uncovered insecure computor unguarded cyber ironclad secure Hermetic floppy disk compute processor snug generic hashing online protectorate code sanctuary exposed upload crash patent medicine armored microcomputer insured scutellate notebook computator machine access programmer nestle desktop program format defensible software
words continue after advertisement
printout shellproof hardware casemated lee preserve safe computerese enter digital computerless keyboard virus barred cyber- log out CGI uninstall boot display offline machine-readable initialize monitor armoured bootstrap digital computer cyberpunk exit fortress mole server driver application write logic conservation area word processor tab document supercomputer national seashore from electronic computer cover bastion rustproof snugly covert bug shockproof BASIC keystroke reserve node infect computerate kilobit protectee internet precomputer haven nature reserve noncomputer laptop privileged CAT net log statement graphics command electronic computer-illiterate oilskinned safety bubble host function module harbor redoubt programming COM computernik resident delete personal computer pocket memory data hard plated Downs hunter spell check computer pornography electronic brain filename output run on-screen puter computer geek CAL protégé save programme notebook computer graphic build under rick under guard burglarproof armor–clad install soft vested computerist comp virtual roadstead store motherboard online [or] on-line terminal documentation beneath obtected polder screen pass bleak log on chrysalis national park mailclad up systems analysis edit compiler in silico analogue computer data processor peripheral import carboy open season computerized COBOL drive shift typewritten CAR attachment CAE CAP dump hybrid computer compile architecture wind CADCAM precinct CAI cloistered fail-safe in safe hands click CBT programming language bit cyberspace manipulate down hard disk printer load defrag CNC wired safe haven environment subnotebook on-line mac laptop computer gigabit freeware page megabit CIM computer-literate e-mail [or] email lightningproof laager armor-plated sensitive alarmed ward loch salvation immunity weatherize router wide open pale garreted iron-plated portable netbook language address Batesian mimicry garbage intellectual property free speech on-line [or] online card utility client add-on speech recognition software entrenchment based lantern parser pop–up on the fly beta executive privilege personal organizer UNIX on–screen minicomputer quit recompile lap listed assured danger area unexposed armadillo enshrine high-security error spyware installer check castle hornbook home computer mouse process morph fire sth up invalid retrieve computer graphics cyberbabe electronic mailbox job computing upgrade wireless backslash cybernate information personal digital assistant sysop subdirectory see vaccine scheduler step fall over prolog migrate integrator off–line antivirus configuration e–mail firewall firesafe alarm sea–walled belligerent hardened harbour chemin-de-ronde crumple zone wilderness area levana Jupiter helpless targeted armored car knee undefendable steal tinclad mackintoshed peace of mind guardable prompt interface assembler cache cybersecurity hard copy gigabyte lisp spam antiviral debug screenshot programmer [or] programer offload check-box [or] check box thinking–machine computer-assisted computer game information processing PowerPoint clear joystick encode remote access compression crack back sth up netiquette backspace attach cyberterrorism go down grey goods drag number cruncher double click right-click luggable flame Hopper RPG email computist electric brain computeracy computing machine legal basin insulation private windswept exclosure damp-proof sheep porous security glazed unsecured doubly shahtoosh pen fastness bulletproof enceinte unpatented poleyn protege reservation unshielded safekeeping stockade bonneted MRAP vehicle top secret sheath knife liable anti-virus CBI vision app ultraportable computerphile C, c nanocomputer binary computer SIPC computery hotlink jock path worm SCSI cybergeek lappy reinstall smart lap portable mung clicker user-friendly tablet analogue platform workstation computeresque shutdown virus checker central processing unit valid teleprocessing slot computer jock CADD finger computer art cybercrime miniprinter simulate box CCTA launch paint machine–readable bps bay linguistic engine parity personal-computer suite giga- distro assembly board plug-in quantum lawless insurance premium guarantor machine-gun nest fireproof firing line unhedged Gombe Stream National Park copperworm mailed close armor guest iron-cased top-security safe area floodway half hunter greenway covered bridge scutibranchiate bhunder hermetically sealed cushioned grace in the firing line galeated danger umbrella incorporation vault impregnable treatment suntrap literary property Gulf Islands National Park Reserve weather-beaten charmed life ring-fenced animal rights -proof scutate globe lamp nature preserve brood pouch weather approach trench armour cataphract sea-walled lough glasshouse scalp on the firing line kennel spawn barbette orangery taboo incorporate copy protection unfinished hermetically Inside Passage conservation park foolproof piracy pirate analog computer file manager unscreened cold frame national monument slip through the net/cracks environmentalist listed building obligee political agent stronghold cradle friend kill playable trampoline teleshopping text corrupt computer criminal noise performance clock speed administrator location informatics erase software development VDU computer-science horsepower nutricism sand cone cuddle up bonitarian homestead Everglades registry secret process computation ABEND biocomputer control engineer escape iteration chip computer-generated gaming knowledge mainframe intelligence gamer invoke physical pipe systems engineering transportable print-out software engineering piconet rig neurocomputer mca wow string decompression go live packet computer-language garbageware telebanking Jobs open system key start-up internal modem computerland computer programmer file deliver hit cyberworld CAD/CAM flic screencast graphical jam coding dictionary literacy killer app program statement perl bookmark teletype digitally count gated game park privileged information torch sangar queem bowhead proprietary perisarc break have/lead a sheltered life endangered list splashback environmentalism essential industry fortified dry cell hit the deck charmed mama's boy solar trap hurricane lamp interrogate defragmenter Cray computerology mailer user concatenate checker machine translation cybernation incorrect tracker tab key loophole game reserve customary right coverage guard hanuman covered way safety lamp plant out camber king openwork embedded storage wire e- laggy double-click simulation teraflop FTP time-sharing history list computer scientist computer-aided design tablet computing assembly language illegal prologue instruction megaflop ai chat object code instant messaging sort postscript menu computer graphic hackathon accounting system clone distributed audit trail unreadable CALL disk drive Pentium execution wallpaper differential analyzer connect microprocessor backup performance benchmark malware cloud computing computer-process epilogue wi-fi os hacking plug and play port HCI convoy Fire Island National Seashore passing off enclosed arc lamp SSSI liberty feudalism immersion blender balk auger beetle source code hibernate screen saver dispersal bay asylum care information security half–hardy bottle graft grotto statutory tenancy hibernaculum book Borneo Batesian ice cave fire wall graphical user interface interpreter trespass scraper pouch dhimmi debris cone expendable hattock exposure nest hylaeosaurus battleship biosphere reserve due process state park landlocked Okefenokee Swamp genu raw maula appellation spar mortgage bond park home named insured residency trade secret TIPS trench warfare Frederick III IPR hesperidium fur farm cocoon jack–in–the–pulpit Fort Knox peeler in the bosom of sth informosome disparate impact pro-life poitrel head-house safe house tick gate subweb interest varioloid Area of Outstanding Natural Beauty AONB ancient light Casco Bay free–banking system clownfish carcass Deep Web publish onscreen rerun pound sign backbone network tabputer bootable off-line social software system programmer overload picture displayed command language log off biocomputing QWERTY deinstall bork character hand-held sector technical/tech support counter tower computerdom addressable microdrive pessimize pen-based rootkit res forward slash volatile code monkey checking program courseware abort at the flick of a switch back up IBM infobahn entry log in IP address executable hashtag inbox cross-platform video card uptime Intermarket Trading System trackball mail client menu option message minimize maximize cyberart restart retry quest qwerty tummy call sth up video adapter view computational linguistics graphics card gateway hear jack in-line application programmer logout machine time mega- ASCII file dial-in JPEG laptop (computer) manipulation read out pull up something queue LLC word processing interactive search kilobyte mailbox networking RISC software engineer read-out reboot capability scan workgroup decollate emulation data set flush hub left-click type typist e-cash computational functionality tag splat DVD-ROM sign off speech/text etc recognition graphical display CISC digerati developer archive disc cassette fall cybersex rewrite routine jack in (or into) kill switch execute memory chip stack read recovery programme quantum bit screencap telnet thinking machine syntax window robotics packager spreadsheet v-mail undo route retrieval robot coder PL/1 preinstall Alt mode

Popular Searches

Words For "protected computer"

As you've probably noticed, words for "protected computer" are listed above. According to the algorithm that drives this word similarity engine, the top 5 related words for "protected computer" are: hacker, hack, immune, protection, and dongle. There are 993 other words that are related to or similar to protected computer listed above. Hopefully the generated list of words for "protected computer" above suit your needs. If not, you might want to check out Related Words - another project of mine which uses a different technique (not though that it works best with single words, not phrases).

About Reverse Dictionary

The way Reverse Dictionary works is pretty simple. It simply looks through tonnes of dictionary definitions and grabs the ones that most closely match your search query. For example, if you type something like "longing for a time in the past", then the engine will return "nostalgia". The engine has indexed several million definitions so far, and at this stage it's starting to give consistently good results (though it may return weird results sometimes). It acts a lot like a thesaurus except that it allows you to search with a definition, rather than a single word. So in a sense, this tool is a "search engine for words", or a sentence to word converter.

I made this tool after working on Related Words which is a very similar tool, except it uses a bunch of algorithms and multiple databases to find similar words to a search query. That project is closer to a thesaurus in the sense that it returns synonyms for a word (or short phrase) query, but it also returns many broadly related words that aren't included in thesauri. So this project, Reverse Dictionary, is meant to go hand-in-hand with Related Words to act as a word-finding and brainstorming toolset. For those interested, I also developed Describing Words which helps you find adjectives and interesting descriptors for things (e.g. waves, sunsets, trees, etc.).

In case you didn't notice, you can click on words in the search results and you'll be presented with the definition of that word (if available). The definitions are sourced from the famous and open-source WordNet database, so a huge thanks to the many contributors for creating such an awesome free resource.

Special thanks to the contributors of the open-source code that was used in this project: Elastic Search, @HubSpot, WordNet, and @mongodb.

Please note that Reverse Dictionary uses third party scripts (such as Google Analytics and advertisements) which use cookies. To learn more, see the privacy policy.

Recent Queries