`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 21
`
`
`
`Case 3:17-cv-05659-WHA Document 369-22 Filed 02/14/19 Page 2 of 2
`
`
`
`client
`
`74
`
`
`
`trackball
`A_
`clip-on pointing device
`that clips on the side or front of a portable
`computer. These devices have fallen in
`popularity because modern notebook
`computers have built-in pointing devices
`such as touchpads or pointingsticks. See
`freestanding pointing device, mouse,
`snap-on
`pointing device.
`
`1. In an Internet service, a pro-
`client
`gramthat can communicate with a server
`located on the Internet to exchangedata of
`a certain type. A Web browseris a client for
`accessing information available on Web
`servers. 2. In a client/server network, a pro-
`gram that
`is
`designed
`to
`request
`information froma server. See client/server,
`heavyclient, light client. 3. In Object Linking
`and Embedding (OLE), an application that
`includes data in another application,called
`the server application. See client application.
`
`client application In Object Linking
`and Embedding (OLE), an application in
`which one can create a linked object or
`embed an object. See server application.
`
`Clipper Chip A U.S. government-
`backed encryption technology, housed on a
`semiconductor that would have been manu-
`factured in massive quantities that would
`provide private individuals with the means
`to encrypt
`their messages. However,
`the
`Clipper Chip includes a back door that
`would enable law enforcement agencies to
`eavesdrop on the message. To do so, law
`client/server A design modelfor appli-
`enforcement personnel would have to
`cations running on a network,in which the
`obtain a warrant, which is now required to
`bulk of the back-end processing, such as
`eavesdrop on telephone communications.
`performing a physical search of a database,
`Privacy advocates fear that the government
`takes place onaserver. The front-end pro-
`would abuse its power, eavesdropping on
`cessing, which involves communicating
`conversations without having obtained the
`with the user,
`is handled by smaller pro-
`propercertification, while law enforcement
`grams(called clients) that are distributed to
`personnelfear that encryption technologies
`the client workstations. See heavy client,
`will prevent the detection ofterrorist and
`LAN,light client, WAN.
`drug-dealing activity. The Clipper Chip
`proposal was
`seriously derailed after
`a
`researcher proved that
`its encryption
`scheme was notreliable, but U.S. govern-
`ment security agencies continue to make
`similar proposals. See back door, encryption,
`key escrow,
`
`clip A portion of a video,especially one
`that has been digitized using a video cap-
`ture board. See video capture board.
`
`clip art A collection of graphics, stored
`on disk and available for use in a desktop
`publishing or presentation graphics pro-
`gram. The termis derived from a graphics
`design tradition in which packages of
`printed clip art were sold in books and
`actually clipped out by layout artists to
`enhance newsletters, brochures, and presen-
`tation graphics. Most page layout or
`presentation graphics programs can read
`graphicsfile formats used by clip art collec-
`tions available on disk.
`
`Clipboard In a graphical user interface
`(GUD), a temporary storage area in memo-
`ty where material cut or copied from a
`document
`is stored until one pastes the
`material elsewhere.
`.
`
`clock Anelectronic circuit that generates
`evenly spacedpulses at speeds of millions of
`hertz (Hz). The pulses are used to synchro-
`nize the flow of information through the
`computer's internal communication chan-
`nels. Most computers
`also contain a
`separate circuit that tracks the time of day,
`but this has nothing to do with the system
`clock’s function. Synonymous with system
`clock. See clock/calendar board, clock speed.
`
`clock/calendar board An adapter that
`includes a battery-powered clock for track-
`ing the time and date. These were popular
`on the earliest PCs, which were not other-
`wise capable of remembering the date and
`time when turnedoff.
`
`
`
`