throbber
MICROSOFT PRESS°
`
`SECOND EDITION
`
` Petitioner Microsoft Corporation - Ex.1011, Cover
`
`BUSINESS, SCHOOL,
`LIBRARY, AND HOME
`
`"THE COMPREHENSIVE
`
`STANDARD FOR
`
`Petitioner Microsoft Corporation - Ex.1011, Cover
`
`

`

`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 1994 by Microsoft Press
`
`All rights reserved. No part of the contents of this book may be reproduced or
`transmitted in any form or by any means without the written permission ofthe publisher.
`
`Library of Congress Cataloging-in-Publication Data
`
`Microsoft Press computer dictionary : the comprehensive standard for -
`business, school, library, and home/ Microsoft Press. -- 2nd ed.
`p.
`cm.
`ISBN 1-55615-597-2
`2. Microcomputers--Dictionaries.
`1. Computers--Dictionaries.
`I. Microsoft Press.
`IL. Title: Computerdictionary.
`QA76.15.M54
`1993
`004'.03--de20
`
`93-29868
`cIp
`
`Printed and boundin the United States of America.
`
`123456789 MLML 987654
`
`Distributed to the book trade in Canada by Macmillan of Canada,a division of Canada
`Publishing Corporation.
`Distributed to the book trade outside the United States and Canada by
`Penguin BooksLtd.
`
`Penguin Books Ltd., Harmondsworth, Middlesex, England
`Penguin Books Australia Ltd., Ringwood,Victoria, Australia
`Penguin Books N.Z.Ltd., 182-190 Wairau Road, Auckland 10, New Zealand
`
`British Cataloging-in-Publication Data available.
`
`Project Editor: Casey D. Doyle
`Manuscript Editor: Alice Copp Smith
`Technical Editors: Mary DeJong,Jeff Carey, Dail Magee,Jr., Jim Fuchs, Seth McEvoy
`
`Petitioner Microsoft Corporation - Ex. 1011, Cover 2
`Petitioner Microsoft Corporation - Ex. 1011, Cover 2
`
`

`

`CVAlclad 16 acornbio ‘93
`
`CONTRIBUTORS
`
`JoAnne Woodcock
`Senior Contributor
`
`Peter Aitken
`Andrew Himes
`Chris Kinata
`William. G. Madison
`Ross Nelson
`Wallace Parker
`
`Charles Petzold
`Phil Rose
`David Rygmyr
`Michael Vose
`Bruce Webster
`
`TECHNICAL REVIEWERS
`
`Robert Ackerman
`Steve Bostwick
`Keith Burgoyne
`Kaare Christian
`Ray Duncan
`
`James Johnson
`Chris Kinata
`Cary Lu
`M. David Stone
`John Viescas
`
`
`
`
`
`Petitioner Microsoft Corporation - Ex. 1011, Cover 3
`Petitioner Microsoft Corporation - Ex. 1011, Cover 3
`
`

`

`
`
`password protection The use of passwords as a
`1967-71 by Niklaus Wirth. Pascal, a compiled,
`meansof allowing only authorized users access
`structured language, built upon ALGOL, simpli-
`to a computer system orits files.
`fies syntax while adding data types and structures
`paste Toinsert text or a graphic that has been cut
`such as subranges, enumerated data types,files,
`or copied from one documentinto a different lo-
`records, and sets. Acceptance and use of Pascal
`cation in the sameor a different document. See
`exploded with Borland International’s introduc-
`also cut and paste.
`tion in 1984 of Turbo Pascal, a high-speed, low-
`patch In programming, to repair a deficiency in
`cost Pascal compiler for MS-DOS systemsthat has
`the functionality of an existing routine or pro-
`sold over a million copies in its various versions.
`gram, generally in response to an unforeseen
`Even so, Pascal appears to be losing groundto C as
`neéd or set of operating circumstances. Patching
`a standard development language on microcom-
`does not necessarily imply sloppiness in imple-
`puters, See also ALGOL,C, compiled language.
`menting a solution to a problem: Patching is a
`pass In programming, the carrying out of one com-
`common meansof adding a feature or a function
`plete sequence of events—for example, one pass
`to an existing version of a program until the next
`through a program loop (“WHILExis less than
`version of the software, which presumably will
`10, DO this”) or one scan of a program by a com-
`have that feature or function included in its de-
`piler or an assembler (in preparation for convert-
`sign, is released. Compare hack, kludge.
`ing program instructions to a form the computer
`path A route from one point to another. In com-
`can carry out).
`munications, a path is a link between two nodes
`In another sense, to forward a piece of data
`(stations) in a network. In other contexts, a path
`from one part of a program to another. See also
`is a route througha structured collection of in-
`pass by address, pass by value.
`formation, as in a database, a program, orfiles
`pass by address Also called pass by reference. A
`stored on disk. In a database, for example, a path
`means of passing an argument or parameter to a
`is the selection of branches and nodesto betra-
`subroutine. The calling routine passes the ad-
`versed in a tree structure in order to progress
`dress (memory location) of the parameter to the
`from the root nodeofthetree to any other node,
`called routine, which can then use that address to
`In programming,a path is the sequenceofin-
`retrieve or modify the value of the parameter.
`structions a computer carries out in executing a
`Compare pass by value; see also argument,call.
`routine. In information processing, such as the
`pass by reference See pass by address.
`theory underlying expert (deductive) systems, a
`pass by value A meansof passing an argumentor
`pathis a logical course through the “branches” of
`a parameter to a subroutine. A copy of the value
`a tree of inferences (this AND that, this OR that)
`of the argument is created and passed to the
`- leading to a conclusion.
`called routine. When this method is used, the
`In file storage, a path is the route followed by
`called routine can modify the copy of the argu-
`the operating system in finding, storing, and re-
`mentbut it cannot modify the original argument.
`trieving files on a disk. On the Apple Macintosh,
`Compare pass by address; see also argument,call.
`for example, the operating system follows routes
`passwordAsecurity measure usedto restrict ac-
`called access paths, each identified internally by
`cess to computer systems and sensitive files. A
`a unique number, whenever it reads from or
`password is a unique string of characters that a
`writes to an openfile. In hierarchical file systems,
`user types in as an identification code. The sys-
`such as that used by the MS-DOS operating sys-
`tem compares the code againsta storedlist of au-
`tem, a path is the course leading from the root
`thorized passwords and users.
`If the code is
`directory of a drive, such as‘C, to a particular file,
`legitimate, the system allows the user access, at
`the path can include any number of named
`whatever security. level has been approved for
`subdirectories up to the maximum length of the
`the ownerof the password.
`
`
`293
`
`
`
`Petitioner Microsoft Corporation - Ex. 1011, p. 293
`Petitioner Microsoft Corporation - Ex. 1011, p. 293
`
`

`

`radio frequency
`
`button is a small circle that, when selected, has a
`smaller,filled circle inside it. Radio buttons are so
`named because their behavior mimics that of the
`buttons on a radio: Selecting one button dese-
`lects the previously selected button.
`
`Radio
`buttons
`
`=
`
`linage Attributes
`
`Width:
`
`Radio
`buttons
`
`Radio button.
`
`when the sorting is done using binary values,
`which simplifies comparisons(Is a given bit on or
`off?) and reduces the numberof lists (each pass
`producesat most twolists).
`rag Theirregularity along theleft or right ends of
`the lines on a printed page. Rag complements
`justification, in which one or both edges of the
`text (both, in the center example of the illustra-
`tion) form a straight vertical line. Word-processed
`letters and other documents are commonlyleft-
`justified, with ragged-right margins (as in the
`example on theleft). Ragged-left text is used
`infrequently—typically,
`in advertisements—for
`visual effect.
`
`justified
`
`Ragged right
`
`
`
`
`
`Rag.
`
`radio frequency Abbreviated RF. The portion of
`the electromagnetic spectrum with frequencies
`ragged left/right See rag.
`between 10 kilohertz and 3000 gigahertz. This
`RAM Pronounced “ram.” Acronym for random ac-
`corresponds to wavelengths between 30 kilome-
`cess memory. Semiconductor-based memory that
`ters and 1 millimeter.
`can be read and written by the microprocessor or
`radix The base of a number system—for ex-
`other hardware devices. The storage locations .
`ample, 2 in the binary system, 10 in the decimal
`can be accessed in any order. Note that the vari-
`system, 8 in the octal system, and 16in the hexa-
`ous types of ROM memory are capable of random
`decimal system. See also base.
`access. The term RAM, however, is generally un-
`radix point The period or other character that
`derstood to refer to volatile memory, which can
`separates the integer portion of a number from
`be written as well as read. Compare core,
`the fractional portion. In the decimal system, the
`EPROM,flash memory, PROM, ROM.
`.
`radix point is the decimal point, as in the number
`RAM card An add-in circuit board containing
`1.33.
`RAM memory and the interface logic necessary to
`radix sorting algorithm A sorting algorithm that
`decode memory addresses.
`sorts by grouping elements according to succes-
`RAM cartridge See memory cartridge.
`sive parts of their keys. A simple example is sort-
`RAM chip A semiconductor storage device. RAM
`ing a list of numbers in the range 0-999. First the
`chips can be either dynamic or static memory. See
`list is sorted by the 100’s digit into a set of Cup to)
`also dynamic RAM,static RAM.
`10 lists; then each list, one at a time, is sorted into
`RAMDAC Pronounced “ram-dack.” Acronym for
`a set of (up to) 10 lists based on the 10’s digit; and
`random access memory digital-to-analog con-
`finally, each of those lists is sorted by the 1’s
`verter. A chip built into some VGA and SVGA
`digit. This algorithm is usually most efficient
`
`
`329
`
`Petitioner Microsoft Corporation - Ex. 1011, p. 329
`Petitioner Microsoft Corporation - Ex. 1011, p. 329
`
`

`

`ROM BASIC
`
`node. Because of the closed loop, however, add-
`ing new nodes can be difficult. A ring network
`is diagrammed below. Compare bus network,
`star network; see also token passing, token ring
`
`network.
`
`
`
`RJ-11 connector See phone connector.
`RLL encoding See run-length limited encoding.
`robot Generally, a machine that can sense andre-
`act to input and cause changes in its surround-
`ings with some degree ofintelligence,
`ideally
`without human supervision. Robots are seldom
`humanlike in appearance, although they are of-
`ten designed to mimic human movements in car-
`rying out their work. Robots are commonly used
`in manufacturing, as in the construction of auto-
`mobiles and most computers. See also robotics.
`robotics The branch of engineering devoted to the
`creation and training of robots, Roboticists work
`within a wide range offields, such as mechanical
`and electronic engineering, cybernetics, bionics,
`andartificial intelligence, all toward the end of
`endowingtheir creations with as muchsensitiv-
`ity, independence,and flexibility as possible. See
`also artificial intelligence, bionics, cybernetics.
`robustness Soundness; the ability of a program
`to function, or to continue functioning well, in
`unexpected situations.
`roliback A return to a previous stable condition,
`as when the contents of a hard disk are restored
`from a backupafter a destructive hard disk error.
`RIP See raster image processor.
`ROM Rhymes with “bomb”; acronym for read-
`RISC Pronounced “risk”; acronym for reduced
`only memory. Semiconductor-based memory
`instruction set computing. A type of micropro-
`that containsinstructions or data that can be read
`cessor design that focuses on rapid and efficient
`but not modified. To create a ROM chip, the de-
`processingofa relatively small set of instructions.
`signer supplies a semiconductor manufacturer
`RISC design is based on the premise that most of
`with the instructions or data to be stored; the
`the instructions a computer decodes and executes
`manufacturer then produces one or more chips
`are simple. As a result, RISC architecture limits the
`containing those instructions or data. Because
`numberofinstructions that are built into the micro-
`creating ROM chips involves a manufacturing
`processor but optimizes each so it can be carried
`process,it is economically viable only if the ROM
`out very rapidly—usually within a single clock
`chips are produced in large quantities; experi-
`cycle. RISC chips thus execute simple instructions
`mental designs or
`small volumes are best
`faster than microprocessors designed to handle a
`handled using PROM or EPROM.In general us-
`much widerarray of instructions. They are, how-
`age, the term ROM often means any read-only
`ever, slower than general-purpose CISC (complex
`device, including PROM and EPROM. See also
`instruction set computing) chips when executing
`EEPROM, EPROM, PROM.
`complex instructions, which must be broken down
`roman An adjective describing a typeface or type
`into many machineinstructions before they can
`style in which the characters are upright. Com-
`becarried out by RISC microprocessors. Families
`pareitalic; see also font family.
`of RISC chips include Sun Microsystems’ SPARC,
`ROMBASICAversionof interpreted BASIC stored
`Motorola’s 88000, and Intel’s i860. Compare CISC,
`in ROM (read-only memory). Many early home
`see also architecture, scalar.
`IiA
`
`Ring network.
`
`342
`
`Petitioner Microsoft Corporation - Ex. 1011, p. 342
`Petitioner Microsoft Corporation - Ex. 1011, p. 342
`
`

`

`d edition has 'Camputers/General
`
`adapter With personal computers, especially those
`from IBM®or those that are IBM compatible, usually a
`printed circuit board (also called an interface card) that
`enables the computer to use a peripheral device for which it
`does not already have the necessary connections orcircuit
`boards. See the illustration. Adapters are often used to
`permit upgrading to new or different hardware. Most often,
`the term is encountered in video, as in Color/Graphics
`Adapter (CGA), Enhanced Graphics Adapter (EGA), and
`Definitions Plus. Each of the more than
`Video Graphics Array (VGA). Other common adapters
`5000 entries is written in clear, standard
`include game-controller hardware for joysticks, adapters
`for serial communications with devices such as modems,
`English. Most go beyond simple defini-
`tion to provide additional detail. You'll find
`adapters for parallel interfaces for devices such as printers,
`and adapters for other types of peripheral devices such as
`definitions for terms as basic to computing
`CD-ROM drives. Commonly, a single adapter card can
`as hard disk, boot, operating system, and
`have more than one adapter on it. For example, a single
`double-click, as well as more advanced terms
`adapter card can have bothaserial port and a parallel port.
`expert system, and virtual memory.
`
`Adapter
`
`See also port.
`
`$19.95
`U.S.A.
`£17.95
`tna
`$26.95
`Canada
`cacre aeca
`
`SECOND EBITION
`
`The Comprehensive Standard for Business, School, Library, and Home
`OEY
`
`PN Ceiprcernanises
`g Desktop Publis
`a Computer Industr
`
`¢ information needs of today’s microcomputeruser.
`tions in the microcomputer world, the
`is ideal fer
`the hundred
`sionals, Wide
`
`@ Graphics
`gw Electronics m Communications
`
`The MICROSOFT PRESS COMPUTER DICTIONARYwas written, reviewed, and edited by a distinguished te:
`and academic communi
`nputer industry and the bus
`S)monaaron
`: experience is drawn fromth
`
`Pronunciation Guides. Where appropriate,
`definitions include phonetic pronunciations
`that reflect industry usage—for example:
`GUL, pronounced “gooey.”
`
`such as object-orientedbrprogramming,fractal,
`
`Hlustrations. Drawings, photographs, and
`diagrams enhance manydefinitions.
`
`Cross-References. Entries are fully cross-
`referenced to provide supplementary infor-
`mation and invite further exploration.
`
`ISBN 1-55615-597-2
`
`90000
`
`781556 15597
`
`Reference
`
`Petitioner Microsoft Corporation - Ex. 1011, Back Cover
`Petitioner Microsoft Corporation - Ex. 1011, Back Cover
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket