throbber
Micmsofr
`
`
`
`Google V. Simp1eAir
`
`

`
`
`
`PUBLISHED BY
`Microsoft Press
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 2002 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Control Number: 2002019714
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoftcom/mspress.
`Send comments to m.spz'nput@micr0saft.com.
`
`Active Desktop, Active Directory, ActiveMovie, ActiveStore, ActiveSync, ActiveX, Authenticode,
`BackOffice, BizTalk, ClearType, Direct3D, DirectAnimation, DirectDraw, Directlnput, DirectMusic,
`Di1‘ectPlay, DirectShow, DirectSound, DirectX, Entourage, FoxPro, FrontPage, Hotmail, IntelliEye,
`lntelliMouse, IntelliSense, JScript, MapPoint, Microsoft, Microsoft Press, Mobile Explorer, MS-DOS,
`MSN, Music Central, NetMeeting, Outlook, PhotoDraw, PowerPoint, SharePoint, UltimateTV, Visio,
`Visual Basic, Visual C++, Visual FoxPro, Visual InterDev, Visual J++, Visual SourceSafe, Visual Studio,
`Win32, Win32s, Windows, Windows Media, Windows NT, Xbox are either registered trademarks or
`trademarks of Microsoft Corporation in the United States and/or other countries. Other product and
`
`company names mentioned herein ‘may be the trademarks of their respective owners.
`
`The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
`and events depicted herein are fictitious. No association with any real company, organization, product,
`domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
`
`Acquisitions Editor: Alex Blanton
`Project Editor: Sandra Haynes
`
`Body Part No. X08—4l929
`
`

`
`internal font
`
`internal font n. A font that is already loaded in a printer’s
`memory (ROM) when the printer is shipped. Compare
`downloadable font, font cartridge.
`
`internal interrupt n. An interrupt generated by the pro-
`cessor itself in response to certain predefined situations,
`such as an attempt to divide by zero or an arithmetic value
`exceeding the number of bits allowed for it. See also inter-
`rupt. Compare external interrupt.
`internal memory 11. See primary storage.
`
`internal modem n. A modem constructed on an expan-
`sion card to be installed in one of the expansion slots inside
`a computer. Compare external modem, integral modem.
`internal schema n. A view of information about the
`physical files composing a database, including file names,
`file locations, accessing methodology, and actual or poten-
`tial data derivations, in a database model such as that
`described by ANSI/X3/SPARC, that supports a three-
`schema architecture. The internal schema corresponds to
`the schema in systems based on CODASYL/DBTG. In a
`distributed database, there may be a different internal
`schema at each location. See also conceptual schema,
`schema.
`
`internal sort ll. 1. A sorting operation that takes place on
`files completely or largely held in memory rather than on
`disk during the process. 2. A sorting procedure that pro-
`duces sorted subgroups of records that will be subse-
`quently merged into one list.
`
`International Computer Security Association it. See
`ICSA.
`
`International Federation of Information
`Processing it. See IFIP.
`International Maritime Satellite n. See Inrnarsat.
`
`
`
`lntemet2
`
`Comité Consultatif International Télégraphique et Tele-
`phonique, a standards organization that became part of the
`International Telecommunication Union in 1992. See also
`CCITT, ITU-T.
`
`lnternaut I1. See cybernaut.
`
`internet n. Short for internetwork. A set of computer
`networks that may be dissimilar and are joined together by
`means of gateways that handle data transfer and conver-
`sion of messages from the sending networks’ protocols to
`those of the receiving network.
`
`Internet n. The worldwide collection of networks and
`gateways that use the TCP/IP suite of protocols to coinmu-
`nicate with one another. At the heart of the Internet is a
`backbone of high-speed data communication lines
`between major nodes or host computers, consisting of
`thousands of commercial, government, educational, and
`other computer systems, that route data and messages.
`One or more Internet nodes can go off line without endan-
`gering the Internet as a whole or causing communications
`on the Internet to stop, because no single computer or net-
`work controls it. The genesis of the Internet was a decen-
`tralized network called ARPANET created by the U.S.
`Department of Defense in 1969 to facilitate communica-
`tions in the event of a nuclear attack. Eventually other net-
`works, including BITNET, Usenet, UUCP, and NSFnet,
`were connected to ARPANET. Currently the Internet
`offers a range of services to users, such as FTP, e-mail, the
`World Wide Web, Usenet news, Gopher, IRC, telnet, and
`others. Also called: the Net. See also BITNET, FTP1 (def-
`inition l), Gopher, IRC, NSFnet, telnet‘, Usenet, UUCP,
`World Wide Web.
`
`lnternet2 n. A computer-network development project
`launched in 1996 by a collaborative group of I20 universi-
`ties under the auspices of the University Corporation for
`Advanced Internet Development (UCAID). The consor-
`tium is now being led by over 190 universities working
`with industry and government. The goal of Internet2,
`whose high-speed, fiberoptic backbone was brought on
`line in early 1999, is the development of advanced Internet
`technologies and applications for use in research and edu-
`cation at the university level. Though not open for public
`use, Internet2 and the technologies and applications devel-
`oped by its members are intended to eventually benefit
`users of the commercial Internet as well. Some of the new
`technologies Internet2 and its members are developing
`and testing include IPv6, multicasting, and quality of ser-
`vice (QOS). Internet2 and the Next Generation Internet
`
`International Mobile Telecommunications for the
`Year 2000 n. Specifications set forth by the International
`Telecommunications Union (ITU) to establish third-geneiu
`ation wireless telecommunication network architecture.
`The specifications include faster data transmission speeds
`and improved voice quality. Acroriym: IMT-2000.
`ggtgfirnational Organization for Standardization it. See
`I
`-
`.
`.
`.
`nternational Telecommunication Union n. See ITU.
`|
`.
`rriiefnational Telecommunication Union-Telecommu-
`ation Standardization Sector n. See ITU-T.
`I t
`.
`gotznational Telegraph and Telephone Consultative
`mlttee n. English-language form of the name for the
`
`
`
`281
`
`~*
`~-
`’“ -


`.<<*


`* W
`.A I% mmmmgq 2
`
`, mmmw;m.v.-.,,mwW,.,,,_wmAmv WWWW
`
`

`
`1
`
`interrupt priority I
`
`“
`
`I
`
`V inverted file
`
`connections are directed through a firewall that protects
`the internal network from the external Web. Compare
`extranet.
`
`intraware n. Groupware or middleware for use on a com-
`pany’s private intranet. Intraware packages typically con-
`tain e—mail, database, workflow, and browser applications_
`See also groupware, intranet, middleware.
`
`intrinsic font n. A font (type size and design) for which a
`bit image (an exact pattern) exists that can be used as is,
`without such modification as scaling. Compare derived font
`
`intruder n. An unauthorized user or unauthorized pro-
`gram, generally considered to have malicious intent, on a
`computer or computer network. See also bacterium,
`cracker, Trojan horse, virus.
`
`intruder attack 11. A form of hacker attack in which the
`hacker enters the system without prior knowledge or
`access to the system. The intruder will typically use a
`combination of probing tools and techniques to learn
`about the network to be hacked. Compare insider attack.
`intrusion countermeasure Electronics n. See ICE
`(definition 3).
`
`intrusion detection n. See IDS.
`
`intrusion-detection system n. See IDS.
`
`invalid adj. Erroneous or unrecognizable because of a
`flaw in reasoning or an error in input. Invalid results, for
`example, might occur if the logic in a program is faulty.
`Compare illegal.
`inverse video n. See reverse video.
`
`invert vb. 1. To reverse something or change it to its
`opposite. For example, to invert the colors on a mono-
`chrome display means to change light to dark and dark to
`light. See the illustration. 2. In a digital electrical signal, to
`replace a high level by a low level and vice versa. This
`type of operation is the electronic equivalent of a Boolean
`NOT operation.
`
`Inverted
`
`A N
`
`ormal
`
`Invert. An example showing the eflecrs of inverting the colors
`on a monochrome display.
`inverted file n. See inverted list.
`
`such as by making a clicking sound each time the key-
`board is pressed.
`
`interrupt priority 21. See interrupt.
`interrupt request line 11. A hardware line over which a
`device such as an input/output port, the keyboard, or a disk
`drive can send interrupts (requests for service) to the CPU.
`Interrupt request lines are built into the computer’s inter-
`nal hardware and are assigned different levels of priority
`so that the CPU can determine the sources and relative
`
`importance of incoming service requests. They are of con-
`cern mainly to programmers dealing with low-level opera-
`tions close to the hardware. Acronym: IRQ.
`
`interrupt vector n. A memory location that contains the
`address of the interrupt handler routine that is to be called
`when a specific interrupt occurs. See also interrupt.
`
`interrupt vector table n. See dispatch table.
`
`intersect n. An operator in relational algebra, used in
`database management. Given two relations (tables), A and
`B, that have corresponding fields (columns) containing the
`same types of values (that is, they are union-compatible),
`then INTERSECT A, B builds a third relation containing
`only those tuples (rows) that appear in both A and B. See
`also tuple.
`
`interstitial n. An Internet ad format that appears in a pop-
`up window between Web pages. Interstitial ads download
`completely before appearing, usually while a Web page
`the user has chosen is loading. Because interstitial pop—up
`windows don’t appear until the entire ad has downloaded,
`they often use animated graphics, audio, and other atten-
`tion-getting multimedia technology that require longer
`download time.
`
`in the wild adj. Currently affecting the computing public,
`particularly in regard to computer viruses. A virus that is
`not yet contained or controlled by antivirus software or
`that keeps reappearing despite virus detection measures is
`considered to be in the wild. See also virus.
`
`intranet n. A private network based on Internet protocols
`such as TCP/IP but designed for information management
`within a company or organization, Its uses include such
`services as document distribution, software distribution,
`access to databases, and training. An intranet is so called
`because it looks like a World Wide Web site and is based
`on the same technologies, yet is strictly internal to the
`organization and is not connected to the Internet proper.
`Some intranets also offer access to the Internet, but such
`
`286
`
`

`
`Net surfing
`
`Network Control Protocol
`
`Net surfing n. The practice of exploring the Internet
`without a specific goal in mind. The concept of Net surf-
`ing is similar to (and probably derived from) “channel
`surfing” in reference to watching television.
`Net TV 11. See Internet television.
`
`Netware n. A family of LAN (local area network) operat-
`ing system products developed by Novell, Inc. Designed
`to run on PCs and Macintoshes, Novell NetWare allows
`users to share files and system resources such as hard
`disks and printers. See also network operating system.
`
`network 11. A group of computers and associated devices
`that are connected by communications facilities. A network
`can involve permanent connections, such as cables, or tem-
`porary connections made through telephone or other com-
`munication links. A network can be as small as a LAN
`(local area network) consisting of a few computers, printers,
`and other devices, or it can consist of many small and large
`computers distributed over a vast geographic area (WAN, or
`wide area network). See also ALOHAnet, Ethernet (defini-
`tion I), LAN, WAN.
`
`Network Access Point n. One of the interchange points
`for Internet traffic, where various Internet network carriers
`and major ISPs exchange data. When Internet traffic origi-
`nates on one network and goes to another network, it
`almost always passes through at least one Network Access
`Point, or NAP. In the United States, major NAPS include
`MAE East, in Vienna, Virginia, and MAE West, in San
`Jose, California (both operated by MCI WorldCom); the
`Chicago NAP (operated by Ameritech); the Pacific Bell
`NAP (with multiple locations in California); the Digital
`Internet Exchange in Palo Alto, California (operated by
`Digital/Compaq); and the Sprint NAP in Pennsauken,
`New Jersey. Additional local and regional exchange points
`are located in many other locations around the world.
`Acronym: NAP. Also called: National Attachment Point.
`
`network adapter 12. See network interface card.
`Network Address Translation n. See NAT.
`
`network administrator n. The person in charge of oper-
`ations on a computer network. The duties of a network
`administrator can be broad and might include such tasks
`as installing new workstations and other devices, adding
`and removing individuals from the list of authorized users,
`archiving files, overseeing password protection and other
`security measures, monitoring usage of shared resources,
`and handling malfunctioning equipment. See also system
`administrator.
`
`network architecture 11. The underlying structure of a
`
`computer network, including hardware, functional layers,
`interfaces, and protocols, used to establish communication
`and ensure the reliable transfer of information. Network
`architectures are designed to provide both philosophical
`
`and physical standards for the complexities of establishing
`communications links and transferring information with-
`
`out conflict. Various network architectures exist, including
`the internationally accepted seven-layer ISO Open Sys-
`tems Interconnection (OSI) model and IBM’s Systems
`Network Architecture (SNA). See also ISO/OSI reference
`model, SNA.
`
`Network-Attached Storage :1. See NAS.
`network boot :7. See PXE boot.
`
`network card It. See network interface card.
`
`network-centric computing 22. A computing environ-
`ment in which a network server or servers represent the
`hub of activity. Considered the “third wave” in large—sys-
`tem computing after mainframe and desktop develop-
`ments, network-centric computing establishes servers as
`the main source of computing power, to give users direct
`access to network-based applications and information. In
`network-centric computing systems, applications are not
`preinstalled or uninstalled locally, that is, on the desktop;
`they are accessed on an as-needed, “on-the-fly” basis.
`Thus, individual desktop computers do not have to main-
`tain large amounts of disk storage or load and manage
`application programs. See also server.
`
`network computer n. A computer designed for use on a
`network in which programs and storage are provided by
`servers». Network computers, unlike dumb terminals, have
`their own processing power, but their design does not
`include local storage and they depend on network servers
`for applications. Acronym: NC.
`
`network congestion 11. See congestion.
`network connection It. See Ethernet.
`
`network control program 11.. In a communications net-
`work that includes a mainframe computer, a program that
`usually resides in a communications controller and takes
`over communications tasks such as routing, error control,
`line control, and polling (checking terminals for transmis-
`sions), leaving the main computer free for other functions.
`See also communications controller.
`
`Network Control Protocol 12. See Point-to-Point Protocol.
`
`362

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket