`ILLUST
`TED
`DICTIONARY OF
`COMPUTING
`
`THIRD EDITION
`
`JONAR C. NADER
`
`PRENTICE HALL
`
`SYDNEY NEW YORK TORONTO MEXICO NEW DELHI
`LONDON TOKYO SINGAPORE RIO DE JANEIRO
`
`1
`
`Apple v. Realtime
`Proceeding No. IPR2016-01737
`APPLE 1035
`
`
`
`© 1998 by JonarC. Nader
`
`All rights reserved. No part of this publication or CD-ROM may be
`reproduced, stored in a retrieval system, or transmitted in any form or
`by any means, electronic, mechanical, photocopying, recording, or
`otherwise, without written permission of the publisher.
`
`This book (and CD-ROM) is sold without warranty of any kind,
`either expressed or implied, in respect to the contents of this book,
`including but not limited to implied waITanties for the book's quality,
`accuracy, completeness, pe1formance, merchantability, or fitness for
`any particular purpose.
`
`The liability of the author and Prentice Hall to any reseller in relation to
`this book or the software is limited to the cost of replacing the book or
`the cost of obtaining equivalent goods, whichever is the lower amount.
`
`All company names, product names, trademarks, and servicemarlcs
`are used in this book for identification only. All such names, trade(cid:173)
`marks and servicemarks remain the property, and within the
`copyright, of their respective organizations.
`
`12345 99 98
`
`National Library of Australia
`Cataloguing-in-Publication Data
`
`Nader, Jonar C.
`Prentice Hall's illustrated dictionary of computing.
`
`3rd ed.
`ISBN 0 13 095104 8.
`
`1. Computers - Dictionaries. 2. Electronic data processsing -
`Dictionaries. I. Title. II. Title: Illustrated dictionary of
`computing
`
`004.03
`
`Prentice Hall of Australia Pty Ltd, Sydney
`Prentice Hall, Inc., Upper Saddle River, New Jersey
`Prentice Hall Canada, Inc., Toronto
`Prentice Hall Hispanoamericana, SA, Mexico
`Prentice Hall of India Private Ltd, New Delhi
`Prentice Hall International, Inc., London
`Prentice Hall of Japan, Inc., Tokyo
`Simon & Schuster (Asia) Ptc Ltd
`Editora Prentice Hall do Brasil Ltda, Rio de .Janeiro
`
`II PRENTICE HALL
`=
`
`A division of Simon & Schuster
`
`Give i
`it WO
`'comF
`debab
`
`With
`corn pi
`secret.
`artists
`
`Every
`suspe
`becau
`back,
`telepr
`
`The c
`techrn
`comp
`
`If one
`easily
`longe
`dese11
`Simul
`
`As fo
`the p
`
`In c01
`doze1
`enterl
`
`NOT
`
`TherE
`durin
`phon
`radio
`chear
`
`2
`
`
`
`
`
`direct Percentage function [1SO The
`function that directly calculates a per-
`centage markupor discount value.]
`dirty bit See write-through caching.
`discrete [ISO Pertaining to data that
`consist of distinct elements such as
`characters, or
`to physical quantities
`having distinctly recognizable values,}
`discrete data [ISO Data represented by
`characters.]
`
`discrete representation {iSO A repre-
`sentation of data by characters, each
`character or a group of characters de-
`signating one of a numberof alterna-
`tives.]
`
`Boolean value 0]
`
`disjunction —<g
`simple logic, direct mappedcaches are
`typically designed in discrete compo-
`
`nents to minimize system cost, See cache.
`
`direct memory access A methodof trans-
`
`ferring blocks of data directly between a
`
`mass-storage device and memory, with
`
`no intervention from the Processor. In
`orderto transfer data between non-stor-
`
`age devices (such as terminals) and
`
`memory, the Processor must intervene in
`the transfer of each byte. The direct
`
`memory access (DMA)interface is typi-
`cally
`incorporated into
`the
`device
`
`controller, When a DMA tead or write
`command is given by the Processor, the
`
`Processor loads infor-mation about the
`
`transfer into special registers in the de-
`
`vice controller, This information includes
`the number of bytes to be moved, the
`
`target location in memory, the target de-
`vice, and the location of the information
`
`on that device. After the special registers
`
`inthe device controller have been loaded,
`
`
`the device controller handles the memory
`
`transfer operation independently of the
`Processor, thus freeing the processorfor
`
`s. When the data transfer is
`In marketing and
`disintermediation
`complete, the device controller prepares
`
`economic terms, to lose one’s purpose in
`astatus message and interrupts the proc-
`alife cycle or value chain. For example,
`sor, The processor then reads the status
`those whosetask it was to deliver gas in
`
`Message to confirm that the transfer was
`bottles to consumers’ homes have dimin-
`‘ompleted successfully. [ISO A technique
`
`ished in number due to the widespread
`T moving data directly between main
`
`implementation of as pipes to homes.
`forage and peripheral equipment with-
`Those whoused to set type by handat
`
`utrequiring processing of the data by
`
`typesetting firms have also been taken
`© processing unit.]
`
`outof the value chain (disintermediated)
`dueto the introduction (intermediation)
`
`of desktop publishers. Compare inter.
`
`mediation and re-intermediation,
`
`
`disjunction [ISO The Boolean operation
`t last modified), and the size eachfile
`whoseresult has the Boolean value 0 if
`Ccupies on a disk. See file allocation
`
`and only if each operand has the
`
`
`
`
`
`
`Discretionary Access Controls A secu-
`rity protocol that can be applied by the
`owner of the data to control who has
`access to the data. Generally, DACs are
`granted on a need-to-know basis, Abbre-
`viation ‘DAC’.
`
`
`
`3
`
`