throbber
ai)
`Ab
`
`SSONTNN oad
`DIKEINOIN AUST
`
`PES‘SONY002145hiAND( M HOUSE
`WEBSTERSaeWN
`
`Page 00001
`
`Philip E. Margolis
`Creator of www.pcwebopaedia.com
`
`(cid:36)(cid:83)(cid:83)(cid:79)(cid:72)(cid:3)(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:20)(cid:19)(cid:21)(cid:27)(cid:3)
`Apple Exhibit 1028
`(cid:36)(cid:83)(cid:83)(cid:79)(cid:72)(cid:3)(cid:89)(cid:17)(cid:3)(cid:38)(cid:82)(cid:85)(cid:72)(cid:3)(cid:58)(cid:76)(cid:85)(cid:72)(cid:79)(cid:72)(cid:86)(cid:86)(cid:3)
`Apple v. Core Wireless
`(cid:44)(cid:51)(cid:53)(cid:21)(cid:19)(cid:20)(cid:24)(cid:16)(cid:19)(cid:20)(cid:27)(cid:28)(cid:27)(cid:3)
`IPR2015-01898
`(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:19)(cid:19)(cid:19)(cid:19)(cid:20)
`
`

`

`76.15
`.M37
`1999
`C.2
`
`Margolis, Philip E.
`
`Random House Webster's
`computer & internet dictionary
`3rd. Edtion
`
`
`
`
`
`
`
`
`
`
`(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:19)(cid:19)(cid:19)(cid:19)(cid:21)
`Page 00002
`
`

`

`LL UM FUILLEN
`INTERNET
`ICTIONARY
`
`Third Edition
`
`Philip E. Margolis
`
`Random House
`NewYork
`
`(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:19)(cid:19)(cid:19)(cid:19)(cid:22)
`Page 00003
`
`

`

`Random House Webster’s Computer & Internet Dictionary, Third Edition
`Copyright © 1999 by Philip E. Margolis
`All rights reserved under International and Pan-American Copyright Conventions.
`Nopart of this book may be reproduced in any form or by any means,electronic
`or mechanical, including photocopying, without the written permission of the pub-
`lisher. All inquiries should be addressed to Random House Reference & Information
`Publishing, Random House, Inc., 201 East 50th Street, New York, NY 10022-7703.
`Published in the United States by Random House, Inc., New York and simultane-
`ously in Canada by Random House of Canada Limited.
`The Random HouseLiving Dictionary Database™, is a trademark of Random
`House, Inc.
`
`Trademarks
`A numberof entered words which we have reason to believe constitute trademarks
`have been designated as such. However, no attempt has been made to designate as
`trademarksor service marks all terms or words in which proprietary rights might
`exist. The inclusion, exclusion, or definition of a words or term is not intended to
`affect, or to express a judgmenton,the validity or legal status of the word or term
`as a trademark, service mark, or other proprietary term.
`This book is available for special purchases in bulk by organizations andinstitu-
`tions, not for resale, at special discounts. Please direct your inquiries to the
`Random HouseSpecial Sales Department,toll-free 888-591-1200 or fax 212-572-
`4961.
`
`Please address inquiries about electronic licensing of reference products, for use on
`a network or in software or on CD-ROM,to the Subsidiary Rights Department,
`Random House Reference & Information Publishing, fax 212-940-7370.
`Library of Congress Cataloging-in-Publication Data
`Margolis, Philip E.
`
`Random House Webster’s computer & internet dictionary / Philip E.
`Margolis.
`-- 3rd ed.
`p.
`cm.
`Rev. ed. of: Random House personal computer dictionary. 2nd ed.
`c1996,
`|
`Includes biographical references and index.
`ISBN 0-375-70351-9
`2. Computers--Dictionaries.
`1, Microcomputers—Dictionaries.
`I. Margolis, Philip E. Random House personal computer dictionary.
`Il. Title.
`QA76.15.M37
`004.16°03--dc21
`
`1998
`
`98-45280
`CIP
`
`www.randomwords,com
`
`Typeset and printed in the United States of America.
`
`1999 Third Random House Edition
`
`09876543
`January 2000
`
`ISBN: 0-375-70351-9
`
`New York
`
`Toronto
`
`London
`
`Sydney Auckland
`
`(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:19)(cid:19)(cid:19)(cid:19)(cid:23)
`Page 00004
`
`

`

`24
`AppleTalk
`eS
`
`AppleTalk An inexpensive local-area network (LAN) architecture built into
`all Apple Macintosh computers and laser printers. AppleTalk supports
`Apple’s LocalTalk cabling scheme, as well as Ethernet and IBM Token
`Ring. It can connect Macintosh computers and printers, and even PCs if
`they are equipped with special AppleTalk hardware and software.
`
`= See also LOCAL-AREA NETWORK; LOCALTALK; MACINTOSH COMPUTER; TOPOL-~
`OGY.
`
`application A program or group of programs designed for end users. Soft-
`ware can be divided into two general classes: systems software and appli-
`cations software. Systems software consists of low-level programs that in-
`teract with the computer at a very basic level. This includes operating
`systems, compilers, and utilities for managing computer resources.
`In contrast, applications software (also called end-user programs) in-
`cludes database programs, word processors, and spreadsheets. Figura-
`tively speaking, applications software sits on top of systems software be-
`cause it is unable to run without the operating system and system
`utilities.
`
`= See also APPLET; APPLICATION SHARING; DATABASE MANAGEMENT SYSTEM; END
`user; IDE; LEGACY APPLICATION; OPERATING SYSTEM; SOFTWARE, SOFTWARE LICENS-
`ING; SPREADSHEET; SYSTEMS SOFTWARE; UTILITY; WORD PROCESSOR.
`
`Word
`Processing
`
`Graphics
`
`Databases
`
`Applications Software
`
` Spreadsheets
`
`
` Communications
`
`
` Assembler
`Debugger
`
`
`
`System
`
`
`
`
`
`File Mgmt Tools
`
`Operating
`
`Systems Software
`
`Computer Hardware
`
`
`
`
`
`
`
`Figure 5: applications software and systems software
`
`Page 00005
`(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:19)(cid:19)(cid:19)(cid:19)(cid:24)
`
`

`

`230
`FTS file
`
`
`FTS file A hidden index file ending in a_.FTS [f(ull)-t(ext) s(earch)] exten-
`sion used by the Windows 95 and NT Help system. Thefirst time you se-
`lect the Find tab in a Windowshelpfile, the system displays a dialog box
`asking what type of index you wantto create. After you make a selec-
`tion, the system creates an index andstores it in an FTSfile.
`You can delete an FTSfile without harming your system. The help sys-
`tem will recreate the file next time it’s needed.
`
`=> See also EXTENSION; GID FILE; HELP.
`
`full duplex Refers to the transmission of data in two directions simulitane-
`ously. For example, a telephone is a full-duplex device because both par-
`ties can talk at once. In contrast, a walkie-talkie is a half-duplex device
`because only one party can transmit at a time.
`Most modemshavea switch that lets you choose between full-duplex
`and half-duplex modes. The choice depends on which communications
`program you are running.
`In full-duplex mode, data you transmit does not appear on your screen
`until it has been received and sent back by the other party. This enables
`you to validate that the data has been accurately transmitted. If your dis-
`play screen shows two of each character, it probably means that your
`modem is set to half-duplex mode when it should be in full-duplex mode.
`
`=> See also COMMUNICATIONS; HALF DUPLEX; MODEM; SIMPLEX.
`
`full-length See under ExPANsion BoaRD and expansion slot.
`
`function 1. In programming, a named section of a program that performs a
`specific task. In this sense, a function is a type of procedure or routine.
`Some programming languages makea distinction between a function,
`which returns a value, and a procedure, which performs some operation
`but does not return a value.
`Most programming languages come with a prewritten set of functions
`that are kept in a library. You can also write your own functions to per-
`form specialized tasks. 2. The term function is also used synonymously
`with operation and command. For example, you execute the delete furnc-
`tion to erase a word.
`
`=> See also COMMAND; LIBRARY; PROCEDURE; PROGRAM; ROUTINE.
`
`functional spec Short for functional specification.
`
`functional specification A formal description of a software system thatis
`used as a blueprint for implementing the program. At minimum, a func-
`tional specification should precisely state the purpose (e.g., the function)
`of the software. Depending on the software engineering methodology
`used, the functional specification might also provide implementation de-
`tails, such as how the project is divided into modules and howthediffer-
`ent modules interact. In addition, a functional specification often de-
`scribes the software from the user’s perspective—how the user interface
`appears and how a user would use the program to perform specific func-
`
`(cid:51)(cid:68)(cid:74)(cid:72)(cid:3)(cid:19)(cid:19)(cid:19)(cid:19)(cid:25)
`Page 00006
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket