`Ex. 1005 / Page 1 of 3
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Copyright © 1994 by International Business Machines Corporation. All rights
`reserved.Printed in the United States of America. Except as permitted under
`the United States Copyright Act of 1976, no part ofthis publication may be
`reproduced or distributed in any form or by any means, orstored in a data
`base or retrieval system, without the prior written permisssion of the pub-
`lisher.
`
`67890 DOC/DOC 9987
`
`ISBN 0-07-031488-8 (HC)
`ISBN 0-07-031489-6 (PBK)
`
`The sponsoring editor for this book was Daniel A. Gonneau and the
`production supervisor was Thomas G. Kowalczyk.
`
`Printed and bound by R. R. Donnelley & Sons Company.
`
`Tenth Edition (August 1993)
`This is a major revision of the 1BM Dictionary of Computing, SC20-1699-8,
`which is made obsolete by this edition. Changes are madeperiodically to the
`information provided herein.
`It is possible that this material may contain reference to, or information about,
`IBM products (machines and programs), programming, or services that are
`not announcedin your country. Such references or information must not be
`construed to mean that IBM intends to announce such IBM products, pro-
`gramming,or services in your country. Comments maybe addressed to IBM
`Corporation, Department E37/656, P. O. Box 12195, Research Triangle Park,
`NC 27709.
`
`International Edition
`
`Copyright © 1994 by International Business Machines Corporation. Exclusive
`rights by McGraw-Hill, Inc. for manufacture and export. This book cannot be
`re-exported from the countryto whichit is consigned by McGraw-Hill. The
`International Edition is not available in North America.
`
`Whenorderingthis title, use ISBN 0-07-113383-6.
`
`This bookis printed on acid-free paper.
`
`
`
`
`
`Limitation of Liability
`While the Editor and Publisher of this book have made reasonable efforts to
`ensure the accuracyandtimeliness of the information contained herein,nei-
`ther the Editor nor the Publisher shall have anyliability with respect to loss or
`damage caused or alleged to be caused by reliance on any information con-
`tained herein.
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1010 / Page 2 of 3
`
`Ex. 1010 / Page 2 of 3
`
`
`
`taining to the use of 24-bits per pixel direct red, green,
`blue RGB,
`in which there are 8 bits (256 levels) of
`red, 8 bits (256 levels) of green, and 8 bits (256
`levels) of blue, for a total of 256*256*256 or 16 777
`216 different combinations of red, green, and blue
`intensities.
`The number of different colored pixels
`that can then be simultaneously displayed is only
`limited by the number of pixels displayable from the
`frame buffer.
`(3) See also background color, direct
`color, pseudocolor.
`
`true complement Deprecated term for radix comple-
`ment.
`
`true run list Synonym for dispatch list.
`
`truncate (1) To terminate a computational process in
`accordance with some rule;
`for example,
`to end the
`evaluation of a powerseriesat a specified term. (A)
`(2) To remove the beginning or ending elements of a
`string.
`(3) To drop data that cannot be printed or dis-
`played in the line width specified or available. Con-
`trast with fold (3).
`(4) To shorten a field or statement
`to a specified length.
`
`truncated binary exponential backoff In a local area
`network, the algorithm used to schedule retransmission
`after a collision such that the retransmission is delayed
`by an amount of time derived from the slot time and
`the numberof attempts to retransmit.
`(T)
`
`truncation (1) The deletion or omission of a leading
`or ofa trailing portion of a String in accordance with
`specified criteria.
`(I)
`(A)
`(2) The termination of a
`computation process, before its final conclusion or
`natural termination, if any, in accordance with speci-
`fied rules.
`(I)
`(A)
`(3) Contrast with round.
`
`truncation error An error due totruncation. @ (A)
`trunk (1) In telephony,
`circuits
`that connect
`two
`switching systems, as opposed to connecting a cus-
`tomer line to a switching system.
`(2) A telephone
`channel between two central offices or
`switching
`devices that
`is used in providing a telephone con-
`nection between subscribers.
`(3) See
`tie
`trunk.
`(4) See also line, link, path, route.
`
`trunk cable (1) A cable connecting trunk coupling
`units
`for
`the purpose of allowing communication
`among data stations.
`(T)
`(2) In an ESCONenvi-
`fonment, a cable consisting of multiple fiber pairs that
`do not directly attach to an active device. This cable
`usually exists between distribution panels and can be
`located within, or external
`to, a building. Contrast
`with jumpercable.
`
`inserting the station into the network or having it
`bypassed.
`(T)
`
`trunk exchange An exchange devoted primarily to
`interconnecting trunks.
`
`trunk group Those trunks between two points, both
`of which are switching centers,
`individual message
`distribution points, or both, and that use the same mul-
`tiplex terminal equipments.
`
`trunk hunting A method of switching incomingcalls
`to the next consecutive or next available numberif the
`first called numberis busy.
`
`trunk line A telecommunication line that
`private telecommunication system to a public switched
`network.
`
`trusted computer system In computer
`system that employs sufficient hardware and software
`data integrity measures to allow simultaneous proc-
`essing of a range of sensitive or classified information.
`
`trusted computing base (TCB) In computer security,
`all of the protection mechanisms within a computer
`system,
`including hardware, software, and firmware,
`the combination of which enforces a security policy.
`It creates a basic protection environment and provides
`additional user services required for a trusted computer
`system.
`
`Trusted Computing System Evaluation Criteria In
`computer security, a standard of the U.S. Government
`for the evaluation of trusted computer systems. Syn-
`onymous with Orange Book.
`
`trusted path In computer security, a mechanism by
`which a person at a terminal can communicate directly
`with the trusted computing base. This mechanism can
`be activated only by the person or the trusted com-
`puting base and cannot be imitated by untrusted soft-
`ware.
`
`trusted software In computer security,
`portion of a trusted computing base.
`
`truth table (1) An operation table for a logic opera-
`tion. (I)
`(A)
`(2) A table that describes a logic
`function by listing all possible combinations of input
`values and indicating for each combination the output
`value. (A)
`
`the representation of the
`truth value In COBOL,
`result of the evaluation of a condition in terms of one
`of two values:
`true, false.
`
`trunk coupling unit A physical device that connects
`a data station to a trunk cable by means of a drop
`
`TS Transmission services.
`
`Ex. 1010 / Page 3 of 3
`
`Ex. 1010 / Page 3 of 3
`
`