throbber
A Dictionary of
`Coillputing
`
`Many entries in this dictionary have recommended web
`links. When you see the above symbol at the end of an entry
`go to the dictionary's web page at http://www.oup.com/uk/
`reference/resources/ computing, click on Web links in the
`Resources section and locate the entry in the alphabetical
`list, then click straight through to the relevant websites.
`
`

`
`A Dictionary of
`
`Computing
`
`SIXTH EDITION
`
`OXFORD
`
`UNIVERSITY PRESS
`
`

`
`f-Nq1..
`0 l0811(o
`
`_
`
`OXFORD
`
`UNIVERSITY PRESS
`Great Clarendon Street, Oxford OX2 6DP
`Oxford University Press is a department of the University of Oxford.
`It furthers the University's objective of excellence in research, scholarship,
`and education by publishing worldwide in
`Oxford NewYork
`Auckland Cape Town Dar es Salaam Hong Kong Karachi
`Kuala Lumpur Madrid Melbourne Mexico City Nairobi
`New Delhi Shanghai Taipei Toronto
`With offices in
`Argentina Austria Brazil Chile Czech Republic France Greece
`Guatemala Hungary Italy Japan Poland Portugal Singapore
`South Korea Switzerland Thailand Turkey Ukraine Vietnam
`Oxford is a registered trade mark of Oxford University Press
`in the UK and in certain other countries
`Published in the United States
`by Oxford University Press Inc., New York
`
`©Market House Books Ltd, 1983, 1986, 1990, 2004, 2008
`
`The moral rights of the author have been asserted
`Database right Oxford University Press (maker)
`
`First edition 1983
`Second edition 1986
`Third edition 1990
`Fourth edition 1996
`Fifth edition 2004
`Sixth edition 2008
`
`AU rights reserved. No part of this publication may be reproduced,
`stored in a retrieval system, or transmitted in any form or by any means,
`without the prior permission in writing of Oxford University Press,
`or as expressly permitted by law, or under terms agreed with the appropriate
`reprographics rights organization. Enquiries concerning reproduction
`outside the scope of the above should be sent to the Rights Department,
`Oxford University Press, at the address above
`
`You must not circulate this book in any other binding or cover
`and you must impose this same condition on any acquirer
`
`British Library Cataloguing in Publication Data
`Data available
`
`Library of Congress Cataloging in Publication Data
`Data available
`
`Typeset by Market House Books Ltd.
`Printed in Great Britain
`on acid-free paper by
`Clays Ltd, St Ives plc
`ISBN 978-0-19-923401-1
`
`10 9 8 7 6 5 4 3 2 1
`
`~
`.......... --------------------~~~-
`
`.I
`,1
`
`l
`-l
`
`

`
`engineering of computer-based systems
`
`encapsulation 1. See OBJECT, INFORMA(cid:173)
`".r:ION HIDING. 2. See INTERNETWORKING.
`encoder 1. The means by which an encod(cid:173)
`\ing process is effected (seeconE). It may be
`implemented in hardware or software, the
`cprocess being algorithmic in nature. 2. A
`··logic circuit, usually an integrated circuit,
`that generates a unique n-bit binary word,
`indicating which of its 2 n input lines is ac(cid:173)
`tive, i.e. at logic 1. A keyboard encoder, for
`example, may be required to generate a
`unique binary code indicating which key on
`the keyboard has been pressed.
`If two or more of the device inputs can be
`active simultaneously then a priority en(cid:173)
`coder is required, which usually encodes
`only the highest-order data input.
`encoding 1. The transformation of a mes(cid:173)
`sage into an encoded form. See CODE. 2. The
`representation of symbols in some alphabet
`by symbols or strings of symbols in some
`other alphabet. A common example is *bi(cid:173)
`nary encoding.
`encryption The processing of a message
`by a sender in order to render it unintelligi(cid:173)
`ble to other than authorized recipients. See
`also CRYPTOGRAPHY.
`end-around-carry A type of carry that is
`required when a *radix-minus-one comple(cid:173)
`ment representation of integers is used and
`two integers so represented are summed. If a
`carry is generated at the most significant end
`of the two numbers, then this carry must be
`added to the digit at the least significant end
`of the result to give the radix-minus-one
`complement representation of the sum.
`end-around shift Another name for cir(cid:173)
`cular shift See SHIFT.
`endomorphism A *homomorphism from
`an *algebra to itself.
`endorder traversal Another name for
`postorder traversal.
`end-to-end control Control acting be(cid:173)
`tween two applications that are communi(cid:173)
`cating across one or more networks. Data
`traversing a network must be protected
`against a number of possible forms of error.
`An individual unit of data may be corrupted,
`lost completely, or delivered more than
`once; successive units of data may be deliv(cid:173)
`ered in the wrong order. The sender may at(cid:173)
`tempt to transmit data more quickly than
`
`the receiver can receive it, or some part of
`the route can actually carry it. Within the
`network, the transmitter and receiver at the
`two ends of an individual link will cooperate
`to control some of these errors, and this is
`known as point-to-point control. However,
`it may also be necessary to require the appli(cid:173)
`cations at each end of the overall connection
`to cooperate in protecting against other
`forms of error, and this is end-to-end con(cid:173)
`trol.
`end-to-end encryption The transfer of
`an encrypted message across a system with(cid:173)
`out intermediate stages of decryption and
`reencryption. Compare LINK ENCRYPTION.
`energizer A hardware or software mecha(cid:173)
`nism that is used as an aid in testing the be(cid:173)
`havior of a subsystem. The intention is that
`the energizer should drive the subsystem in
`a way that simulates its actual application,
`and should at the same time analyze the re(cid:173)
`sponses from the subsystem in order to de(cid:173)
`tect any erroneous behavior.
`engine 1. A component of a software sys(cid:173)
`tem that handles a specific aspect of pro(cid:173)
`cessing. Engines thus form part, or possibly
`the whole, of an application's *back end. For
`example, a database engine provides data(cid:173)
`base services other parts of the system; a
`search engine provides searching services;
`and so on. Engines can be shared among
`several applications - for example, through
`the *client/ server model-and are often
`bought from a third-party specialist supplier.
`2. Another name for back end.
`engineering of computer-based sys(cid:173)
`tems (ECBS) A narrower form of *systems
`engineering that addresses only those sys(cid:173)
`tems which are computer-based. This is a
`very important subset of systems engineer(cid:173)
`ing, but is still very much wider than *soft(cid:173)
`ware engineering. It encourages a holistic
`view of a system, its environment, and its
`components. Often the components of com(cid:173)
`puter-based systems are also (lower-level)
`computer-based systems. ECBS pays great
`attention to addressing nonfunctional prop(cid:173)
`erties of a proposed design, and the need for
`give-and-take between different design op(cid:173)
`tions prior to committing to an implementa(cid:173)
`tion. Give-and-take is seen as a crucial
`aspect of such developments because it is
`here that competing requirements and
`
`

`
`informatics
`
`250
`
`informatics The use of computers to
`maintain and analyze large amounts of data.
`The term is applied particularly with respect
`to databases of chemical compounds or re(cid:173)
`actions (chemoinformatics) or databases in
`biochemistry or cell biology (bioinformat(cid:173)
`ics).
`information Generally, information is
`whatever is capable of causing a human
`mind to change its opinion about the current
`state of the real world. Formally, and espe(cid:173)
`cially in science and engineering, informa(cid:173)
`tion is whatever contributes to a reduction in
`the uncertainty of the state of a system; in
`this case, uncertainty is usually expressed in
`an objectively measurable form. Commonly,
`this is done by means of Shannon's *en(cid:173)
`tropy. Nevertheless, this formula for uncer(cid:173)
`tainty involves probabilities, and these may
`well have to be subjective. If that is so, the
`formal measurement must be qualified as
`dependlng on subjective probabilities, and
`"uncertainty" must be replaced by "opinion,
`or personal estimate, of uncertainty".
`Information must be distinguished from
`any medium that is capable of carrying it. A
`physical medium (such as a magnetic disk}
`may carry a logical medium (data, such as
`binary or text symbols). The information
`content of any physical objects, or logical
`data, cannot be measured or discussed until
`it is known what range of possibilities existed
`before and after they were received. The in(cid:173)
`formation lies in the reduction in uncer(cid:173)
`tainty resulting from the receipt of the
`objects or the data, and not in the size or
`complexity of the objects or data themselves.
`Questions of the form, function, and seman(cid:173)
`tic import of data are only relevant to infor(cid:173)
`mation inasmuch as they contribute to the
`reduction of uncertainty. If an identical
`memorandum is received twice, it does not
`convey twice the information that its first oc(cid:173)
`currence conveyed: the second occurrence
`conveys no information at all, unless, by
`prior agreement, the number of occurrences
`is itself to be regarded as significant.
`Information has ramifications in security,
`politics, culture, and the economy, as well as
`in science and engineering. The extent to
`which information is used as an economic
`commodity is one of the defining character(cid:173)
`istics of the "post-industrial" society, hence
`the phrase "the information society".
`
`information destination See SHANNON' s
`MODEL
`information engineering The engineer(cid:173)
`ing approach applied to *information sys(cid:173)
`tems. The term shows considerable variation
`in scope. At its broadest, it refers to the engi(cid:173)
`neering discipline covering a spectrum from
`*software engineering and *systems engi(cid:173)
`neering to device-level electronics. At its
`most limited (but perhaps best known}, it is
`the name of a specific proprietary method
`for the development of organizational infor(cid:173)
`mation systems, primarily associated with
`James Martin; this method begins with *en(cid:173)
`terprise modeling and carries through to the
`generation of program code, and a number
`of software toolsets are available for its sup(cid:173)
`port.
`information hiding A principle, used
`when developing an overall *program struc(cid:173)
`ture, that each component of a program
`should encapsulate or hide a single design
`decision. The principle was first expounded
`by David Pamas, who advocated an ap(cid:173)
`proach to program development in which a
`list is prepared of design decisions that are
`particularly difficult or likely to change;
`vidual components, known as modules, are
`then defined so that each encapsulates one
`such decision. The interface to each module
`is defined in such a way as to reveal as little
`as possible about its inner workings.
`This approach leads to modules that are
`readily understood and can be developed in"'.
`dependently. More important, it also leads
`to programs that are easy to change, with
`manv desired changes requiring modifica(cid:173)
`tion of only the inner workings of a single
`module.
`information management system
`term sometimes used synonymously with
`*database management system (DBMS} al~
`though normally used in a more general

`sense. The term has no widely accepted
`definition and thus can be applied to any
`system of software that facilitates the
`age, organization, and retrieval of·
`tion within a computer system, wi
`implication that it need have all the
`characteristics of a DBMS. The info
`held mav include sound fragments,
`and video sequences in addition to
`textual and numerical information.
`newer forms of computer-held inti
`are sometimes argued as be.ing a defi
`
`

`
`Internet Architecture Board
`
`262
`
`Internet Architecture Board (IAB) See
`INTERNET SOCIETY.
`Internet cafe SeeCYBERCAFE.
`Internet Engineering Steering Group
`(IESG) See INTERNET SOCIETY.
`Internet Engineering Task Force (IETF}
`See INTERNET SOCIETY.
`Internet Explorer Microsoft's web
`brows-ing software, first introduced in 1995.
`See BROWSER.
`Internet Message Access Protocol See
`IMAP.
`internet protocol A *protocol that allows
`traffic to pass between networks. The most
`widely used is *IP, the Internet Protocol. See
`also INTERNETWORKING.
`Internet Protocol Security See IPSEC.
`Internet service provider See ISP.
`Internet Society (ISOQ A professional
`membership society that promotes the use
`and future development of the Internet. It
`has individual and organization members all
`over the world and is governed by an elected
`board of trustees. ISOC coordinates various
`groups responsible for Internet infrastruc(cid:173)
`ture. These include the Internet Engineering
`Task Force (IETF), the Internet Architecture
`Board (!AB}, and the Internet Engineering
`Steering Group {IESG). The IETF develops
`technical standards for the Internet. The lAB
`has overall responsibility for the architecture
`and adjudicates on disputes about stan(cid:173)
`dards. The IESG, along with the !AB, reviews
`standards proposed by the IETF. See also
`IANA.
`1@l11a111~•1vu+*
`• The Internet Society home page
`internetworking Connecting several
`computer •networks together to form a sin(cid:173)
`gle higher-level network, as occurs in the
`*Internet. There are two basic approaches:
`encapsulation and translation. The junc(cid:173)
`tions between networks are called •gate(cid:173)
`ways, and their functions depend on which
`internetworking approach is taken.
`When encapsulation is used, a new proto(cid:173)
`col layer (or layers) is defined; this provides
`uniform semantics for services such as
`*datagram packet switching, *electronic
`mail, etc. When a message is entered into the
`internetwork, it is wrapped (encapsulated) in
`
`a network-specific protocol {local network
`datagram headers, or *virtual circuits). The
`encapsulated packet is sent over the network
`to a gateway, which removes the old net(cid:173)
`work-specific encapsulation, adds a new set
`of network headers, and sends the packet
`out on another network. Eventually the mes(cid:173)
`sage reaches its destination, where it is con(cid:173)
`sumed.
`When protocol translation is used, mes(cid:173)
`sages are sent on a local network using the
`protocols and conventions of that network. A
`gateway receives the message and trans(cid:173)
`forms it into the appropriate message on an(cid:173)
`other network; this may involve interpreting
`the message at multiple protocol levels.
`The encapsulation approach provides a
`uniform set of semantics across all networks,
`while the translation approach results in
`unanticipated problems due to subtle differ(cid:173)
`ences between protocols. The encapsulation
`approach generally requires that new soft(cid:173)
`ware be written for all hosts on all networks,
`while the translation approach requires new
`software only in the gateways. See also IP.
`interoperability The ability of systems to
`exchange and make use of information in a
`straightfmward and useful way; this is en(cid:173)
`hanced by the use of standards in communi(cid:173)
`cation and data format. For example, a -
`microcomputer conforming to the *SCSI
`standard can be connected to any SCSI pe(cid:173)
`ripheral device - i.e. many different hard
`disks, printers, etc. In software, operating
`systems that run on different CPUs, and Mi(cid:173)
`crosoft *Word's ability to read files created
`using *Excel are both examples of interoper(cid:173)
`ability.
`interpolation A simple means of approxi(cid:173)
`mating a functionj{x) in which the approxi(cid:173)
`mation, say p(x), is constructed by requiring
`that
`p(x;) =fix;), i= 0,1,2,. .. ,n
`Here fix;) are given values p(x;) that fit ex(cid:173)
`actly at the distinct points x; (compare
`SMOOTHING). The value of/can be approxi(cid:173)
`mated by p(x) for x * x;. In practice pis often
`a polynomial, linear and quadratic polyno(cid:173)
`mials providing the simplest examples. In
`addition the idea can be extended to include
`matching of p(x;) with f'(x;); this is Hermite
`interpolation. The process is also widely
`used in the construction of many numerical
`methods, for example in *numerical integra- -
`tion and *ordinary differential equations.
`
`

`
`o and is usually associated with mem(cid:173)
`compaction.
`ge collection SeeGARBAGE.
`e in garbage out (GIGO) An
`ciation of the important computing
`at all input, however absurd, will
`d according to a program's algo(cid:173)
`d appropriate output generated. If
`tis garbage, then the output will in(cid:173)
`also be garbage. This tru.th is often
`recognized, especially by non-computer
`speciali&ts, who tend to blame "the com-
`.• puter" for incorrect results when the fault
`actually lies with mistakes in the input.
`gate See LOGIC GATE.
`gate array A form of *programmable de(cid:173)
`vice in which the component *logic gates
`can be interconnected in an arbitrary man(cid:173)
`ner during manufacture to give a *combina(cid:173)
`tional or•sequential circuit of considerable
`*height.
`Gates, Bill (William Henry G.; 1955-
`US businessman and programmer. Gates
`began programming at school and in 1975,
`while an undergraduate at Harvard, wrote a
`BASIC interpreter with his friend Paul Allen
`for an early microcomputer, the MITS Altair.
`This Gates-Allen partnership was the genesis
`of *Microsoft, and Gates left Harvard to de(cid:173)
`velop the business. While he personally su(cid:173)
`pervised Microsoft's products in the early
`years, he became better known for the busi(cid:173)
`ness acumen that has built Microsoft into
`the world's largest software company, in the
`process making himself the world's richest
`person. Notable successes include securing
`the contract {1980) to supply an operating
`system for the original IBM personal com(cid:173)
`puter while retaining the right to market it
`separately (as *MS-DOS) ; and the exploita(cid:173)
`tion of the success ofWindows 3.x after 1990
`to achieve dominance of the PC market(cid:173)
`place. Gates was CEO of Microsoft until
`2000, then chief software architect until
`2006; he continues as Chairman. He has
`used part of his personal fortune for philan(cid:173)
`thropic purposes, founding the Bill &
`Melinda Gates Foundation with his wife in
`2000.
`gateway A device that interconnects two
`*networks, and whose presence is usually
`visible to network users (as distinct from a
`*bridge, whose presence is generally not vis-
`
`GCD
`
`ible). A gateway may be required to deal with
`one or more of the following differences be(cid:173)
`tween networks it connects:
`(a} change of addressing *domain -where
`the networks have addressing domains man(cid:173)
`aged by separate groups, a gateway may be
`used to handle address transformations for
`messages traversing the gateway;
`(b) control of charging-where the networks
`have different approaches to charging (e.g. a
`local area network that imposes no charges
`connecting to a wide area network that
`charges on a per-packet basis), a gateway
`may be used to handle user authorization
`and usage accounting;
`(c} change ofprotocol-wherethe networks
`use different protocols, a gateway may be
`used to carry out necessary protocol conver(cid:173)
`sion (if practicable) or to intercept attempts
`by a user on one network to use functions
`not available on the other and to supply suit(cid:173)
`able responses.
`The terms bridge, gateway, and *relay are
`among those whose meanings vary between
`different communities of users at a given
`time, and within a given community of users
`at different times.
`gather write The function of writing to
`memory a block of data comprising items of
`data that have been retrieved directly from
`scattered memory locations and/or registers.
`Gaussian distribution Another name for
`normal distribution.
`Gaussian elimination See LINEAR ALGE(cid:173)
`BRAIC EQUATIONS.
`Gaussian noise *Noise whose distribu(cid:173)
`tion of amplitude over time is *Gaussian.
`Gaussian quadrature See NUMERICAL IN(cid:173)
`TEGRATION.
`GB {orGb) Symbolsforgigabyte. SeeGIGA-,
`BYTE.
`Gbps Abbrev. for gigabits per second, i.e.
`usually 109 bits per second. SeeGIGA·, BPS.
`GBS method The Gragg-Burlisch-Stoer
`*extrapolation method based on theoretical
`results obtained by Gragg, implemented by
`Burlisch and Stoer. SeeGRAGG's EXTRAPOLA(cid:173)
`TION METHOD.
`Gbyte Abbrev.forgigabyte. SeeGIGA-, BYTE.
`GCD Abbrev. for greatest common divisor.
`
`

`
`refinement
`
`430
`
`defined outside the function, except for the
`variables passed as parameters.
`refinement The process in programming
`whereby higher-level or abstract ideas are
`progressively reexpressed in terms of Iower(cid:173)
`level or concrete ones. This can involve both
`the implementation of procedures in terms
`of lower-level procedures, and also the rep(cid:173)
`resentation of abstract data in terms of more
`concrete data. Both kinds of refinement can
`involve •specifications, with each step of
`refinement being shown to preserve the
`specified behavior of the procedure or data
`type being refined. Although both terms are
`rather fluid in meaning, there is a possible
`distinction to be made between refinement
`and *program transformation, with the latter
`involving the replacement of one program
`fragment by an equivalent one at the same
`level of abstraction rather than its represen(cid:173)
`tation in terms of a lower level of abstrac(cid:173)
`tion.
`Refinement and transformation are two of
`the main ideas in the increasingly important
`study of the systematic derivation of correct
`programs from specifications.
`reflectance function A function that
`defines the spatial distribution and the
`wavelength composition of the light
`reflected from an object's surface.
`reflectance model A mathematical
`model of how light is reflected from a surface
`based on a *reflectance function. The basic
`reflectance model assumes that all surfaces
`are perfect mirrors. More realistic models
`use reflectance functions that more accu(cid:173)
`rately represent the properties of real sur(cid:173)
`faces (see also SPECULAR REJII.ECTION,
`COOK-TORRANCE MODEL}.
`reflexive closure SeeTRANSITIVE
`CLOSURE.
`reflexive relation A *relation R defined
`on a set Sand having the property that
`xRx
`for all elements xin S
`The relation "is the same age as" defined on
`the set of people is reflexive. Compare IR(cid:173)
`REFLEXIVE RELATION.
`refresh {regenerate) 1. To replenish the
`charge on the storage capacitors used in *dy(cid:173)
`namic memory cells and other similar de(cid:173)
`vices. Some devices are provided with
`
`internal circuitry that automatically re(cid:173)
`freshes dynamic cells whenever these cells
`are read. The word refresh is also used as a
`noun. 2. To repeat at regular intervals the
`display of digital information on a •cathode(cid:173)
`ray tube or television monitor in order that
`the display can appear persistent. See also
`REFRESH FREQUENCY.
`refresh frequency The frequency with
`which a display on a cathode-ray tube is re(cid:173)
`generated. To avoid *flicker this must be
`made as high as possible. See CFF.
`refutation A method of reasoning used in
`logic to refute statements, i.e. to prove them
`false.
`regenerate Another term for refresh.
`register A group of (usually) *bistable de(cid:173)
`vices that are used to store information
`within a computer system for high-speed ac(cid:173)
`cess. A register of n bistables can store a
`word of length n bits, which can represent
`any n bits ofinformation. Different interpre(cid:173)
`tations can be given to the bit configuration
`stored in the register; for example, the
`configuration could represent an instruc(cid:173)
`tion, a binary number, an alphanumeric
`character, etc. A register is often the same
`size as the computer word; it may also be
`byte- or character-size or some other size as
`required. Some registers can behave as
`*counters as well, or they may behave as
`*shift registers. See also MEMORY HIERAilCHY.
`register insertion ring See RING NET(cid:173)
`WORK.
`register optimization SeeoPTIMIZATION.
`register transfer language (RTL) Any of
`several programming languages that allow
`the declaration of-register configurations
`within a structure to perform a computation.
`The timing of transfers between registers, to
`describe the behavior, is specified by the
`order in which such transfers are interpreted
`during the execution of the program. See also
`CHDL.
`regression analysis A statistical tech(cid:173)
`nique that is concerned with fitting relation(cid:173)
`ships between a dependent variable, y, and
`one or more independent variables, Xv x2,. •• ,
`usually by the method of *least squares.
`A linear regression model is one in which
`the theoretical mean value,µ;, ofth.e obser-
`
`

`
`DICTIONARY
`ccccMc+cc'ccCM'Cf 0 f
`COMPUTER
`TERMS
`
`EIGHTH EDITION
`
`The Best Computer Dictionary in Print
`
`C~mpletely revised and updated
`
`Contains extensive Internet coverage
`
`Mvre than 4,000 entries, terms, and acronyms
`
`

`
`Dedication
`
`For Suzanne, always
`
`Webster's New World"' Dictionary of Computer Terms,
`8th Edition
`
`Copyright © 2000 by
`IDG Books Worldwide, Inc.
`An International Data Group Company
`919 E. Hillsdale Blvd.
`Suite 400
`Foster City, CA 94404
`
`All rights reserved including the right of reproduction in whole
`or in part in any form.
`
`For general information on IDG Books Worldwide's books in
`the U.S., please call our Consumer Customer Service depart(cid:173)
`ment at 1-800-762-2974. For reseller information, including
`discounts, bulk sales, customized editions, and premium sales,
`please call our Reseller Customer Service department at
`1-800-434-3422.
`
`A Webster's New World™ Book
`
`WEBSTER'S NEW WORLD DICTIONARY is a registered
`trademark of IDG Books Worldwide, Inc.
`
`Library of Congress Catalog Number: 98-68180
`
`ISBN: 0-02-863777-1
`
`Manufactured in the United States of America
`
`34567
`
`1 02 03 04
`
`

`
`continuous-tone printer 127
`is Symantec's ACT!, which includes a calendar and
`ng. See personal information manager (PIM).
`
`t manager A program designed to help keep track of
`by maintaining a list of addresses, phone numbers, and
`bers. Information is also maintained through the use of a
`pad, automatic telephone dialing with a modem, and search
`sort capabilities.
`
`In local area networks (LANs), a channel access
`od in which access to the communication channel is based
`first-come, first-served policy. See CSA1AICD and device
`
`ensitive help
`In an application program, a user(cid:173)
`ance mode that displays documentation relevant to the
`mmand, mode, or action you are now performing. Context(cid:173)
`itive help reduces the time and keystrokes needed to get
`reen help.
`
`~ontext switching Changing from one program to another
`Without exiting either program. See multiple pro,t.?ram loading.
`
`contiguous Adjacent; placed one next to or after the other. A
`range of cells in a spreadsheet is often, but not always, made up
`of contiguous cells. Its opposite is noncontiguous.
`
`continuous paper Paper manufactured in one long strip, with
`perforations separating the pages, so that you can feed the paper
`into a printer with a tractor-feed mechanism. Synonymous with
`continuous-feed paper. Also called fat!fold paper. The opposite is
`rnt-sheet paper, in which every sheet is a separate piece.
`
`continuous speech recognition The decoding of continu(cid:173)
`ous human speech (without artificial pauses) into transcribed
`text by means of a computer program.
`
`continuous-tone image Printer output in which colors
`and shades of gray blend smoothly together, as they would in
`a chemically printed photograph.
`
`continuous-tone printer A printer that can generate photo(cid:173)
`realistic output, with smooth gradations between colors or
`shades of gray.
`
`

`
`118 Component Object Model
`Component Object Model See COM.
`
`component reusability
`In programming, the capability of
`creating a program module that can perform a specific task and
`be used in another program with little or no modification.
`
`complex instruction set computer (CISC) A type of cen(cid:173)
`tral processing unit (CPU) that can recognize as many as 100
`or more instructions, enough to carry out most computations
`directly. Most microprocessors are CISC chips. The use of
`reduced instruction set computer (RISC) technology, however,
`is becoming increasingly common in professional workstations.
`Apple's Power Macintosh computers use a compromise
`RISC/CISC processor.
`
`compose sequence A series of keystrokes that lets you enter
`a character not found on the computer's keyboard. See ASCII
`character set and extended character set.
`
`composite See comp.
`
`composite color monitor A monitor that accepts a standard
`video signal that mixes red, green, and blue signals to produce
`the color image. Display quality is inferior to that of RGB mon:..
`itors. See composite video.
`
`composite video A method for broadcasting video signals ·
`which the red, green, and blue components, as well as horizo
`and vertical synchronization signals, are mixed together. Regu(cid:173)
`lated by the U.S. National Television Standards Committee
`(NTSC), composite video is used for television. Some compu
`have composite video outputs that use a standard RCA pho
`plug and cable, such as on the backplane of a hi-fi or stereo
`tern. See composite color monitor and RGB monitor.
`
`In multimedia, a device, such as a MID
`compound device
`sequencer, that reproduces sound or other output that you
`recorded in a specific media file.
`
`In object linking and embedding
`compound document
`(OLE), a single file created by two or more applications.
`you use OLE to embed a Microsoft Excel chart into a Mi
`Word document, for example, the resulting file contains
`Word text as well as the Excel object. The object cont ·
`information Excel needs to open the chart for editing. This
`information results in file sizes considerably larger than no
`See OpenDoc.
`
`

`
`encryption 189
`ation The duplication within a device of another
`e's functional capability, or a device designed to work
`like another. In telecommunications, for example, a per(cid:173)
`computer emulates a dumb terminal (a terminal without
`n microprocessor) for online communication with a dis(cid:173)
`mputer. With printers, lesser-known brands emulate
`models such as Hewlett-Packard's LaserJet line.
`
`ation sensing See automatic emulation switching and auto(cid:173)
`network switching.
`
`See automatic emulation switching.
`
`In typesetting, a unit of measurement that equals half the
`of an em space, which is the width of the capital letter M
`a typeface. En dashes are used in place of the English words
`" or "through;' as in January 9-January 23 or Pages 63-68.
`ey also are used as minus signs, as in -30 degrees Fahrenheit.
`mpare to em dash.
`
`capsulated PostScript (EPS) file A high-resolution
`phic image stored in the PostScript page description lan-
`ge. The EPS standard enables users to transfer high-resolution
`hies images between applications. You can size EPS images
`out sacrificing image quality. A major drawback of EPS
`hies is that to print them, you usually need a PostScript(cid:173)
`patible laser printer. A second drawback is that with most
`lication programs, you cannot view the image onscreen
`ess you attach a screen image to it. To provide an alternative
`expensive PostScript printers, developers have created pro(cid:173)
`such as LaserGo, Inc.'s GoScript that interpret and print
`es on standard dot-matrL'\: printers or nonPostScript laser
`inters. See PostScript.
`
`capsulation
`In wide area networks (WANs), the process by
`hich transmitted data is altered as it moves down the comput(cid:173)
`protocol stack. As each layer's protocols alter the data, it is
`nslated into a form that can be sent out over the network. At
`receiving computer, this process is reversed so that the data is
`ored in such a form that it can be passed to an application
`d made intelligible to the user.
`
`encryption
`In cryptography, the process of converting a mes(cid:173)
`sage into a ciphertext (an encrypted message) by using a key so
`that the message appears to be nothing but gibberish. However,
`
`

`
`general format 235
`
`age characters
`In modems, meaningless characters
`by line noise. In printers, meaningless characters caused
`e noise, a faulty printer driver, or some other communica(cid:173)
`problem.
`
`age collection A process by which a program goes
`random access memory (RAM), decides which
`ation stored there is no longer needed, and prepares
`dresses housing the unneeded data for reuse. Garbage
`ction prevents programs from filling RAM with useless
`and causing a cras

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket