`
`SECOND EDITION
`
` Petitioner Microsoft Corporation - Ex.1011, Cover
`
`BUSINESS, SCHOOL,
`LIBRARY, AND HOME
`
`"THE COMPREHENSIVE
`
`STANDARD FOR
`
`Petitioner Microsoft Corporation - Ex.1011, Cover
`
`
`
`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 1994 by Microsoft Press
`
`All rights reserved. No part of the contents of this book may be reproduced or
`transmitted in any form or by any means without the written permission ofthe publisher.
`
`Library of Congress Cataloging-in-Publication Data
`
`Microsoft Press computer dictionary : the comprehensive standard for -
`business, school, library, and home/ Microsoft Press. -- 2nd ed.
`p.
`cm.
`ISBN 1-55615-597-2
`2. Microcomputers--Dictionaries.
`1. Computers--Dictionaries.
`I. Microsoft Press.
`IL. Title: Computerdictionary.
`QA76.15.M54
`1993
`004'.03--de20
`
`93-29868
`cIp
`
`Printed and boundin the United States of America.
`
`123456789 MLML 987654
`
`Distributed to the book trade in Canada by Macmillan of Canada,a division of Canada
`Publishing Corporation.
`Distributed to the book trade outside the United States and Canada by
`Penguin BooksLtd.
`
`Penguin Books Ltd., Harmondsworth, Middlesex, England
`Penguin Books Australia Ltd., Ringwood,Victoria, Australia
`Penguin Books N.Z.Ltd., 182-190 Wairau Road, Auckland 10, New Zealand
`
`British Cataloging-in-Publication Data available.
`
`Project Editor: Casey D. Doyle
`Manuscript Editor: Alice Copp Smith
`Technical Editors: Mary DeJong,Jeff Carey, Dail Magee,Jr., Jim Fuchs, Seth McEvoy
`
`Petitioner Microsoft Corporation - Ex. 1011, Cover 2
`Petitioner Microsoft Corporation - Ex. 1011, Cover 2
`
`
`
`CVAlclad 16 acornbio ‘93
`
`CONTRIBUTORS
`
`JoAnne Woodcock
`Senior Contributor
`
`Peter Aitken
`Andrew Himes
`Chris Kinata
`William. G. Madison
`Ross Nelson
`Wallace Parker
`
`Charles Petzold
`Phil Rose
`David Rygmyr
`Michael Vose
`Bruce Webster
`
`TECHNICAL REVIEWERS
`
`Robert Ackerman
`Steve Bostwick
`Keith Burgoyne
`Kaare Christian
`Ray Duncan
`
`James Johnson
`Chris Kinata
`Cary Lu
`M. David Stone
`John Viescas
`
`
`
`
`
`Petitioner Microsoft Corporation - Ex. 1011, Cover 3
`Petitioner Microsoft Corporation - Ex. 1011, Cover 3
`
`
`
`
`
`password protection The use of passwords as a
`1967-71 by Niklaus Wirth. Pascal, a compiled,
`meansof allowing only authorized users access
`structured language, built upon ALGOL, simpli-
`to a computer system orits files.
`fies syntax while adding data types and structures
`paste Toinsert text or a graphic that has been cut
`such as subranges, enumerated data types,files,
`or copied from one documentinto a different lo-
`records, and sets. Acceptance and use of Pascal
`cation in the sameor a different document. See
`exploded with Borland International’s introduc-
`also cut and paste.
`tion in 1984 of Turbo Pascal, a high-speed, low-
`patch In programming, to repair a deficiency in
`cost Pascal compiler for MS-DOS systemsthat has
`the functionality of an existing routine or pro-
`sold over a million copies in its various versions.
`gram, generally in response to an unforeseen
`Even so, Pascal appears to be losing groundto C as
`neéd or set of operating circumstances. Patching
`a standard development language on microcom-
`does not necessarily imply sloppiness in imple-
`puters, See also ALGOL,C, compiled language.
`menting a solution to a problem: Patching is a
`pass In programming, the carrying out of one com-
`common meansof adding a feature or a function
`plete sequence of events—for example, one pass
`to an existing version of a program until the next
`through a program loop (“WHILExis less than
`version of the software, which presumably will
`10, DO this”) or one scan of a program by a com-
`have that feature or function included in its de-
`piler or an assembler (in preparation for convert-
`sign, is released. Compare hack, kludge.
`ing program instructions to a form the computer
`path A route from one point to another. In com-
`can carry out).
`munications, a path is a link between two nodes
`In another sense, to forward a piece of data
`(stations) in a network. In other contexts, a path
`from one part of a program to another. See also
`is a route througha structured collection of in-
`pass by address, pass by value.
`formation, as in a database, a program, orfiles
`pass by address Also called pass by reference. A
`stored on disk. In a database, for example, a path
`means of passing an argument or parameter to a
`is the selection of branches and nodesto betra-
`subroutine. The calling routine passes the ad-
`versed in a tree structure in order to progress
`dress (memory location) of the parameter to the
`from the root nodeofthetree to any other node,
`called routine, which can then use that address to
`In programming,a path is the sequenceofin-
`retrieve or modify the value of the parameter.
`structions a computer carries out in executing a
`Compare pass by value; see also argument,call.
`routine. In information processing, such as the
`pass by reference See pass by address.
`theory underlying expert (deductive) systems, a
`pass by value A meansof passing an argumentor
`pathis a logical course through the “branches” of
`a parameter to a subroutine. A copy of the value
`a tree of inferences (this AND that, this OR that)
`of the argument is created and passed to the
`- leading to a conclusion.
`called routine. When this method is used, the
`In file storage, a path is the route followed by
`called routine can modify the copy of the argu-
`the operating system in finding, storing, and re-
`mentbut it cannot modify the original argument.
`trieving files on a disk. On the Apple Macintosh,
`Compare pass by address; see also argument,call.
`for example, the operating system follows routes
`passwordAsecurity measure usedto restrict ac-
`called access paths, each identified internally by
`cess to computer systems and sensitive files. A
`a unique number, whenever it reads from or
`password is a unique string of characters that a
`writes to an openfile. In hierarchical file systems,
`user types in as an identification code. The sys-
`such as that used by the MS-DOS operating sys-
`tem compares the code againsta storedlist of au-
`tem, a path is the course leading from the root
`thorized passwords and users.
`If the code is
`directory of a drive, such as‘C, to a particular file,
`legitimate, the system allows the user access, at
`the path can include any number of named
`whatever security. level has been approved for
`subdirectories up to the maximum length of the
`the ownerof the password.
`
`
`293
`
`
`
`Petitioner Microsoft Corporation - Ex. 1011, p. 293
`Petitioner Microsoft Corporation - Ex. 1011, p. 293
`
`
`
`radio frequency
`
`button is a small circle that, when selected, has a
`smaller,filled circle inside it. Radio buttons are so
`named because their behavior mimics that of the
`buttons on a radio: Selecting one button dese-
`lects the previously selected button.
`
`Radio
`buttons
`
`=
`
`linage Attributes
`
`Width:
`
`Radio
`buttons
`
`Radio button.
`
`when the sorting is done using binary values,
`which simplifies comparisons(Is a given bit on or
`off?) and reduces the numberof lists (each pass
`producesat most twolists).
`rag Theirregularity along theleft or right ends of
`the lines on a printed page. Rag complements
`justification, in which one or both edges of the
`text (both, in the center example of the illustra-
`tion) form a straight vertical line. Word-processed
`letters and other documents are commonlyleft-
`justified, with ragged-right margins (as in the
`example on theleft). Ragged-left text is used
`infrequently—typically,
`in advertisements—for
`visual effect.
`
`justified
`
`Ragged right
`
`
`
`
`
`Rag.
`
`radio frequency Abbreviated RF. The portion of
`the electromagnetic spectrum with frequencies
`ragged left/right See rag.
`between 10 kilohertz and 3000 gigahertz. This
`RAM Pronounced “ram.” Acronym for random ac-
`corresponds to wavelengths between 30 kilome-
`cess memory. Semiconductor-based memory that
`ters and 1 millimeter.
`can be read and written by the microprocessor or
`radix The base of a number system—for ex-
`other hardware devices. The storage locations .
`ample, 2 in the binary system, 10 in the decimal
`can be accessed in any order. Note that the vari-
`system, 8 in the octal system, and 16in the hexa-
`ous types of ROM memory are capable of random
`decimal system. See also base.
`access. The term RAM, however, is generally un-
`radix point The period or other character that
`derstood to refer to volatile memory, which can
`separates the integer portion of a number from
`be written as well as read. Compare core,
`the fractional portion. In the decimal system, the
`EPROM,flash memory, PROM, ROM.
`.
`radix point is the decimal point, as in the number
`RAM card An add-in circuit board containing
`1.33.
`RAM memory and the interface logic necessary to
`radix sorting algorithm A sorting algorithm that
`decode memory addresses.
`sorts by grouping elements according to succes-
`RAM cartridge See memory cartridge.
`sive parts of their keys. A simple example is sort-
`RAM chip A semiconductor storage device. RAM
`ing a list of numbers in the range 0-999. First the
`chips can be either dynamic or static memory. See
`list is sorted by the 100’s digit into a set of Cup to)
`also dynamic RAM,static RAM.
`10 lists; then each list, one at a time, is sorted into
`RAMDAC Pronounced “ram-dack.” Acronym for
`a set of (up to) 10 lists based on the 10’s digit; and
`random access memory digital-to-analog con-
`finally, each of those lists is sorted by the 1’s
`verter. A chip built into some VGA and SVGA
`digit. This algorithm is usually most efficient
`
`
`329
`
`Petitioner Microsoft Corporation - Ex. 1011, p. 329
`Petitioner Microsoft Corporation - Ex. 1011, p. 329
`
`
`
`ROM BASIC
`
`node. Because of the closed loop, however, add-
`ing new nodes can be difficult. A ring network
`is diagrammed below. Compare bus network,
`star network; see also token passing, token ring
`
`network.
`
`
`
`RJ-11 connector See phone connector.
`RLL encoding See run-length limited encoding.
`robot Generally, a machine that can sense andre-
`act to input and cause changes in its surround-
`ings with some degree ofintelligence,
`ideally
`without human supervision. Robots are seldom
`humanlike in appearance, although they are of-
`ten designed to mimic human movements in car-
`rying out their work. Robots are commonly used
`in manufacturing, as in the construction of auto-
`mobiles and most computers. See also robotics.
`robotics The branch of engineering devoted to the
`creation and training of robots, Roboticists work
`within a wide range offields, such as mechanical
`and electronic engineering, cybernetics, bionics,
`andartificial intelligence, all toward the end of
`endowingtheir creations with as muchsensitiv-
`ity, independence,and flexibility as possible. See
`also artificial intelligence, bionics, cybernetics.
`robustness Soundness; the ability of a program
`to function, or to continue functioning well, in
`unexpected situations.
`roliback A return to a previous stable condition,
`as when the contents of a hard disk are restored
`from a backupafter a destructive hard disk error.
`RIP See raster image processor.
`ROM Rhymes with “bomb”; acronym for read-
`RISC Pronounced “risk”; acronym for reduced
`only memory. Semiconductor-based memory
`instruction set computing. A type of micropro-
`that containsinstructions or data that can be read
`cessor design that focuses on rapid and efficient
`but not modified. To create a ROM chip, the de-
`processingofa relatively small set of instructions.
`signer supplies a semiconductor manufacturer
`RISC design is based on the premise that most of
`with the instructions or data to be stored; the
`the instructions a computer decodes and executes
`manufacturer then produces one or more chips
`are simple. As a result, RISC architecture limits the
`containing those instructions or data. Because
`numberofinstructions that are built into the micro-
`creating ROM chips involves a manufacturing
`processor but optimizes each so it can be carried
`process,it is economically viable only if the ROM
`out very rapidly—usually within a single clock
`chips are produced in large quantities; experi-
`cycle. RISC chips thus execute simple instructions
`mental designs or
`small volumes are best
`faster than microprocessors designed to handle a
`handled using PROM or EPROM.In general us-
`much widerarray of instructions. They are, how-
`age, the term ROM often means any read-only
`ever, slower than general-purpose CISC (complex
`device, including PROM and EPROM. See also
`instruction set computing) chips when executing
`EEPROM, EPROM, PROM.
`complex instructions, which must be broken down
`roman An adjective describing a typeface or type
`into many machineinstructions before they can
`style in which the characters are upright. Com-
`becarried out by RISC microprocessors. Families
`pareitalic; see also font family.
`of RISC chips include Sun Microsystems’ SPARC,
`ROMBASICAversionof interpreted BASIC stored
`Motorola’s 88000, and Intel’s i860. Compare CISC,
`in ROM (read-only memory). Many early home
`see also architecture, scalar.
`IiA
`
`Ring network.
`
`342
`
`Petitioner Microsoft Corporation - Ex. 1011, p. 342
`Petitioner Microsoft Corporation - Ex. 1011, p. 342
`
`
`
`d edition has 'Camputers/General
`
`adapter With personal computers, especially those
`from IBM®or those that are IBM compatible, usually a
`printed circuit board (also called an interface card) that
`enables the computer to use a peripheral device for which it
`does not already have the necessary connections orcircuit
`boards. See the illustration. Adapters are often used to
`permit upgrading to new or different hardware. Most often,
`the term is encountered in video, as in Color/Graphics
`Adapter (CGA), Enhanced Graphics Adapter (EGA), and
`Definitions Plus. Each of the more than
`Video Graphics Array (VGA). Other common adapters
`5000 entries is written in clear, standard
`include game-controller hardware for joysticks, adapters
`for serial communications with devices such as modems,
`English. Most go beyond simple defini-
`tion to provide additional detail. You'll find
`adapters for parallel interfaces for devices such as printers,
`and adapters for other types of peripheral devices such as
`definitions for terms as basic to computing
`CD-ROM drives. Commonly, a single adapter card can
`as hard disk, boot, operating system, and
`have more than one adapter on it. For example, a single
`double-click, as well as more advanced terms
`adapter card can have bothaserial port and a parallel port.
`expert system, and virtual memory.
`
`Adapter
`
`See also port.
`
`$19.95
`U.S.A.
`£17.95
`tna
`$26.95
`Canada
`cacre aeca
`
`SECOND EBITION
`
`The Comprehensive Standard for Business, School, Library, and Home
`OEY
`
`PN Ceiprcernanises
`g Desktop Publis
`a Computer Industr
`
`¢ information needs of today’s microcomputeruser.
`tions in the microcomputer world, the
`is ideal fer
`the hundred
`sionals, Wide
`
`@ Graphics
`gw Electronics m Communications
`
`The MICROSOFT PRESS COMPUTER DICTIONARYwas written, reviewed, and edited by a distinguished te:
`and academic communi
`nputer industry and the bus
`S)monaaron
`: experience is drawn fromth
`
`Pronunciation Guides. Where appropriate,
`definitions include phonetic pronunciations
`that reflect industry usage—for example:
`GUL, pronounced “gooey.”
`
`such as object-orientedbrprogramming,fractal,
`
`Hlustrations. Drawings, photographs, and
`diagrams enhance manydefinitions.
`
`Cross-References. Entries are fully cross-
`referenced to provide supplementary infor-
`mation and invite further exploration.
`
`ISBN 1-55615-597-2
`
`90000
`
`781556 15597
`
`Reference
`
`Petitioner Microsoft Corporation - Ex. 1011, Back Cover
`Petitioner Microsoft Corporation - Ex. 1011, Back Cover
`
`