`
`’00
`
`
`Ihe (cid:9)
`
`ew
`
`0
`
`iiiU our:
`lull I (cid:9)
`
`Over
`7,600
`Terms
`
`Additional Terms
`Available On Line
`Quarterly
`
`I-
`
`I
`
`Exhibit 2001
`IPR2016-01404
`
`
`
`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright ' 1997 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted
`in any form or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`Microsoft Press Computer Dictionary. -- 3rd ed.
`p. cm.
`ISBN 1-57231-446-X
`1. Computers--Dictionaries. 2. Microcomputers--Dictionaries.
`I. Microsoft Press.
`QA76.15.M54 1997
`004’.03--dc21 (cid:9)
`
`97-15489
`CIP
`
`Printed and bound in the United States of America.
`
`3456789 QMQM 21098
`
`Distributed to the book trade in Canada by Macmillan of Canada, a division of Canada Publishing
`Corporation.
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further
`information about international editions, contact your local Microsoft Corporation office. Or contact
`Microsoft Press International directly at fax (425) 936-7329.
`
`Macintosh, Power Macintosh, QuickTime, and TrueType are registered trademarks of Apple Computer,
`Inc. Intel is a registered trademark of Intel Corporation. Directlnput, DirectX, Microsoft, Microsoft
`Press, MS-DOS, Visual Basic, Visual C++, Win32, Win32s, Windows, Windows NT, and XENIX are
`registered trademarks and ActiveMovie, ActiveX, and Visual J++ are trademarks of Microsoft
`Corporation. Java is a trademark of Sun Microsystems, Inc. Other product and company names
`mentioned herein may be the trademarks of their respective owners.
`Acquisitions Editor: Kim Fryer
`Project Editor: Maureen Williams Zimmerman, Anne Taussig
`Technical Editors: Dail Magee Jr., Gary Nelson, Jean Ross, Jim Fuchs, John Conrow, Kurt Meyer,
`Robert Lyon, Roslyn Lutsch
`
`
`
`(cid:149) .(cid:149):
`
`datae;ntry
`
`
`Data Carrier Detected \dªt k(cid:226)rº-er d-tektd,
`dat\ n. See DCD.
`data chaining \dªl chaneng, dat\ n. The pro-
`cess of storing segments of data in noncontiguous
`locations while retaining the ability to reconnect
`them in the proper sequence.
`data channel \dªt chanl, dat\ n. See chan-
`nel.
`data collection \dªt k-lekshn, dat\ n. 1.
`The process of acquiring source documents or
`data. 2. The grouping of data by means of classifi-
`cation, sorting, ordering, and other organizing
`methods.
`datacom \dªt-kom, dat-kom\ n. Short for
`data communications. See communications.
`data communications \ dª t (cid:9)
`k-myd(cid:246)-n-
`kªshnz, dat\ n. See communications.
`data compaction \dªt km-pakshn, dat\ n.
`See data compression.
`data compression \dªt km-preshn, dat\ n.
`A means of reducing the amount of space or band-
`width needed to store or transmit a block of data,
`used in data communications, facsimile transmis-
`sion, and CD-ROM publishing. Also called data
`compaction.
`data conferencing \dªt konfrn-seng, dat\ n.
`Simultaneous data communication among geo-
`graphically separated participants in a meeting.
`Data conferencing involves whiteboards and other
`software that enable a single set of files at one loca-
`tion to be accessed and modified by all participants.
`See the illustration. See also desktop conferencing,
`whiteboard. Compare video conferencing.
`
`Data conferencing.
`
`n. The aspect
`data control \dªt kn-tr(cid:246)1, dat\
`of data management concerned with tracking how
`
`1.1
`
`en-krip shun
`
`and by whom data is used, accessed, altered,
`owned, and reported on.
`data corruption \dªt kr-upshn, dat\ n. See
`corruption.
`data declaration \dªt de-kbr-ªshn, dat\
`A statement in a program that specifies the charac-
`teristics of a variable. The requirements for data
`declarations vary among different programming
`languages but can include such values as variable
`name, data type, initial value, and size specifica-
`tion. See also array, data type, record’, variable.
`data definition language \ dª t def--nish n
`lang-wj, dat\ n. A language that defines all
`attributes and properties of a database, especially
`record layouts, field definitions, key fields, file loca-
`tions, and storage strategy. Acronym: DDL (D ’D-L’).
`data description language \ dª t ds-krip shun
`lang-wj, dat\ n. A language designed specifi-
`cally for declaring data structures and files. See also
`data definition language.
`data dictionary \dªt diksh-n(cid:226)r-º, dat\
`n. A
`database containing data about all the databases in
`a database system. Data dictionaries store all the
`various schema and file specifications and their
`locations. They also contain information about
`which programs use which data and which users
`are interested in which reports.
`data directory \dªt dr-ektr-º, dat\ n. See
`catalog, data dictionary.
`data-driven processing \ dª t-driv-n pros Ies-
`ºng, dat-driv-n\ n. A form of processing where
`the processor or program must wait for data to
`arrive before it can advance to the next step in a
`sequence.
`data element \dªt el-ment, dat\ n. A single
`unit of data. Also called data item. See also data
`field.
`data encryption \dªt en-kripshn, dat\
`See encryption.
`data encryption key \ dª t en-krip shun kº,
`dat\ n. A sequence of data that is used to
`encrypt and decrypt other data. Acronym: DEK
`(DE-K). See also decryption, encryption, key
`(definition 3).
`data encryption standard \ dª t (cid:9)
`standrd, dat\ n. See DES.
`data entry \dªt entrº, dat\ n. The process of
`writing new data to computer memory.
`
`n.
`
`n.
`
`
`
`PCs that allows for increasing memory beyond the
`Intel 80x86 microprocessor real-mode limit of 1
`megabyte. In earlier versions of microprocessors,
`EMS bypassed this memory board limit with a
`number of 16-kilobyte banks of RAM that could be
`accessed by software. In later versions of Intel
`microprocessors, including the 80386 and 80486
`models, EMS is converted from extended memory
`by software memory managers, such as EMM386
`in MS-DOS 5. Now EMS is used mainly for older
`MS-DOS applications because Windows and other
`applications running in protected mode on 80386
`and higher microprocessors are free of the 1-MB
`limit. Also called LIM EMS. See also expanded
`memory, protected mode. compare conventional
`memory, extended memory.
`em space \em spªs\ n. A typographical unit of
`measure that is equal in width to the point size of
`a particular font. For many fonts, this is equal to
`the width of a capital M, from which the em
`space takes its name. Compare en space, fixed
`space, thin space.
`emulate \emyb-lat\ vb. For a hardware or soft-
`ware system to behave in the same manner as
`another hardware or software system. In a net-
`work, for example, microcomputers often emulate
`mainframes or terminals so that two machines can
`communicate.
`emulation \&my-lªshan\ n. The process of a
`computer, device, or program imitating the func-
`tion of another computer, device, or program.
`emulator \ emy-lª tr\ n. Hardware or software
`designed to make one type of computer or com-
`ponent act as if it were another. By means of an
`emulator, a computer can run software written for
`another machine. In a network, microcomputers
`might emulate mainframes or terminals so that two
`machines can communicate.
`emulsion laser storage \ º-mul shun lii zr st(cid:246)r-
`n. A method for recording data in film by
`selective heating with a laser beam.
`enable \e-nªbl\ vb. To activate or turn on. Com -
`pare disable.
`encapsulate \en-kapsa-lat\ vb. To treat a collec-
`tion of structured information as a whole without
`affecting or taking notice of its internal structure.
`In communications, a message or packet con-
`structed according to one protocol, such as a TCP/
`
`IP packet, may be taken with its formatting data as
`an undifferentiated stream of bits that is then bro-
`ken up and packaged according to a lower-level
`protocol (for example, as ATM packets) to be sent
`over a particular network; at the destination, the
`lower-level packets are assembled, re-creating the
`message as formatted for the encapsulated proto-
`col. In object-oriented programming, the imple-
`mentation details of a class are encapsulated in a
`separate file whose contents do not need to be
`known by a programmer using that class. See also
`ATM (definition 1), object-oriented programming,
`TCP/IP.
`Encapsulated PostScript \en-kapsn-l-td p(cid:246)sC
`skript\ n. See FPS.
`encapsulated type \en-kaps-lª-td tip\ n. See
`abstract data type.
`encipher \en-sifr\ vb. See encryption.
`vb. 1. In data security, to
`encode \en-k(cid:246)d\
`encrypt. See also encryption. 2. In programming,
`to put something into code, which frequently
`involves changing the form(cid:151)for example, chang-
`ing a decimal number to binary-coded form. See
`also binary-coded decimal, EBCDIC.
`encryption \en-kripshn\ n. The process of
`encoding data to prevent unauthorized access,
`especially during transmission. Encryption is usu-
`ally based on a key that is essential for decoding.
`The U.S. National Bureau of Standards created a
`complex encryption standard, Data Encryption
`Standard (DES), which provides almost unlimited
`ways to encrypt documents. See also DES.
`encryption key \ en-krip shun kº \ n. A sequence
`of data that is used to encrypt other data and that,
`consequently, must be used for the data’s decryp-
`tion. See also decryption, encryption.
`n. A spe-
`end-around carry \end-round k(cid:226)rº\
`cial type of end-around shift operation on a binary
`value that treats the carry bit as an extra bit; that
`is, the carry bit is moved from one end of the value
`to the other. See also carry, end-around shift, shift.
`n. An
`end-around shift \end-round shift\
`operation performed on a binary value in which a
`bit is shifted out of one end and into the other end.
`For example, a right-end shift on the value
`00101001 yields 10010100. See also shift.
`en dash \en dash\ n. A punctuation mark (-)
`used to show ranges of dates and numbers, as in
`
`
`
`o’
`
`K1 \K, kilC)-bit\ n. Short for kilobyte.
`K2 \K, kil(cid:246)\ prefix See kilo-.
`K&R C \Knnd-R C\ n. Short for (Brian W.) Ker-
`nighan and (Dennis M.) Ritchie C. The version of
`the C programming language, defined by those
`two authors, that was the informal C standard until
`a more formal standard was developed by an ANSI
`committee. See also C.
`.k12.us \dot-K-twelvdot-U-S\ n. On the Internet,
`the major geographic domain specifying that an
`address is a U.S. K-12 (kindergarten through high
`school) educational site.
`Kb \kil-bit’, K-B\ n. See kilobit.
`KB \ki1-bif, K-B\ n. See kilobyte.
`Kbit \Kbit, kil-biC\ n. See kilobit.
`Kbps \KB-P-S\ n. See kilobits per second.
`Kbyte \Kbit, kil-biC\ n. See kilobyte.
`kc \K-C\ n. See kilocycle.
`.ke \dotK-E\ n. On the Internet, the major geo-
`graphic domain specifying that an address is
`located in Kenya.
`Kerberos or kerberos \knrbnr-os\ n. A network
`authentication protocol developed by MIT. Ker -
`beros authenticates the identity of users attempt-
`ing to log on to a network and encrypts their
`communications through secret-key cryptography.
`A free implementation of Kerberos is available
`from MIT (http://web.mit.edu/kerheros/www/),
`although it is also available in many commercial
`products. See also authentication, cryptography.
`Kermit \knrmit\ n. A file transfer protocol used in
`asynchronous communications between comput-
`ers. Kermit is a very flexible protocol used in many
`software packages designed for communications
`over telephone lines. Compare Xmodem, Yrno-
`dem, Zmodern.
`kern \ krn\ vb. To alter selectively the distance
`between pairs of letters for readability and to
`make the type spacing more balanced and propor-
`tional. See the illustration.
`
`kernel \krnrl\ n. The core of an operating sys-
`tem(cid:151)the portion of the system that manages
`memory, files, and peripheral devices; maintains
`the time and date; launches applications; and allo-
`cates system resources.
`key \kº\ n. 1. On a keyboard, the combination of
`a plastic keycap, a tension mechanism that sus-
`pends the keycap but allows it to be pressed
`down, and an electronic mechanism that records
`the key press and key release. 2. In database man-
`agement, an identifier for a record or group of
`records in a datafile. See also B-tree, hash 2 , index’
`(definition 1), inverted list, key field. 3. The code
`for deciphering encrypted data. 4. A metal object
`used with a physical lock to disable a computer
`system.
`keyboard \kºb(cid:246)rd\
`n. A set of switches that
`resembles a typewriter keyboard and that conveys
`information from a user to a computer or data
`communications circuit. See also Alt key, Apple
`key, arrow key, Backspace key, Break key, Caps
`Lock key, character code, Clear key, Command
`key, control character, Control key, Delete key,
`Dvorak keyboard, End key, enhanced keyboard,
`Enter key, ergonomic keyboard, Escape key, func-
`tion key, Help key, Home key, Insert key, key-
`board buffer, keyboard controller, keyboard
`enhancer, keycap, key code, Num Lock key,
`numeric keypad, Option key, original Macintosh
`keyboard, Page Down key, Page Up key, Pause
`key, PC/XT keyboard, Power-on key, Print Screen
`
`FA’L
`
`’TA"I
`
`Kern. The first three letters of the second exam-
`ple are kerned.
`
`W1
`
`9T19
`
`
`
`parity bit (cid:9)
`
`password protection
`
`parity bit \p(cid:226)rn-t& bit\
`n. An extra bit used in
`checking for errors in groups of data bits trans-
`ferred within or between computer systems. With
`microcomputers, the term is frequently encoun-
`tered in modem-to-modem communications, in
`which a parity bit is often used to check the accu-
`racy with which each character is transmitted, and
`in RAM, where a parity bit is often used to check
`the accuracy with which each byte is stored.
`parity check \p(cid:226)r-t& chek\ n. The use of parity
`to check the accuracy of transmitted data. See also
`parity, parity bit.
`parity error \p(cid:226)r-tº (cid:226)rnr\
`n. An error in parity
`that indicates an error in transmitted data or in
`data stored in memory. If a parity error occurs in
`communications, all or part of a message must be
`retransmitted; if a parity error occurs in RAM, the
`computer usually halts. See also parity, parity bit.
`park \ park\ vb. To position the read/write head
`over a portion of a disk that stores no data (and
`therefore can never be damaged) or beyond the
`surface of the disk, prior to shutting down the
`drive, especially in preparation for moving it.
`Parking can be performed manually, automati-
`cally, or, most typically, by a disk utility program.
`parse \pars\ vb. To break input into smaller
`chunks so that a program can act upon the infor -
`mation.
`partition \ par-ti shn \ n. 1. A logically distinct
`portion of memory or a storage device that func-
`tions as though it were a physically separate unit.
`2. In database programming, a subset of a data-
`base table or file.
`Pascal \pa-skal\ n. A concise procedural lan-
`guage designed between 1967 and 1971 by
`Niklaus Wirth. Pascal, a compiled, structured lan-
`guage built upon ALGOL, simplifies syntax while
`adding data types and structures such as sub-
`ranges, enumerated data types, files, records, and
`sets. See also ALGOL, compiled language. Com-
`pare C.
`pass’ \pas\ n. In programming, the carrying out of
`one complete sequence of events.
`pass 2 \pas\ vb. To forward a piece of data from
`one part of a program to another. See also pass by
`address, pass by value.
`pass by address \pas bi adres, -dres\ n. A
`means of passing an argument or parameter to a
`
`subroutine. The calling routine passes the address
`(memory location) of the parameter to the called
`routine, which can then use the address to retrieve
`or modify the value of the parameter. Also called
`pass by reference. See also argument, call’. Com-
`pare pass by value.
`pass by reference \pas bi refr-ns, refrns\ n.
`See pass by address.
`pass by value \pas bi valydb\ n. A means of
`passing an argument or a parameter to a subrou-
`tine. A copy of the value of the argument is cre-
`ated and passed to the called routine. When this
`method is used, the called routine can modify the
`copy of the argument, but it cannot modify the
`original argument. See also argument, call’. Com-
`pare pass by address.
`passive-matrix display \ pas iv-rnª triks dis-pl/ \
`n. An inexpensive, low-resolution liquid crystal
`display (LCD) made from a large array of liquid
`crystal cells that are controlled by transistors out-
`side of the display screen. One transistor controls
`an entire row or column of pixels. Passive-matrix
`displays are commonly used in portable comput-
`ers, such as laptops and notebooks, because of
`their thin width. While these displays have good
`contrast for monochrome screens, the resolution is
`weaker for color screens. These displays are also
`difficult to view from any angle other than straight
`on, unlike active-matrix displays. However, com-
`puters with passive-matrix displays are consider-
`ably cheaper than those with active-matrix
`screens. See the illustration on the next page. Also
`called dual-scan display. See also liquid crystal dis-
`play, transistor. Compare active-matrix display.
`password \paswrd\ n. A security measure used
`to restrict access to computer systems and sensi-
`tive files. A password is a unique string of charac-
`ters that a user types in as an identification code.
`The system compares the code against a stored list
`of authorized passwords and users. If the code is
`legitimate, the system allows the user access at
`whatever security level has been approved for the
`owner of the password.
`Password Authentication Protocol \paswrd a-
`then-t-kª shun prO t-kol, (cid:244)-then-t-kª shn\
`n.
`See PAP (definition 1).
`password protection \paswrd pro-tekshn\ n.
`The use of passwords as a means of allowing only
`
`U
`
`:J5f