throbber
0 00
`
`’00
`
`
`Ihe (cid:9)
`
`ew
`
`0
`
`iiiU our:
`lull I (cid:9)
`
`Over
`7,600
`Terms
`
`Additional Terms
`Available On Line
`Quarterly
`
`I-
`
`I
`
`Exhibit 2001
`IPR2016-01404
`
`

`
`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright ' 1997 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted
`in any form or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`Microsoft Press Computer Dictionary. -- 3rd ed.
`p. cm.
`ISBN 1-57231-446-X
`1. Computers--Dictionaries. 2. Microcomputers--Dictionaries.
`I. Microsoft Press.
`QA76.15.M54 1997
`004’.03--dc21 (cid:9)
`
`97-15489
`CIP
`
`Printed and bound in the United States of America.
`
`3456789 QMQM 21098
`
`Distributed to the book trade in Canada by Macmillan of Canada, a division of Canada Publishing
`Corporation.
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further
`information about international editions, contact your local Microsoft Corporation office. Or contact
`Microsoft Press International directly at fax (425) 936-7329.
`
`Macintosh, Power Macintosh, QuickTime, and TrueType are registered trademarks of Apple Computer,
`Inc. Intel is a registered trademark of Intel Corporation. Directlnput, DirectX, Microsoft, Microsoft
`Press, MS-DOS, Visual Basic, Visual C++, Win32, Win32s, Windows, Windows NT, and XENIX are
`registered trademarks and ActiveMovie, ActiveX, and Visual J++ are trademarks of Microsoft
`Corporation. Java is a trademark of Sun Microsystems, Inc. Other product and company names
`mentioned herein may be the trademarks of their respective owners.
`Acquisitions Editor: Kim Fryer
`Project Editor: Maureen Williams Zimmerman, Anne Taussig
`Technical Editors: Dail Magee Jr., Gary Nelson, Jean Ross, Jim Fuchs, John Conrow, Kurt Meyer,
`Robert Lyon, Roslyn Lutsch
`
`

`
`(cid:149) .(cid:149):
`
`datae;ntry
`
`
`Data Carrier Detected \dªt k(cid:226)rº-er d-tektd,
`dat\ n. See DCD.
`data chaining \dªl chaneng, dat\ n. The pro-
`cess of storing segments of data in noncontiguous
`locations while retaining the ability to reconnect
`them in the proper sequence.
`data channel \dªt chanl, dat\ n. See chan-
`nel.
`data collection \dªt k-lekshn, dat\ n. 1.
`The process of acquiring source documents or
`data. 2. The grouping of data by means of classifi-
`cation, sorting, ordering, and other organizing
`methods.
`datacom \dªt-kom, dat-kom\ n. Short for
`data communications. See communications.
`data communications \ dª t (cid:9)
`k-myd(cid:246)-n-
`kªshnz, dat\ n. See communications.
`data compaction \dªt km-pakshn, dat\ n.
`See data compression.
`data compression \dªt km-preshn, dat\ n.
`A means of reducing the amount of space or band-
`width needed to store or transmit a block of data,
`used in data communications, facsimile transmis-
`sion, and CD-ROM publishing. Also called data
`compaction.
`data conferencing \dªt konfrn-seng, dat\ n.
`Simultaneous data communication among geo-
`graphically separated participants in a meeting.
`Data conferencing involves whiteboards and other
`software that enable a single set of files at one loca-
`tion to be accessed and modified by all participants.
`See the illustration. See also desktop conferencing,
`whiteboard. Compare video conferencing.
`
`Data conferencing.
`
`n. The aspect
`data control \dªt kn-tr(cid:246)1, dat\
`of data management concerned with tracking how
`
`1.1
`
`en-krip shun
`
`and by whom data is used, accessed, altered,
`owned, and reported on.
`data corruption \dªt kr-upshn, dat\ n. See
`corruption.
`data declaration \dªt de-kbr-ªshn, dat\
`A statement in a program that specifies the charac-
`teristics of a variable. The requirements for data
`declarations vary among different programming
`languages but can include such values as variable
`name, data type, initial value, and size specifica-
`tion. See also array, data type, record’, variable.
`data definition language \ dª t def--nish n
`lang-wj, dat\ n. A language that defines all
`attributes and properties of a database, especially
`record layouts, field definitions, key fields, file loca-
`tions, and storage strategy. Acronym: DDL (D ’D-L’).
`data description language \ dª t ds-krip shun
`lang-wj, dat\ n. A language designed specifi-
`cally for declaring data structures and files. See also
`data definition language.
`data dictionary \dªt diksh-n(cid:226)r-º, dat\
`n. A
`database containing data about all the databases in
`a database system. Data dictionaries store all the
`various schema and file specifications and their
`locations. They also contain information about
`which programs use which data and which users
`are interested in which reports.
`data directory \dªt dr-ektr-º, dat\ n. See
`catalog, data dictionary.
`data-driven processing \ dª t-driv-n pros Ies-
`ºng, dat-driv-n\ n. A form of processing where
`the processor or program must wait for data to
`arrive before it can advance to the next step in a
`sequence.
`data element \dªt el-ment, dat\ n. A single
`unit of data. Also called data item. See also data
`field.
`data encryption \dªt en-kripshn, dat\
`See encryption.
`data encryption key \ dª t en-krip shun kº,
`dat\ n. A sequence of data that is used to
`encrypt and decrypt other data. Acronym: DEK
`(DE-K). See also decryption, encryption, key
`(definition 3).
`data encryption standard \ dª t (cid:9)
`standrd, dat\ n. See DES.
`data entry \dªt entrº, dat\ n. The process of
`writing new data to computer memory.
`
`n.
`
`n.
`
`

`
`PCs that allows for increasing memory beyond the
`Intel 80x86 microprocessor real-mode limit of 1
`megabyte. In earlier versions of microprocessors,
`EMS bypassed this memory board limit with a
`number of 16-kilobyte banks of RAM that could be
`accessed by software. In later versions of Intel
`microprocessors, including the 80386 and 80486
`models, EMS is converted from extended memory
`by software memory managers, such as EMM386
`in MS-DOS 5. Now EMS is used mainly for older
`MS-DOS applications because Windows and other
`applications running in protected mode on 80386
`and higher microprocessors are free of the 1-MB
`limit. Also called LIM EMS. See also expanded
`memory, protected mode. compare conventional
`memory, extended memory.
`em space \em spªs\ n. A typographical unit of
`measure that is equal in width to the point size of
`a particular font. For many fonts, this is equal to
`the width of a capital M, from which the em
`space takes its name. Compare en space, fixed
`space, thin space.
`emulate \emyb-lat\ vb. For a hardware or soft-
`ware system to behave in the same manner as
`another hardware or software system. In a net-
`work, for example, microcomputers often emulate
`mainframes or terminals so that two machines can
`communicate.
`emulation \&my-lªshan\ n. The process of a
`computer, device, or program imitating the func-
`tion of another computer, device, or program.
`emulator \ emy-lª tr\ n. Hardware or software
`designed to make one type of computer or com-
`ponent act as if it were another. By means of an
`emulator, a computer can run software written for
`another machine. In a network, microcomputers
`might emulate mainframes or terminals so that two
`machines can communicate.
`emulsion laser storage \ º-mul shun lii zr st(cid:246)r-
`n. A method for recording data in film by
`selective heating with a laser beam.
`enable \e-nªbl\ vb. To activate or turn on. Com -
`pare disable.
`encapsulate \en-kapsa-lat\ vb. To treat a collec-
`tion of structured information as a whole without
`affecting or taking notice of its internal structure.
`In communications, a message or packet con-
`structed according to one protocol, such as a TCP/
`
`IP packet, may be taken with its formatting data as
`an undifferentiated stream of bits that is then bro-
`ken up and packaged according to a lower-level
`protocol (for example, as ATM packets) to be sent
`over a particular network; at the destination, the
`lower-level packets are assembled, re-creating the
`message as formatted for the encapsulated proto-
`col. In object-oriented programming, the imple-
`mentation details of a class are encapsulated in a
`separate file whose contents do not need to be
`known by a programmer using that class. See also
`ATM (definition 1), object-oriented programming,
`TCP/IP.
`Encapsulated PostScript \en-kapsn-l-td p(cid:246)sC
`skript\ n. See FPS.
`encapsulated type \en-kaps-lª-td tip\ n. See
`abstract data type.
`encipher \en-sifr\ vb. See encryption.
`vb. 1. In data security, to
`encode \en-k(cid:246)d\
`encrypt. See also encryption. 2. In programming,
`to put something into code, which frequently
`involves changing the form(cid:151)for example, chang-
`ing a decimal number to binary-coded form. See
`also binary-coded decimal, EBCDIC.
`encryption \en-kripshn\ n. The process of
`encoding data to prevent unauthorized access,
`especially during transmission. Encryption is usu-
`ally based on a key that is essential for decoding.
`The U.S. National Bureau of Standards created a
`complex encryption standard, Data Encryption
`Standard (DES), which provides almost unlimited
`ways to encrypt documents. See also DES.
`encryption key \ en-krip shun kº \ n. A sequence
`of data that is used to encrypt other data and that,
`consequently, must be used for the data’s decryp-
`tion. See also decryption, encryption.
`n. A spe-
`end-around carry \end-round k(cid:226)rº\
`cial type of end-around shift operation on a binary
`value that treats the carry bit as an extra bit; that
`is, the carry bit is moved from one end of the value
`to the other. See also carry, end-around shift, shift.
`n. An
`end-around shift \end-round shift\
`operation performed on a binary value in which a
`bit is shifted out of one end and into the other end.
`For example, a right-end shift on the value
`00101001 yields 10010100. See also shift.
`en dash \en dash\ n. A punctuation mark (-)
`used to show ranges of dates and numbers, as in
`
`

`
`o’
`
`K1 \K, kilC)-bit\ n. Short for kilobyte.
`K2 \K, kil(cid:246)\ prefix See kilo-.
`K&R C \Knnd-R C\ n. Short for (Brian W.) Ker-
`nighan and (Dennis M.) Ritchie C. The version of
`the C programming language, defined by those
`two authors, that was the informal C standard until
`a more formal standard was developed by an ANSI
`committee. See also C.
`.k12.us \dot-K-twelvdot-U-S\ n. On the Internet,
`the major geographic domain specifying that an
`address is a U.S. K-12 (kindergarten through high
`school) educational site.
`Kb \kil-bit’, K-B\ n. See kilobit.
`KB \ki1-bif, K-B\ n. See kilobyte.
`Kbit \Kbit, kil-biC\ n. See kilobit.
`Kbps \KB-P-S\ n. See kilobits per second.
`Kbyte \Kbit, kil-biC\ n. See kilobyte.
`kc \K-C\ n. See kilocycle.
`.ke \dotK-E\ n. On the Internet, the major geo-
`graphic domain specifying that an address is
`located in Kenya.
`Kerberos or kerberos \knrbnr-os\ n. A network
`authentication protocol developed by MIT. Ker -
`beros authenticates the identity of users attempt-
`ing to log on to a network and encrypts their
`communications through secret-key cryptography.
`A free implementation of Kerberos is available
`from MIT (http://web.mit.edu/kerheros/www/),
`although it is also available in many commercial
`products. See also authentication, cryptography.
`Kermit \knrmit\ n. A file transfer protocol used in
`asynchronous communications between comput-
`ers. Kermit is a very flexible protocol used in many
`software packages designed for communications
`over telephone lines. Compare Xmodem, Yrno-
`dem, Zmodern.
`kern \ krn\ vb. To alter selectively the distance
`between pairs of letters for readability and to
`make the type spacing more balanced and propor-
`tional. See the illustration.
`
`kernel \krnrl\ n. The core of an operating sys-
`tem(cid:151)the portion of the system that manages
`memory, files, and peripheral devices; maintains
`the time and date; launches applications; and allo-
`cates system resources.
`key \kº\ n. 1. On a keyboard, the combination of
`a plastic keycap, a tension mechanism that sus-
`pends the keycap but allows it to be pressed
`down, and an electronic mechanism that records
`the key press and key release. 2. In database man-
`agement, an identifier for a record or group of
`records in a datafile. See also B-tree, hash 2 , index’
`(definition 1), inverted list, key field. 3. The code
`for deciphering encrypted data. 4. A metal object
`used with a physical lock to disable a computer
`system.
`keyboard \kºb(cid:246)rd\
`n. A set of switches that
`resembles a typewriter keyboard and that conveys
`information from a user to a computer or data
`communications circuit. See also Alt key, Apple
`key, arrow key, Backspace key, Break key, Caps
`Lock key, character code, Clear key, Command
`key, control character, Control key, Delete key,
`Dvorak keyboard, End key, enhanced keyboard,
`Enter key, ergonomic keyboard, Escape key, func-
`tion key, Help key, Home key, Insert key, key-
`board buffer, keyboard controller, keyboard
`enhancer, keycap, key code, Num Lock key,
`numeric keypad, Option key, original Macintosh
`keyboard, Page Down key, Page Up key, Pause
`key, PC/XT keyboard, Power-on key, Print Screen
`
`FA’L
`
`’TA"I
`
`Kern. The first three letters of the second exam-
`ple are kerned.
`
`W1
`
`9T19
`
`

`
`parity bit (cid:9)
`
`password protection
`
`parity bit \p(cid:226)rn-t& bit\
`n. An extra bit used in
`checking for errors in groups of data bits trans-
`ferred within or between computer systems. With
`microcomputers, the term is frequently encoun-
`tered in modem-to-modem communications, in
`which a parity bit is often used to check the accu-
`racy with which each character is transmitted, and
`in RAM, where a parity bit is often used to check
`the accuracy with which each byte is stored.
`parity check \p(cid:226)r-t& chek\ n. The use of parity
`to check the accuracy of transmitted data. See also
`parity, parity bit.
`parity error \p(cid:226)r-tº (cid:226)rnr\
`n. An error in parity
`that indicates an error in transmitted data or in
`data stored in memory. If a parity error occurs in
`communications, all or part of a message must be
`retransmitted; if a parity error occurs in RAM, the
`computer usually halts. See also parity, parity bit.
`park \ park\ vb. To position the read/write head
`over a portion of a disk that stores no data (and
`therefore can never be damaged) or beyond the
`surface of the disk, prior to shutting down the
`drive, especially in preparation for moving it.
`Parking can be performed manually, automati-
`cally, or, most typically, by a disk utility program.
`parse \pars\ vb. To break input into smaller
`chunks so that a program can act upon the infor -
`mation.
`partition \ par-ti shn \ n. 1. A logically distinct
`portion of memory or a storage device that func-
`tions as though it were a physically separate unit.
`2. In database programming, a subset of a data-
`base table or file.
`Pascal \pa-skal\ n. A concise procedural lan-
`guage designed between 1967 and 1971 by
`Niklaus Wirth. Pascal, a compiled, structured lan-
`guage built upon ALGOL, simplifies syntax while
`adding data types and structures such as sub-
`ranges, enumerated data types, files, records, and
`sets. See also ALGOL, compiled language. Com-
`pare C.
`pass’ \pas\ n. In programming, the carrying out of
`one complete sequence of events.
`pass 2 \pas\ vb. To forward a piece of data from
`one part of a program to another. See also pass by
`address, pass by value.
`pass by address \pas bi adres, -dres\ n. A
`means of passing an argument or parameter to a
`
`subroutine. The calling routine passes the address
`(memory location) of the parameter to the called
`routine, which can then use the address to retrieve
`or modify the value of the parameter. Also called
`pass by reference. See also argument, call’. Com-
`pare pass by value.
`pass by reference \pas bi refr-ns, refrns\ n.
`See pass by address.
`pass by value \pas bi valydb\ n. A means of
`passing an argument or a parameter to a subrou-
`tine. A copy of the value of the argument is cre-
`ated and passed to the called routine. When this
`method is used, the called routine can modify the
`copy of the argument, but it cannot modify the
`original argument. See also argument, call’. Com-
`pare pass by address.
`passive-matrix display \ pas iv-rnª triks dis-pl/ \
`n. An inexpensive, low-resolution liquid crystal
`display (LCD) made from a large array of liquid
`crystal cells that are controlled by transistors out-
`side of the display screen. One transistor controls
`an entire row or column of pixels. Passive-matrix
`displays are commonly used in portable comput-
`ers, such as laptops and notebooks, because of
`their thin width. While these displays have good
`contrast for monochrome screens, the resolution is
`weaker for color screens. These displays are also
`difficult to view from any angle other than straight
`on, unlike active-matrix displays. However, com-
`puters with passive-matrix displays are consider-
`ably cheaper than those with active-matrix
`screens. See the illustration on the next page. Also
`called dual-scan display. See also liquid crystal dis-
`play, transistor. Compare active-matrix display.
`password \paswrd\ n. A security measure used
`to restrict access to computer systems and sensi-
`tive files. A password is a unique string of charac-
`ters that a user types in as an identification code.
`The system compares the code against a stored list
`of authorized passwords and users. If the code is
`legitimate, the system allows the user access at
`whatever security level has been approved for the
`owner of the password.
`Password Authentication Protocol \paswrd a-
`then-t-kª shun prO t-kol, (cid:244)-then-t-kª shn\
`n.
`See PAP (definition 1).
`password protection \paswrd pro-tekshn\ n.
`The use of passwords as a means of allowing only
`
`U
`
`:J5f

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket