`
`
`
`Google V. Simp1eAir
`
`
`
`
`
`PUBLISHED BY
`Microsoft Press
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 2002 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Control Number: 2002019714
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoftcom/mspress.
`Send comments to m.spz'nput@micr0saft.com.
`
`Active Desktop, Active Directory, ActiveMovie, ActiveStore, ActiveSync, ActiveX, Authenticode,
`BackOffice, BizTalk, ClearType, Direct3D, DirectAnimation, DirectDraw, Directlnput, DirectMusic,
`Di1‘ectPlay, DirectShow, DirectSound, DirectX, Entourage, FoxPro, FrontPage, Hotmail, IntelliEye,
`lntelliMouse, IntelliSense, JScript, MapPoint, Microsoft, Microsoft Press, Mobile Explorer, MS-DOS,
`MSN, Music Central, NetMeeting, Outlook, PhotoDraw, PowerPoint, SharePoint, UltimateTV, Visio,
`Visual Basic, Visual C++, Visual FoxPro, Visual InterDev, Visual J++, Visual SourceSafe, Visual Studio,
`Win32, Win32s, Windows, Windows Media, Windows NT, Xbox are either registered trademarks or
`trademarks of Microsoft Corporation in the United States and/or other countries. Other product and
`
`company names mentioned herein ‘may be the trademarks of their respective owners.
`
`The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
`and events depicted herein are fictitious. No association with any real company, organization, product,
`domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
`
`Acquisitions Editor: Alex Blanton
`Project Editor: Sandra Haynes
`
`Body Part No. X08—4l929
`
`
`
`internal font
`
`internal font n. A font that is already loaded in a printer’s
`memory (ROM) when the printer is shipped. Compare
`downloadable font, font cartridge.
`
`internal interrupt n. An interrupt generated by the pro-
`cessor itself in response to certain predefined situations,
`such as an attempt to divide by zero or an arithmetic value
`exceeding the number of bits allowed for it. See also inter-
`rupt. Compare external interrupt.
`internal memory 11. See primary storage.
`
`internal modem n. A modem constructed on an expan-
`sion card to be installed in one of the expansion slots inside
`a computer. Compare external modem, integral modem.
`internal schema n. A view of information about the
`physical files composing a database, including file names,
`file locations, accessing methodology, and actual or poten-
`tial data derivations, in a database model such as that
`described by ANSI/X3/SPARC, that supports a three-
`schema architecture. The internal schema corresponds to
`the schema in systems based on CODASYL/DBTG. In a
`distributed database, there may be a different internal
`schema at each location. See also conceptual schema,
`schema.
`
`internal sort ll. 1. A sorting operation that takes place on
`files completely or largely held in memory rather than on
`disk during the process. 2. A sorting procedure that pro-
`duces sorted subgroups of records that will be subse-
`quently merged into one list.
`
`International Computer Security Association it. See
`ICSA.
`
`International Federation of Information
`Processing it. See IFIP.
`International Maritime Satellite n. See Inrnarsat.
`
`
`
`lntemet2
`
`Comité Consultatif International Télégraphique et Tele-
`phonique, a standards organization that became part of the
`International Telecommunication Union in 1992. See also
`CCITT, ITU-T.
`
`lnternaut I1. See cybernaut.
`
`internet n. Short for internetwork. A set of computer
`networks that may be dissimilar and are joined together by
`means of gateways that handle data transfer and conver-
`sion of messages from the sending networks’ protocols to
`those of the receiving network.
`
`Internet n. The worldwide collection of networks and
`gateways that use the TCP/IP suite of protocols to coinmu-
`nicate with one another. At the heart of the Internet is a
`backbone of high-speed data communication lines
`between major nodes or host computers, consisting of
`thousands of commercial, government, educational, and
`other computer systems, that route data and messages.
`One or more Internet nodes can go off line without endan-
`gering the Internet as a whole or causing communications
`on the Internet to stop, because no single computer or net-
`work controls it. The genesis of the Internet was a decen-
`tralized network called ARPANET created by the U.S.
`Department of Defense in 1969 to facilitate communica-
`tions in the event of a nuclear attack. Eventually other net-
`works, including BITNET, Usenet, UUCP, and NSFnet,
`were connected to ARPANET. Currently the Internet
`offers a range of services to users, such as FTP, e-mail, the
`World Wide Web, Usenet news, Gopher, IRC, telnet, and
`others. Also called: the Net. See also BITNET, FTP1 (def-
`inition l), Gopher, IRC, NSFnet, telnet‘, Usenet, UUCP,
`World Wide Web.
`
`lnternet2 n. A computer-network development project
`launched in 1996 by a collaborative group of I20 universi-
`ties under the auspices of the University Corporation for
`Advanced Internet Development (UCAID). The consor-
`tium is now being led by over 190 universities working
`with industry and government. The goal of Internet2,
`whose high-speed, fiberoptic backbone was brought on
`line in early 1999, is the development of advanced Internet
`technologies and applications for use in research and edu-
`cation at the university level. Though not open for public
`use, Internet2 and the technologies and applications devel-
`oped by its members are intended to eventually benefit
`users of the commercial Internet as well. Some of the new
`technologies Internet2 and its members are developing
`and testing include IPv6, multicasting, and quality of ser-
`vice (QOS). Internet2 and the Next Generation Internet
`
`International Mobile Telecommunications for the
`Year 2000 n. Specifications set forth by the International
`Telecommunications Union (ITU) to establish third-geneiu
`ation wireless telecommunication network architecture.
`The specifications include faster data transmission speeds
`and improved voice quality. Acroriym: IMT-2000.
`ggtgfirnational Organization for Standardization it. See
`I
`-
`.
`.
`.
`nternational Telecommunication Union n. See ITU.
`|
`.
`rriiefnational Telecommunication Union-Telecommu-
`ation Standardization Sector n. See ITU-T.
`I t
`.
`gotznational Telegraph and Telephone Consultative
`mlttee n. English-language form of the name for the
`
`
`
`281
`
`~*
`~-
`’“ -
`«
`»
`.<<*
`»
`»
`* W
`.A I% mmmmgq 2
`
`, mmmw;m.v.-.,,mwW,.,,,_wmAmv WWWW
`
`
`
`1
`
`interrupt priority I
`
`“
`
`I
`
`V inverted file
`
`connections are directed through a firewall that protects
`the internal network from the external Web. Compare
`extranet.
`
`intraware n. Groupware or middleware for use on a com-
`pany’s private intranet. Intraware packages typically con-
`tain e—mail, database, workflow, and browser applications_
`See also groupware, intranet, middleware.
`
`intrinsic font n. A font (type size and design) for which a
`bit image (an exact pattern) exists that can be used as is,
`without such modification as scaling. Compare derived font
`
`intruder n. An unauthorized user or unauthorized pro-
`gram, generally considered to have malicious intent, on a
`computer or computer network. See also bacterium,
`cracker, Trojan horse, virus.
`
`intruder attack 11. A form of hacker attack in which the
`hacker enters the system without prior knowledge or
`access to the system. The intruder will typically use a
`combination of probing tools and techniques to learn
`about the network to be hacked. Compare insider attack.
`intrusion countermeasure Electronics n. See ICE
`(definition 3).
`
`intrusion detection n. See IDS.
`
`intrusion-detection system n. See IDS.
`
`invalid adj. Erroneous or unrecognizable because of a
`flaw in reasoning or an error in input. Invalid results, for
`example, might occur if the logic in a program is faulty.
`Compare illegal.
`inverse video n. See reverse video.
`
`invert vb. 1. To reverse something or change it to its
`opposite. For example, to invert the colors on a mono-
`chrome display means to change light to dark and dark to
`light. See the illustration. 2. In a digital electrical signal, to
`replace a high level by a low level and vice versa. This
`type of operation is the electronic equivalent of a Boolean
`NOT operation.
`
`Inverted
`
`A N
`
`ormal
`
`Invert. An example showing the eflecrs of inverting the colors
`on a monochrome display.
`inverted file n. See inverted list.
`
`such as by making a clicking sound each time the key-
`board is pressed.
`
`interrupt priority 21. See interrupt.
`interrupt request line 11. A hardware line over which a
`device such as an input/output port, the keyboard, or a disk
`drive can send interrupts (requests for service) to the CPU.
`Interrupt request lines are built into the computer’s inter-
`nal hardware and are assigned different levels of priority
`so that the CPU can determine the sources and relative
`
`importance of incoming service requests. They are of con-
`cern mainly to programmers dealing with low-level opera-
`tions close to the hardware. Acronym: IRQ.
`
`interrupt vector n. A memory location that contains the
`address of the interrupt handler routine that is to be called
`when a specific interrupt occurs. See also interrupt.
`
`interrupt vector table n. See dispatch table.
`
`intersect n. An operator in relational algebra, used in
`database management. Given two relations (tables), A and
`B, that have corresponding fields (columns) containing the
`same types of values (that is, they are union-compatible),
`then INTERSECT A, B builds a third relation containing
`only those tuples (rows) that appear in both A and B. See
`also tuple.
`
`interstitial n. An Internet ad format that appears in a pop-
`up window between Web pages. Interstitial ads download
`completely before appearing, usually while a Web page
`the user has chosen is loading. Because interstitial pop—up
`windows don’t appear until the entire ad has downloaded,
`they often use animated graphics, audio, and other atten-
`tion-getting multimedia technology that require longer
`download time.
`
`in the wild adj. Currently affecting the computing public,
`particularly in regard to computer viruses. A virus that is
`not yet contained or controlled by antivirus software or
`that keeps reappearing despite virus detection measures is
`considered to be in the wild. See also virus.
`
`intranet n. A private network based on Internet protocols
`such as TCP/IP but designed for information management
`within a company or organization, Its uses include such
`services as document distribution, software distribution,
`access to databases, and training. An intranet is so called
`because it looks like a World Wide Web site and is based
`on the same technologies, yet is strictly internal to the
`organization and is not connected to the Internet proper.
`Some intranets also offer access to the Internet, but such
`
`286
`
`
`
`Net surfing
`
`Network Control Protocol
`
`Net surfing n. The practice of exploring the Internet
`without a specific goal in mind. The concept of Net surf-
`ing is similar to (and probably derived from) “channel
`surfing” in reference to watching television.
`Net TV 11. See Internet television.
`
`Netware n. A family of LAN (local area network) operat-
`ing system products developed by Novell, Inc. Designed
`to run on PCs and Macintoshes, Novell NetWare allows
`users to share files and system resources such as hard
`disks and printers. See also network operating system.
`
`network 11. A group of computers and associated devices
`that are connected by communications facilities. A network
`can involve permanent connections, such as cables, or tem-
`porary connections made through telephone or other com-
`munication links. A network can be as small as a LAN
`(local area network) consisting of a few computers, printers,
`and other devices, or it can consist of many small and large
`computers distributed over a vast geographic area (WAN, or
`wide area network). See also ALOHAnet, Ethernet (defini-
`tion I), LAN, WAN.
`
`Network Access Point n. One of the interchange points
`for Internet traffic, where various Internet network carriers
`and major ISPs exchange data. When Internet traffic origi-
`nates on one network and goes to another network, it
`almost always passes through at least one Network Access
`Point, or NAP. In the United States, major NAPS include
`MAE East, in Vienna, Virginia, and MAE West, in San
`Jose, California (both operated by MCI WorldCom); the
`Chicago NAP (operated by Ameritech); the Pacific Bell
`NAP (with multiple locations in California); the Digital
`Internet Exchange in Palo Alto, California (operated by
`Digital/Compaq); and the Sprint NAP in Pennsauken,
`New Jersey. Additional local and regional exchange points
`are located in many other locations around the world.
`Acronym: NAP. Also called: National Attachment Point.
`
`network adapter 12. See network interface card.
`Network Address Translation n. See NAT.
`
`network administrator n. The person in charge of oper-
`ations on a computer network. The duties of a network
`administrator can be broad and might include such tasks
`as installing new workstations and other devices, adding
`and removing individuals from the list of authorized users,
`archiving files, overseeing password protection and other
`security measures, monitoring usage of shared resources,
`and handling malfunctioning equipment. See also system
`administrator.
`
`network architecture 11. The underlying structure of a
`
`computer network, including hardware, functional layers,
`interfaces, and protocols, used to establish communication
`and ensure the reliable transfer of information. Network
`architectures are designed to provide both philosophical
`
`and physical standards for the complexities of establishing
`communications links and transferring information with-
`
`out conflict. Various network architectures exist, including
`the internationally accepted seven-layer ISO Open Sys-
`tems Interconnection (OSI) model and IBM’s Systems
`Network Architecture (SNA). See also ISO/OSI reference
`model, SNA.
`
`Network-Attached Storage :1. See NAS.
`network boot :7. See PXE boot.
`
`network card It. See network interface card.
`
`network-centric computing 22. A computing environ-
`ment in which a network server or servers represent the
`hub of activity. Considered the “third wave” in large—sys-
`tem computing after mainframe and desktop develop-
`ments, network-centric computing establishes servers as
`the main source of computing power, to give users direct
`access to network-based applications and information. In
`network-centric computing systems, applications are not
`preinstalled or uninstalled locally, that is, on the desktop;
`they are accessed on an as-needed, “on-the-fly” basis.
`Thus, individual desktop computers do not have to main-
`tain large amounts of disk storage or load and manage
`application programs. See also server.
`
`network computer n. A computer designed for use on a
`network in which programs and storage are provided by
`servers». Network computers, unlike dumb terminals, have
`their own processing power, but their design does not
`include local storage and they depend on network servers
`for applications. Acronym: NC.
`
`network congestion 11. See congestion.
`network connection It. See Ethernet.
`
`network control program 11.. In a communications net-
`work that includes a mainframe computer, a program that
`usually resides in a communications controller and takes
`over communications tasks such as routing, error control,
`line control, and polling (checking terminals for transmis-
`sions), leaving the main computer free for other functions.
`See also communications controller.
`
`Network Control Protocol 12. See Point-to-Point Protocol.
`
`362