`
`TM
`
`■■
`
`▼i
`
`1
`
`rr^
`
`of
`
`r
`
`SIXTH EDITION
`
`The Best Computer Dictionary in Print
`
`Clear, complete, up-to-date
`
`Extensive Internet coverage
`
`More than 4,000 terms and acronyms
`
`Ex. 2004.001
`
`
`
`WEBSTER’S
`
`TM
`
`■-
`
`"^nn
`
`0
`COMPUTER
`
`r
`
`P
`
`SIXTH EDITION
`
`i®iis
`
`ijsm 'ma-j^spKm0mm
`
`K5i«
`
`'o§^
`
`i#®ia
`IP
`
`::ri<
`
`/ '
`
`i‘i
`W::
`^HSP
`Wssmmm
`
`By Bryan l^affenberger, Ph.D.
`
`Que
`
`Ex. 2004.002
`
`
`
`WeBster’s New World™
`Dictionary of Computer Terms, 6th Edition
`Copyright © 1997 by
`Simon & Schuster, Inc.
`All rights reserved
`including;the right of reproduction
`in whole or in part in any form
`Macmillan
`A Siihon &; Schhster Macrnihan,'Cornpany
`1633 Broadway
`New York, NY 10019-6785
`Macmillan PubUshing books may be purchased for business or
`sales promotional use. For information please write: Special
`Markets Department, Macmillan PubHshing USA,
`1633 Broadway, New York, NY 10019.
`A Webster’s New World™ Book
`MACMILEAN i#a registered tradefnark of Macmillan, Inc.
`WEBSTER’S NEWWOBiD DICTIONARY is a registered trade
`mark of Simon & Schuster, Inc.
`Library of Congress Catalog Card Number: 97-80220
`ISBN: 0-02-861890-4
`
`Manufactured in the United States of America
`97 8 99 00 1 02
`234567
`
`Ex. 2004.003
`
`
`
`182 event-^driven program
`See event-driven environment.
`event-driven program
`
`event handler In an event-driven environment, a block of pro
`gram code designed to handle the messages generated when a
`specific kind of event occurs, such as a mouse click.
`
`■'m
`
`Excel See Microsoft Excel.
`
`EXE In MS-DOS, a file-name extension that indicates that
`the file is an executable program. To run the program with DQS
`simply type the file name (but not the extension) and press
`Enter.
`
`executable file See executable program.
`
`executable program A program that is ready to run on a
`given computer. For a program to be executable, it first must be
`translated, usually by a compiler, into the machine language of a
`particular computer.
`
`execute To carry out the instructions in an algorithm or
`program.
`
`expand 1. In an outlining utility or a graphical file management
`utihty (such as the Windows Explorer), to reveal all the subordi
`nate entries below the selected outline heading or directory. In
`Explorer, for example, you can expand a directory quickly by
`double-clicking the directory icon—a folder. 2. In file compres
`sion, synonymous with decompress.
`
`accom-
`expandahibty The capabihty of a computer system to
`modate more memory, additional disk drives, or adapters. Com
`puters vary in their expandability. When shopping for a
`computer, consider systems configured the way that you want
`but with space for growth. Look for one or two empty drive
`hays, three to five empty expansion slots, and room for at least
`four times as much random access memory (EJiM) as comes
`installed.
`
`expanded memory In older IBM PCs and compatibles run-y
`rung MS-DOS, a method of using more than 640KB of random-
`memory (RAM). Expanded memory works by paging blocks;
`access
`of data into and out of a fixed location within conventional
`memory, creating the appearance of a larger memory (hut at
`sacrifice of overhead due to the processing operations).
`
`Ex. 2004.004
`
`
`
`m
`
`K Abbreviation for kilobyte (1024 bytes).
`
`K56plus One of two competing modulation protocols for
`56 Kbps modems.The K56plus standard is backed by Lucent
`and Rockwell; the competing x.2 standard is backed by U.S.
`Robotics. The two standards do not work together. A decision
`concerning the 56 Kbps modem standard wiU be made by the
`ITU-TSS.
`
`Kb Abbreviation for kilobit (1024 bits).
`
`Kbps See bits per second (bps).
`
`Kerberos An authentication system for computer networks
`developed at the Massachusetts Institute of Technology (MIT).
`Unlike server-based authentication systems, which provide only
`a single point of entry to the network, Kerberos enables admin
`istration and management of authentication at the network level.
`Passwords are encrypted to prevent interception en route.
`
`Kermit An asynchronous communications protocol that makes the
`error-free transmission of program files via the telephone system
`easier. Developed by Columbia University and placed in the
`pubhc domain, Kermit is used by academic institutions because,
`unlike XMODEM, Kermit can be implemented on mainframe
`systems that transmit 7 bits per byte. See communications protocol.
`
`kernel In an operating system, the core portions of the program
`that reside in memory and perform the most essential operating
`system tasks, such as handfing disk input and output operations
`and managing the internal memory.
`
`kerning The adjustment of space between certain pairs of
`characters, so that the characters print in an aesthetically pleasing
`manner.
`
`Kerr effect The tendency of polarized fight to shift its orien
`tation shghtly when reflected from a magnetized surface.
`Magneto-optical (MO) drives rely on the Kerr effect to read and
`write data.
`
`key 1. In cryptography, the procedure that is used to encipher
`the message so that it appears to be just so much nonsense. The
`
`I
`
`Ex. 2004.005
`
`