Category:All articles with unsourced statements
From HandWiki
Revision as of 12:18, 19 October 2021 by imported>MainEditor
This is a category to help keep count of the total number of articles with the {{citation needed}} template. They should all be in one of the dated categories, which can be found at Category:Articles with unsourced statements. For the historical size of the backlog, see this offwiki tool.
![]() | This is a maintenance category, used for maintenance of the HandWiki project. It is not part of the encyclopedia and contains pages, or groups articles by status rather than subject. Do not include this category in content categories.
This is a tracking category. It builds and maintains a list of pages primarily for the sake of the list itself. They are not part of the encyclopedia's categorization scheme.
|
![]() | Administrators: Please do not delete this category even if it is empty! This category may be empty occasionally or even most of the time. |
Pages in category "All articles with unsourced statements"
The following 200 pages are in this category, out of 8,071 total.
(previous page) (next page)P
- Persistent identifier
- Persistent world
- Personal cloud
- Personal data
- Personal identification number
- Personal knowledge management
- Personal web page
- PersonalJava
- Personally identifiable information
- Perspective (graphical)
- Perspective control
- Perspective distortion
- Perspective distortion (photography)
- Perturbation theory (quantum mechanics)
- Perverse sheaf
- Peterson's algorithm
- Petri net
- Pettis integral
- PG(3,2)
- PH-tree
- Phalcon Slayer
- Phantogram
- Phantogram (optical illusion)
- Pharo
- Phase congruency
- Phase-fired controller
- Phase-change memory
- Phase-contrast imaging
- Phase-gate process
- Phase-shift keying
- Phillips Machine
- Philosophy of information
- Phishing
- Phoenician alphabet
- PhoneNET
- Phong reflection model
- Phong shading
- Phoning home
- Photo finish
- Photo manipulation
- Photograph manipulation
- Photo recovery
- Photoblog
- PhotoDNA
- Photoflash bomb
- Photographic print toning
- Photography
- Photon noise
- Phrasal template
- Phrase structure grammar
- Physical media
- Physical Medium Dependent
- Physical symbol system
- Physical unclonable function
- Types of physical unclonable function
- Piaget's theory of cognitive development
- PicoLisp
- Pictogram
- Pictorial push pull signs for doors
- Picture Transfer Protocol
- PID controller
- Proportional–integral–derivative controller
- Pie menu
- Piercing point
- Pig Latin
- Piggybacking (Internet access)
- PiHex
- Pilot report
- Pilot wave theory
- Pinhole camera model
- Pink triangle
- Pint
- Pinyin
- Pioneer plaque
- Pipeline (computing)
- Pipeline forwarding
- Pirate Party
- Pisot–Vijayaraghavan number
- Pitch detection algorithm
- Pivot point (technical analysis)
- Pivot table
- Pixel density
- Pixel shifting
- Pixlet
- PKCS 12
- Placebo-controlled study
- Placement syntax
- Plain old Java object
- Plain Old XML
- Plain text
- Plane of incidence
- Planetary surface
- PlanetLab
- PlanetMath
- Plankalkül
- Plant cognition
- Plaque reduction neutralization test
- Plastic model
- Plastic model kit
- Plated-wire memory
- Platform-independent GUI library
- Play money
- Playlist
- PlayStation 3 cluster
- Playtest
- Plowshare
- Pluriharmonic function
- Plus (interbank network)
- Plus and minus signs
- Plus–minus sign
- PNG
- Falling and rising factorials
- PODSnet
- Pohlig–Hellman algorithm
- Poincaré conjecture
- Poincaré map
- Poincaré–Hopf theorem
- Point (typography)
- Point and figure chart
- Point at infinity
- Point cloud
- Point location
- Point of sale
- Point to Point Encryption
- Point-to-point encryption
- Point-to-Point Protocol
- Point-to-Point Protocol over Ethernet
- Pointer (computer programming)
- Pointer aliasing
- Pointing device gesture
- Pointwise
- Pointwise mutual information
- Poisson binomial distribution
- Poisson distribution
- Pokémon GO Battle League
- Polar set
- Polarized 3D system
- Police code
- Policy
- Policy analysis
- Policy and charging rules function
- Poly Network Exploit
- Poly Network exploit
- Polychotomous key
- Polycon
- Polycyclic group
- Polygon
- Polyhedron
- Polynomial
- Polynomial chaos
- Polynomial expansion
- Polynomial interpolation
- Polynomial regression
- Polynomial root-finding algorithms
- Polytope
- Polytope compound
- POODLE
- Pooled variance
- Pop-up ad
- Pop-up notification
- Popek and Goldberg virtualization requirements
- Population informatics
- Porn 2.0
- PornerBros
- Port knocking
- Portable computer
- Portable Distributed Objects
- Portable Executable
- Portable Format for Analytics
- Portable Network Graphics
- Portable Standard Lisp
- Positional notation
- Positional tracking
- Positive and negative predictive values
- Positive feedback
- Positive set theory
- Positive-definite function
- POSIX
- POSIX terminal interface
- Post hoc analysis
- Post-quantum cryptography
- Postage stamp design error
- Postdiction
- Postediting
- Posting style
- PostScript
- Potentially unwanted program
- Pound (mass)
- Poundal
- IBM POWER architecture
- IBM POWER instruction set architecture
- Power Architecture
- Power control
- Power Glove
- Power graph analysis
- Power integrity
- Power law
- Power of attorney
- Power of three
- Power of two