throbber
Microsoft
`
`
`ea
`Diction .ty
`
`
`Fifth Edition
`
`Pea APeC mMcie
`technologies, terms, and acronyms
`e Easy to read, expertly illustrated’ |
`« Definitive coverage of hardware,
`software, the Internet, and more!
`
`
`
`Exhibit 2004
`Exhibit 2004
`
`

`

`PUBLISHED BY
`Microsoft Press
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 2002 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproducedor transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`Microsoft Computer Dictionary.--5th ed.
`p- cm.
`ISBN 0-7356-1495-4
`
`1. Computers--Dictionaries.
`
`2. Microcomputers--Dictionaries.
`
`AQ76.5.M52267
`004'.03--de21
`
`2002
`
`200219714
`
`Printed and boundin the United States of America.
`
`23456789 QWT 765432
`
`Distributed in Canada by H.B. Fenn and Company Ltd.
`
`A CIP catalogue recordfor this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress.
`Send comments to mspinput @microsofi.com.
`
`Active Desktop, Active Directory, ActiveMovie, ActiveStore, ActiveSync, ActiveX, Authenticode,
`BackOffice, BizTalk, ClearType, Direct3D, DirectAnimation, DirectDraw, DirectInput, DirectMusic,
`DirectPlay, DirectShow, DirectSound, DirectX, Entourage, FoxPro, FrontPage, Hotmail, IntelliEye,
`IntelliMouse, IntelliSense, JScript, MapPoint, Microsoft, Microsoft Press, Mobile Explorer, MS-DOS,
`MSN, Music Central, NetMeeting, Outlook, PhotoDraw, PowerPoint, SharePoint, UltimateTV, Visio,
`Visual Basic, Visual C++, Visual FoxPro, Visual InterDev, Visual J++, Visual SourceSafe, Visual Studio,
`Win32, Win32s, Windows, Windows Media, Windows NT, Xbox are either registered trademarks or
`trademarks of Microsoft Corporation in the United States and/or other countries. Other product and
`company names mentioned herein may be the trademarksoftheir respective owners.
`
`The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
`and events depicted herein are fictitious. No association with any real company, organization, product,
`domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
`
`Acquisitions Editor: Alex Blanton
`Project Editor: Sandra Haynes
`
`Body Part No, X08-41929
`
`

`

`Contributors
`
`Peter Aiken
`
`Bart Arenson
`
`Janice Borzendowski
`
`Jerome Colburn
`
`Duane Hanson
`
`Andrew Himes
`
`Robert Howecton
`
`Annette B. Jackson
`
`Larry S. Jackson
`
`Thomas A. Jackson
`
`Chris Kinata
`
`llana Kingsley
`
`Robin Lombard
`
`Thomas A. Long
`
`William G. Madison
`
`Ilustrators
`
`Travis Beaven
`
`David Holter
`
`Alton Lawson
`
`Thomas P. Magliery
`
`David Mason
`
`Terrence M. McLaren
`
`Wallace Parker
`
`Charles Petzold
`
`Phil Rose
`
`John Ross
`
`David Rygmyr
`
`Aimée Truchard
`
`Michael Vose
`
`Bruce Webster
`
`Judson D. Weeks
`
`Tom Winn
`
`JoAnne Woodcock
`
`Rob Nance
`
`Joel Panchot
`
`

`

`homogeneous network
`
`Host Integration Server
`
`homogeneous network n#. A network on whichall the
`hosts ate similar and only one protocol is used.
`
`Honeynet Project #. A nonprofit security research group
`created to collect and analyze data on hacking tools and
`methods by maintaining a decoy network of computers
`that is potentially attractive to hackers. The Honeynet
`Project sets up entire networks of computers in different
`combinations of operating systems and security to realisti-
`cally simulate those used in businesses and organizations.
`Hackers are lured to the network where all inbound and
`
`outbound data is captured and contained to help research-
`ers learn about hacker tactics and motives.
`
`honeypot #. A security program designed to lure and dis-
`tract a network attacker with decoy data. The honeypot
`appears to be a system that the intruder wouldlike to crack
`but which, in teality, is safely separated from the actual
`network, This allows network administrators to observe
`
`attackers and study their activities without the intruders
`knowing they are being monitored. Honeypot programs
`get their name from the “like a bear to honey”* metaphor.
`
`honker #. A slang term for a hacker, the term originated
`in China. The Honker Union of Chinais an active group of
`Chinese hackers with nationalistic or hacktivist aims. The
`
`Honker Union of China has claimed patriotic motivation
`for defacing Japanese and U.S. Websites, hacking U.S.
`networks, and releasing the Lion worm and other mali-
`cious programs. See also hacktivist, Lion worm.
`
`hook nv. A location in a routine or program in which the
`programmer can connect or insert other routines for the
`purpose of debugging or enhancing functionality.
`
`hop #. In data communications, one segment of the path
`between routers on a geographically dispersed network. A
`hop is comparable to one “leg” of a journey that includes
`intervening stops between the starting point and the desti-
`nation. The distance between each of those stops (routers)
`would be a communications hop.
`
`horlzontal blanking Interval 7. See blanking, horizontal
`retrace.
`
`horlzontal flyback n. See horizontal retrace.
`
`horlzontal market #. A broad category of business activ-
`ity, such as accounting or inventory control, that carries
`across many types of business. Compare vertical market.
`
`horlzontal market software 7. Application programs,
`such as word processors, that can be used in all types of
`business, as opposed to those geared for a certain industry.
`
`horizontal retrace 7. The movement of the electron
`
`beam in a rastet-scan video display from the right end of
`one scan line to the left end (the beginning) of the next.
`During horizontal retrace, the electron beam is turned off,
`so the time required for the beam to move is called the
`horizontal blanking interval. See afso blanking. Compare
`vertical retrace.
`
`horlzontal scrolling 7. A feature of programs such as
`word processors and spreadsheets that enables the user to
`scroll left and right to display information beyond the
`horizontal limits of the screen (or window,in a graphical
`user interface).
`
`horlzontal synchronization 2. On raster displays, the
`timing produced by a signal that controls the sweep ofthe
`display’s electron beam as it moves from left to right and
`back again to form an imageline by line. The horizontal
`synchronization signal is usually controlled by a circuit
`known as a phase-locked loop, which maintains a constant
`precise frequency so that a clear image is formed.
`host! x. 1. The main computer in a mainframe or mini-
`computer environment—thatis, the computer to which
`terminals are connected, 2, In PC-based networks, a com-
`puter that provides access to other computers. 3. On the
`Internet or other large networks, a server computer that
`has access to other computers on the network. A host com-
`puter provides services, such as news, mail, or data, to
`computers that connectto it
`
`host? vb. To provide servicesto client computers that con-
`nect from remote locations—for example, to offer Internet
`access or to be the source for a news or mail service.
`
`host adapter #. A device for connecting a peripheral to
`the main computer, typically in the form of an expansion
`eard. Also called: controller, host bus adapter.
`
`hosting ». The practice of providing computer and com-
`munication facilities to businesses or individuals, especially
`for use in creating Web and electronic commerce sites. A
`hosting service can provide high-speed access to the Inter-
`net, redundant power and data storage, and 24-hour mainte-
`nance at lower cost than implementing the same services
`independently. See also host?, virtual hosting.
`
`Host Integration Server #. A software application from
`Microsoft Corporation to allow businesses to integrate
`existing application, data, and network assets with new
`business applications and technologies. Host Integration
`Server preserves a company’s existing legacy infrastruc-
`ture and investments, while providing out-of-the-box
`
`256
`
`

`

`rag.
`
`RAM compression
`
`(asymmetric digital subscriber line) that is capable of
`adjusting transmission speed (bandwidth) based on signal
`quality and length of the transmission line. As the signal
`quality improves or deteriorates while a transmission line
`is being used, the transmission speed is adjusted accord-
`ingly. See also ADSL, xDSL.
`
`rag a. [rregularity along the left or right edge of a set of
`lines of text on a printed page. Rag complements justifica-
`tion, in which one or both edges of the text form a straight
`vertical line. See the illustration. See aise justify, ragged
`left, ragged right.
`
`Justified
`
`Ragged right
`
`Ragged left
`
`Rag.
`
`ragged left adj. Of, relating to, or being lines of text
`whose left ends are not vertically aligned but form an
`irregular edge. Text may be right-justified and have a
`ragged left margin. Ragged-left text is used infrequently—
`typically, for visual effect in advertisements. See also tag,
`tight-justify.
`
`ragged rght adj. Of, relating to, or being lines of text
`whose right ends are not vertically aligned but form an
`irregular edge. Letters and other word-processed docu-
`ments are commonlyleft-justified, with ragged-right mar-
`gins. See also left-justify, rag.
`
`RAID #. Acronym for redundant array of independent (or
`inexpensive) disks. A data storage methodin which data is
`distributed across a group of computer disk drives that
`function as a single storage unit. All the information
`stored on each of the disks is duplicated on other disks in
`the array. This redundancy ensures that no information
`will be lost if one of the disks fails. RAID is generally
`used on network servers where data accessibility is critical
`andfault tolerance is required. There are various defined
`levels of RAID, each offering differing trade-offs among
`access speed,reliability, and cost. See also disk controller,
`etror-correction coding, Hamming code, hard disk, parity
`bit, server (definition 1).
`
`RAID array n. See RAID.
`
`437
`
`RAM #. Acronym for random access memory. Semicon-
`ductot-based memory that can be read and written by the
`central processing unit (CPU) or other hardware devices.
`The storage locations can be accessed in any order. Note
`that the various types of ROM memory are capable of ran-
`dom access but cannot be written to. The term RAM, how-
`ever, is generally understood to refer to volatile memory
`that can be written to as well as read. Compare cote,
`EPROM,flash memory, PROM, ROM (definition 2).
`
`RAMAC x. 1. Acronym for Random Access Method of
`Accounting Control. Developed by an IBM team led by
`Reynold B. Johnson, RAMAC wasthe first computer disk
`drive. It was introduced in 1956, The original RAMAC
`consisted of a stack of 50 24-inch platters, with a storage
`capacity of 5 megabytes and an average accesstime of1
`second, 2. A high-speed, high-capacity disk storage sys-
`tem introduced by IBM in 1994. Based on the original
`RAMACstorage device, it was designed to fulfill enter-
`prise requirements for efficient and fault-tolerant storage.
`Rambus DRAM n. See RORAM.
`
`Rambus dynamic random access memory x. See
`RDRAM.
`
`RAM cache #. Short for random access memory cache.
`Cache memory that is used by the system to store and
`retrieve data from the RAM. Frequently accessed seg-
`ments of data may be stored in the cache for quicker
`access compared with secondary storage devices such as
`disks. See alse cache, RAM.
`
`RAM card x. Short for random access memory card. An
`add-in circuit board containing RAM memory and the
`interface logic necessary to decode memory addresses.
`
`RAM cartridge x. See memory cartridge.
`
`RAM chip x. Short for random access memory chip. A
`semiconductor storage device. RAM chips can be either
`dynamicor static memory. See aiso dynamic RAM, RAM,
`static RAM.
`
`RAM compression nv. Short for random access memory
`compression. This technology was an attempt by a number
`of software vendors to solve the problem of running out of
`global memory under Windows3.x. Compression ofthe
`usual contents of RAM may lessen the system’s need to
`read or write to virtual (hard disk-based) memory and thus
`speed up the system, as virtual memory is much slower than
`physical KAM. Becauseofthe falling prices of RAM and
`the introduction of operating systems that handle RAM
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket