`
`WI LEY
`
`Wiley Publishing, Inc.
`
`Exhibit 2004
`ServiceNow v. HP
`
`|PR2015-00699
`
`COMPUTER
`
`DICTIONARY
`
`10TH EDITION
`
`
`
`
`
`
`
`Webster’s New World"' Computer Dictionary, 10th Edition
`
`Copyright © 2003 by Wiley Publishing, Inc., Indianapolis, Indiana
`
`Published by Wfley Publishing, Inc., Indianapolis, Indiana
`Published simultaneously in Canada
`
`N0 part of this publication may be reproduced, stored in a retrieval system or transmitted
`in any form or by any means, electronic, mechanical, photocopying, recording, scanning
`or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States
`Copyright Act, without either the prior written permission of the Publisher, or authoriza-
`tion through payment of the appropriate per—copy fee to the Copyright Clearance
`Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700.
`Requests to the Publisher for permission should be addressed to the Legal Department,
`Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447,
`fax (317) 572-4447, E-mail: permcoordinator@wiley.com.
`
`Trademarks:Wiley, the Wiley Publishing logo,Webster’s New \X/orld, and the Webster’s
`New World logo are trademarks or registered trademarks of'\X/iley Publishing, Inc., in the
`United States and other countries, and may not be used without written permission.All
`other trademarks are the property of their respective owners.\X/iley Publishing, Inc., is not
`associated with any product or vendor mentioned in this book.
`
`Limit of Liability/Disclaimer ofWarranty:While the publisher and author have used their
`best efforts in preparing this book, they make no representations or warranties with
`respect to the accuracy or completeness of the contents of this book and specifically dis-
`claim any implied warranties of merchantability or fitness for a particular purpose. No
`warranty may be created or extended by sales representatives or Written sales materials.
`The advice and strategies contained herein may not be suitable for your situation.You
`should consult with a professional where appropriate. Neither the publisher nor author
`shall be liable for any loss of profit or any other commercial damages, including but not
`limited to special, incidental, consequential, or other damages.
`
`For general information on our other products and services or to obtain technical support
`please contact our Customer Care Department within the U.S. at 800-762-2974, outside
`the U.S. at 317-572-3993 or fax 317-572-4002.
`
`Wiley also publishes its books in a variety of electronic formats. Some content that
`appears in print may not be available in electronic books.
`
`
`
`Library of Congress Cataloging-in-Publication Data is available from the publisher.
`ISBN 0—7645—2478—X
`
`l\/Ianufactured in the United States of America
`
`5432
`
`
`
`
`
`
`
`353
`
`stack
`
`
`
`SSL Acronym for Secure Sockets Layer.
`An Internet security standard that is widely
`supported by leading Web browsers and
`Web servers. Unlike its chief competi-
`tion, S—HTTP, SSL is
`application~in—
`dependent—-it works with all
`Internet
`tools, not
`just
`the World Wide Web
`This is because SSL functions at
`the network layer rather than the applica-
`tion layer and is
`thus available to any
`SSL—ready Internet application, including
`newsreaders. Applications that use SSL use
`RSA public key encryption and RSA cer-
`tificates and digital signatures to establish
`the identities of parties to the transaction;
`after the link is established, a key exchange
`takes place, and RSA’s RC4 encryption
`technology (a symmetric key encryption
`algorithm) is used to secure the transaction.
`With the 128-bit keys used for SSL com-
`munication within the United States, the
`
`sequel.)
`pronounced
`SQL (Often
`Acronym for Structured Query Language.
`In database management systems, an IBM-
`developed query language that has become
`the de facto standard for querying databases
`in a client/server network. The four basic
`cornrnands (SELECT, UPDATE, DELETE,
`and INSERT) correspond to the four basic
`functions of data manipulation (data
`retrieval, data modification, data deletion,
`and data insertion,
`respectively). SQL
`queries approximate the structure of an
`English natural—language query. A data table
`consisting of columns (corresponding to
`data fields) and rows (corresponding to data
`records) displays a que1y’s results. See data-
`base management system (DBMS), ODBC,
`query, query language.
`
`squelch In a network, to suspend or can-
`cel a problem user’s access privileges. A
`network might squelch such privileges after
`a user repeatedly violates the terms under
`which the account was created.
`
`SRAM Acronym for static random access
`memory.A type of random access memory
`(RAM) chip that holds its contents without
`constant refreshing from the central pro-
`cessing unit (CPU). Although as volatile as
`dynamic random access memory (DRAM)
`chips, SRAM does not require the CPU to
`refresh its contents several hundred times
`
`per second. These chips are substantially
`faster but also are significantly more expen-
`sive than DRAM chips and, therefore, are
`most often used for RAM caches. Two
`
`types of SRAM are available: asynchronous
`and synchronous. Unlike asynchronous
`SRAM, synchronous SRAM is significantly
`faster because it is capable of synchronizing
`with the microprocessor’s clock speed,
`enabling it to perform operations that are
`timed by the system clock;. See cache memo-
`ry, DRAM, SDRAM.
`
`S register A special unit of memory
`inside a modem that contains alterations to
`the AT command set, such as the number of
`rings to wait before answering a call or the
`time to wait for the carrier to be established.
`
`encrypted transaction would be computa-
`tionally infeasible to decode, so it is safe
`from snoopers and criminals. (The 40-bit
`version used in export versions of popular
`browsers, however, is not secure and should
`be avoided for commercial transactions.)
`
`ST-506/ST—412 A hard disk interface
`
`standard once widely used in IBM and
`IBM-compatible computers. These drives,
`virtually unavailable today, are slower and
`cheaper than drives that use more recent
`interface standards, such as Enhanced
`System Device Interface (ESDI), Integrated
`Drive Electronics
`(IDE),
`and Small
`Computer System Interface (SCSI). The
`ST—506/ST—4l2 interface uses the Modified
`Frequency Modulation (MFM) and Run-
`Length Limited (RLL) standards.
`
`stack In programming, a data structure in
`which the first items inserted are the last
`
`ones removed. Programs that use control
`structures use the Last In First Out (LIFO)
`data structure.A stack enables the computer
`to track what
`it was doing when it
`branched or jumped to a procedure. In
`I-IyperCard, the term refers to a file that
`contains one or more cards that share a
`common background.
`
`
`
`SSE See streaming S11’/ID extensions