throbber

`
`Microsoft
`
`09mputer
`DIctIon W
`:
`Fifth Editiv‘
`
`
`. Fuh‘y updated with the Iatest
`technologies, terms, and acronym;___
`I Easy to read, expertly Htustrate'tt- '
`
`. Definitive coverage of hardware,-
`software, the Internet, and more!
`
`
`
`Exhibit 2004
`Exhibit 2004
`
`

`

`PUBLISHED BY
`Microsoft Press
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 2002 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in—Publication Data
`Microsoft Computer Dictionary.--5th ed.
`p. cm.
`ISBN 0-7356-1495-4
`
`l. Computers--Dictionaries.
`
`2.
`
`lVIicrocomputers--Dictionaries.
`
`AQ76.5. M52267
`004'.03--dc21
`
`2002
`
`200219714
`
`Printed and bound in the United States of America.
`
`23456789 QWT 765432
`
`Distributed in Canada by H.B. Penn and Company Ltd.
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress.
`Send comments to mspinput©microsofi. com.
`
`Active Desktop, Active Directory, ActiveMovie, ActiveStore, ActiveSync, ActiveX, Authenticode,
`BackOffice, BizTalk, ClearType, Direct3D, DirectAnimation, DirectDraw, DirectInput, DirectMusic,
`DirectPlay, DirectShow, DirectSound, DirectX, Entourage, FoxPro, FrontPage, HotInail, IntelliEye,
`IntelliMouse, IntelliSense, JScript, MapPoint, Microsoft, Microsoft Press, Mobile Explorer, MS-DOS,
`MSN, Music Central, NetMeeting, Outlook, PhotoDraw, PowerPoint, SharePoint, UltimateTV, Visio,
`Visual Basic, Visual C++, Visual FoxPro, Visual InterDev, Visual J++, Visual SourceSafe, Visual Studio,
`Win32, Win32s, Windows, Windows Media, Windows NT, Xbox are either registered trademarks or
`trademarks of Microsoft Corporation in the United States andfor other countries. Other product and
`company names mentioned herein may be the trademarks of their respective owners.
`
`The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
`and events depicted herein are fictitious. No association with any real company, organization, product,
`domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
`
`Acquisitions Editor: Alex Blanton
`Project Editor: Sandra Haynes
`
`Body Part No. X08-4l 929
`
`

`

`Contributors
`
`Peter Aiken
`
`Bart Arenson
`
`Janice Borzendowski
`
`Jerome Colburn
`
`Duane Hanson
`
`Andrew Himes
`
`Robert Howecton
`
`Annette B. Jackson
`
`Larry S. Jackson
`
`Thomas A. Jackson
`
`Chris Kinata
`
`llana Kingsley
`
`Robin Lombard
`
`Thomas A. Long
`
`William G. Madison
`
`Illustrators
`
`Travis Beaven
`
`David Holter
`
`Alton Lawson
`
`Thomas P. Magliery
`
`David Mason
`
`Terrence M. McLaren
`
`Wallace Parker
`
`Charles Petzold
`
`Phil Rose
`
`John Ross
`
`David Rygmyr
`
`Aimée Truchard
`
`Michael Vose
`
`Bruce Webster
`
`Judson D. Weeks
`
`Tom Winn
`
`JoAnne Woodcock
`
`Rob Nance
`
`JoelPanchot
`
`

`

`ho moge neous network
`
`Host Integration Server
`
`homogeneous network it. A network on which all the
`hosts are similar and only one protocol is used.
`
`Honeynet Project 11. Anonprofit security research group
`created to collect and analyze data on hacking tools and
`methods by maintaining a decoy network of computers
`that is potentially attractive to hackers. The Honeynet
`Project sets up entire networks of computers in different
`combinations of operating systems and security to realisti-
`cally simulate those used in businesses and organizations.
`Hackers are lured to the network where all inbound and
`
`outbound data is captured and contained to help research-
`ers learn about hacker tactics and motives.
`
`honeypot n. A security program designed to lure and dis-
`tract a network attacker with decoy data. The honeypot
`appears to be a system that the intruder would like to crack
`but which, in reality, is safely separated from the actual
`network. This allows network administrators to observe
`
`attackers and study their activities without the intruders
`knowing they are being monitored. Honeypot programs
`get their name from the “like a bear to honey” metaphor.
`
`honker n. A slang term for a hacker, the term originated
`in China. The Honker Union of China is an active group of
`Chinese hackers with nationalistic or hacktivist aims. The
`
`Honker Union of China has claimed patriotic motivation
`for defacing Japanese and U.S. Web sites, hacking U.S.
`networks, and releasing the Lion worm and other mali-
`cious programs. See also hacktivist, Lion worm.
`
`hook it. A location in a routine or program in which the
`programmer can connect or insert other routines for the
`purpose of debugging or enhancing functionality.
`
`hop :1. In data communications, one segment of the path
`between routers on a geographically dispersed network. A
`hop is comparable to one “leg” of a journey that includes
`intervening stops between the starting point and the desti-
`nation. The distance between each of those stops (routers)
`would be a communications hop.
`
`horlzontal blanklng Interval 21. See blanking, horizontal
`retrace.
`
`horlzontal flyback n. See horizontal retrace.
`
`horlzontal market it. A broad category of business activ-
`ity, such as accounting or inventory control, that carries
`across many types of business. Compare vertical market.
`
`horlzontal market software :1. Application programs,
`such as word processors, that can be used in all types of
`business, as opposed to those geared for a certain industry.
`
`horlzontal retrace n. The movement of the electron
`
`beam in a raster-scan video display from the right end of
`one scan line to the left end (the beginning) of the next.
`During horizontal retrace, the electron beam is turned off,
`so the time required for the beam to move is called the
`horizontal blanking interval. See also blanking. Compare
`vertical retrace.
`
`horlzontal scrolllng n. A feature of programs such as
`word processors and spreadsheets thatenables the user to
`scroll left and right to display information beyond the
`horizontal limits of the screen (or window, in a graphical
`user interface).
`
`horlzontal synchronlzatlon n. On raster displays, the
`timing produced by a signal that controls the sweep of the
`display’s electron beam as it moves from left to right and
`back again to form an image line by line. The horizontal
`synchronization signal is usually controlled by a circuit
`known as a phase-locked loop, which maintains a constant
`precise frequency so that a clear image is formed.
`
`host1 It. 1. The main computer in a mainframe or mini-
`computer environment—that is, the computer to which
`terminals are connected. 2. In PC—based networks, a com-
`puter that provides access to other computers. 3. On the
`Internet or other large networks, a server computer that
`has access to other computers on the network. A host com-
`puter provides services, such as news, mail, or data, to
`computers that connect to it.
`
`host2 vb. To provide services to client computers that con-
`nect from remote locations—for example, to offer Internet
`access or to be the source for a news or mail service.
`
`host adapter 11. A device for connecting a peripheral to
`the main computer, typically in the form of an expansion
`card. Also called: controller, host bus adapter.
`
`hostlng n. The practice of providing computer and com-
`munication facilities to businesses or individuals, especially
`for use in creating Web and electronic commerce sites. A
`hosting service can provide high-speed access to the Inter-
`net, redundant power and data storage, and 24-hour mainte-
`nance at lower cost than implementing the same services
`independently. See also hostg, virtual hosting.
`
`Host lntegratlon Server 12. A software application from
`Microsoft Corporation to allow businesses to integrate
`existing application, data, and network assets with new
`business applications and technologies. Host Integration
`Server preserves a company’s existing legacy infrastru c-
`ture andinvestments, while providing out-of—the-box
`
`256
`
`

`

`rag
`
`RAM compression
`
`(asymmetric digital subscriber line) that is capable of
`adjusting transmission speed (bandwidth) based on signal
`quality and length of the transmission line. As the signal
`quality improves or deteriorates while a transmission line
`is being used, the transmission speed is adjusted accord-
`ingly. See also ADSL, xDSL.
`
`rag n. Irregularity along the left or right edge ofa set of
`lines of text on a printed page. Rag complements justifica-
`tion, in which one or both edges of the text form a straight
`vertical line. See the illustration. See also justify, ragged
`left, ragged right.
`
`Ragged right
`
`Justifi ed
`
`Ragged left
`
`
`
`ragged left adj. Of, relating to, or being lines of text
`whose left ends are not vertically aligned but form an
`irregular edge. Text may be right-justified and have a
`ragged left margin. Ragged-left text is used infrequentlyi
`typically, for visual effect in advertisements. See also rag,
`right-justify.
`
`ragged rlght adj. Of, relating to, or being lines of text
`whose right ends are not vertically aligned but form an
`irregular edge. Letters and other word-processed docu-
`ments are commonly left-justified, with ragged-right mar-
`gins. See also left-justify, rag.
`
`RAID 11. Acronym for redundant array of independent (or
`inexpensive) disks. A data storage methodin which data is
`distributed across a group of computer disk drives that
`function as a single storage unit. All the information
`stored on each of the disks is duplicated on other disks in
`the array. This redundancy ensures that no information
`will be lost if one of the disks fails. RAID is generally
`used on network servers where data accessibility is critical
`and fault tolerance is required. There are various defined
`levels of RAID, each offering differing trade-offs among
`access speed, reliability, and cost. See also disk controller,
`error-correction coding Hamming code, hard disk, parity
`bit, server (definition 1).
`
`RAID array 11. See RAID.
`
`RAM 21. Acronym for random access memory. Semicon-
`ductor-based memory that can be read and written by the
`central processing unit (CPU) or other hardware devices.
`The storage locations can be accessed in any order. Note
`that the various types of ROM memory are capable of ran-
`dom access but cannot be written to. The term RAM, how-
`ever, is generally understood to refer to volatile memory
`that can be written to as well as read. Compare core,
`EPROM, flash memory, PROM, ROM (definition 2).
`
`RAMAC n. 1. Acronym for Random Access Method of
`Accounting Control. Developed by an IBM team led by
`Reynold B. Johnson, RAMAC was the first computer disk
`drive. It was introduced in 1956. The original RAMAC
`consisted of a stack of 50 24-inch platters, with a storage
`capacity of 5 megabytes and an average access time of 1
`second. 2. A high-speed, high-capacity disk storage sys-
`tem introduced by IBM in 1994. Based on the original
`RAMAC storage device, it was designed to fulfill enter-
`prise requirements for efficient and fault-tolerant storage.
`Rambus DRAM )1. See RDRAM.
`
`Rambus dynamlc random access memory 21. See
`RDRAM.
`
`RAM cache :1. Short for random access memory cache.
`Cache memory that is used by the system to store and
`retrieve data from the RAM. Frequently accessed seg-
`ments of data may be stored in the cache for quicker
`access compared with secondary storage devices such as
`disks. See also cache, RAM.
`
`RAM card n. Short for random access memory card. An
`add-in circuit board containing RAM memory and the
`interface logic necessary to decode memory addresses.
`
`RAM cartrldge 21. See memory cartridge.
`
`RAM chlp n. Short for random access memory chip. A
`semiconductor storage device. RAM chips can be either
`dynamic or static memory. See also dynamic RAM, RAM,
`static RAM.
`
`RAM compresslon n. Short for random access memory
`compression. This technology was an attempt by a number
`of software vendors to solve the problem of running out of
`global memory under Windows 3.x. Compression of the
`usual contents of RAM may lessen the system’s need to
`read or write to virtual (hard diskebased) memory and thus
`speed up the system, as virtual memory is much slower than
`physical RAM. Because of the falling prices of RAM and
`the introduction of operating systems that handle RAM
`
`43?
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket