Hello, you have come here looking for the meaning of the word
hackability. In DICTIOUS you will not only get to know all the dictionary meanings for the word
hackability, but we will also tell you about its etymology, its characteristics and you will know how to say
hackability in singular and plural. Everything you need to know about the word
hackability you have here. The definition of the word
hackability will help you to be more precise and correct when speaking or writing your texts. Knowing the definition of
hackability, as well as those of other words, enriches your vocabulary and provides you with more and better linguistic resources.
English
Etymology
From hack + -ability.
Noun
hackability (uncountable)
- The state or condition of being hackable.
1984 November 14, Paul Shindman, “Re: Free and undirected campus computing facilities - Not at Waterloo”, in net.micro (Usenet), retrieved 2016-12-15, message-ID <[email protected]>:Now it could be that all the hacks have moved to UNIX and off of our IBM systems, but there is a distinct change at U of T from 5 or so years ago when hacks abounded on all our systems. My personal opinion is that it is to our collective detriment that the environment no longer exists in which hacks can flourish. Their presence was on the whole benficial in that they always wanted to learn something new, and were always assisting those who didn't know (invariably to show off their hackability) and often ended up doing contract work or getting hired by the computer center, comp sci department, or some prof looking for someone who knew how to (mis)handle a computer.
1987 March 8, Leo L. Schwab, “Re: Amiga good for hacking??”, in comp.sys.amiga (Usenet), retrieved 2016-12-16, message-ID <[email protected]>:I think the rewards far outweigh the drawbacks, and am pleased that Yet Another Hacker is turning to the Amiga for its hackability. I think it's the most hackable machine to come out since the old S-100 systems of the late 70's, and has the same kind of wonderful feel to it.
1992 May 12, John Bennett, “Re: Fiber optic networks and security”, in alt.security (Usenet), retrieved 2016-12-16, message-ID <[email protected]>:I've seen an automatic splicer (made by Northern Telecom I think) which injects light through the sheath in one fibre, and detects it through the sheath in a second piece. The fibres are held in a jig which puts a small kink in them at the point where the light is injected/detected. The equipment uses the light received to align the two parts before splicing. It's a pretty good indication of the "hackability" of fibre I would say.