`
`
`ea
`Diction .ty
`
`
`Fifth Edition
`
`Pea APeC mMcie
`technologies, terms, and acronyms
`e Easy to read, expertly illustrated’ |
`« Definitive coverage of hardware,
`software, the Internet, and more!
`
`
`
`Exhibit 2004
`Exhibit 2004
`
`
`
`PUBLISHED BY
`Microsoft Press
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 2002 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproducedor transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`Microsoft Computer Dictionary.--5th ed.
`p- cm.
`ISBN 0-7356-1495-4
`
`1. Computers--Dictionaries.
`
`2. Microcomputers--Dictionaries.
`
`AQ76.5.M52267
`004'.03--de21
`
`2002
`
`200219714
`
`Printed and boundin the United States of America.
`
`23456789 QWT 765432
`
`Distributed in Canada by H.B. Fenn and Company Ltd.
`
`A CIP catalogue recordfor this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress.
`Send comments to mspinput @microsofi.com.
`
`Active Desktop, Active Directory, ActiveMovie, ActiveStore, ActiveSync, ActiveX, Authenticode,
`BackOffice, BizTalk, ClearType, Direct3D, DirectAnimation, DirectDraw, DirectInput, DirectMusic,
`DirectPlay, DirectShow, DirectSound, DirectX, Entourage, FoxPro, FrontPage, Hotmail, IntelliEye,
`IntelliMouse, IntelliSense, JScript, MapPoint, Microsoft, Microsoft Press, Mobile Explorer, MS-DOS,
`MSN, Music Central, NetMeeting, Outlook, PhotoDraw, PowerPoint, SharePoint, UltimateTV, Visio,
`Visual Basic, Visual C++, Visual FoxPro, Visual InterDev, Visual J++, Visual SourceSafe, Visual Studio,
`Win32, Win32s, Windows, Windows Media, Windows NT, Xbox are either registered trademarks or
`trademarks of Microsoft Corporation in the United States and/or other countries. Other product and
`company names mentioned herein may be the trademarksoftheir respective owners.
`
`The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
`and events depicted herein are fictitious. No association with any real company, organization, product,
`domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
`
`Acquisitions Editor: Alex Blanton
`Project Editor: Sandra Haynes
`
`Body Part No, X08-41929
`
`
`
`Contributors
`
`Peter Aiken
`
`Bart Arenson
`
`Janice Borzendowski
`
`Jerome Colburn
`
`Duane Hanson
`
`Andrew Himes
`
`Robert Howecton
`
`Annette B. Jackson
`
`Larry S. Jackson
`
`Thomas A. Jackson
`
`Chris Kinata
`
`llana Kingsley
`
`Robin Lombard
`
`Thomas A. Long
`
`William G. Madison
`
`Ilustrators
`
`Travis Beaven
`
`David Holter
`
`Alton Lawson
`
`Thomas P. Magliery
`
`David Mason
`
`Terrence M. McLaren
`
`Wallace Parker
`
`Charles Petzold
`
`Phil Rose
`
`John Ross
`
`David Rygmyr
`
`Aimée Truchard
`
`Michael Vose
`
`Bruce Webster
`
`Judson D. Weeks
`
`Tom Winn
`
`JoAnne Woodcock
`
`Rob Nance
`
`Joel Panchot
`
`
`
`homogeneous network
`
`Host Integration Server
`
`homogeneous network n#. A network on whichall the
`hosts ate similar and only one protocol is used.
`
`Honeynet Project #. A nonprofit security research group
`created to collect and analyze data on hacking tools and
`methods by maintaining a decoy network of computers
`that is potentially attractive to hackers. The Honeynet
`Project sets up entire networks of computers in different
`combinations of operating systems and security to realisti-
`cally simulate those used in businesses and organizations.
`Hackers are lured to the network where all inbound and
`
`outbound data is captured and contained to help research-
`ers learn about hacker tactics and motives.
`
`honeypot #. A security program designed to lure and dis-
`tract a network attacker with decoy data. The honeypot
`appears to be a system that the intruder wouldlike to crack
`but which, in teality, is safely separated from the actual
`network, This allows network administrators to observe
`
`attackers and study their activities without the intruders
`knowing they are being monitored. Honeypot programs
`get their name from the “like a bear to honey”* metaphor.
`
`honker #. A slang term for a hacker, the term originated
`in China. The Honker Union of Chinais an active group of
`Chinese hackers with nationalistic or hacktivist aims. The
`
`Honker Union of China has claimed patriotic motivation
`for defacing Japanese and U.S. Websites, hacking U.S.
`networks, and releasing the Lion worm and other mali-
`cious programs. See also hacktivist, Lion worm.
`
`hook nv. A location in a routine or program in which the
`programmer can connect or insert other routines for the
`purpose of debugging or enhancing functionality.
`
`hop #. In data communications, one segment of the path
`between routers on a geographically dispersed network. A
`hop is comparable to one “leg” of a journey that includes
`intervening stops between the starting point and the desti-
`nation. The distance between each of those stops (routers)
`would be a communications hop.
`
`horlzontal blanking Interval 7. See blanking, horizontal
`retrace.
`
`horlzontal flyback n. See horizontal retrace.
`
`horlzontal market #. A broad category of business activ-
`ity, such as accounting or inventory control, that carries
`across many types of business. Compare vertical market.
`
`horlzontal market software 7. Application programs,
`such as word processors, that can be used in all types of
`business, as opposed to those geared for a certain industry.
`
`horizontal retrace 7. The movement of the electron
`
`beam in a rastet-scan video display from the right end of
`one scan line to the left end (the beginning) of the next.
`During horizontal retrace, the electron beam is turned off,
`so the time required for the beam to move is called the
`horizontal blanking interval. See afso blanking. Compare
`vertical retrace.
`
`horlzontal scrolling 7. A feature of programs such as
`word processors and spreadsheets that enables the user to
`scroll left and right to display information beyond the
`horizontal limits of the screen (or window,in a graphical
`user interface).
`
`horlzontal synchronization 2. On raster displays, the
`timing produced by a signal that controls the sweep ofthe
`display’s electron beam as it moves from left to right and
`back again to form an imageline by line. The horizontal
`synchronization signal is usually controlled by a circuit
`known as a phase-locked loop, which maintains a constant
`precise frequency so that a clear image is formed.
`host! x. 1. The main computer in a mainframe or mini-
`computer environment—thatis, the computer to which
`terminals are connected, 2, In PC-based networks, a com-
`puter that provides access to other computers. 3. On the
`Internet or other large networks, a server computer that
`has access to other computers on the network. A host com-
`puter provides services, such as news, mail, or data, to
`computers that connectto it
`
`host? vb. To provide servicesto client computers that con-
`nect from remote locations—for example, to offer Internet
`access or to be the source for a news or mail service.
`
`host adapter #. A device for connecting a peripheral to
`the main computer, typically in the form of an expansion
`eard. Also called: controller, host bus adapter.
`
`hosting ». The practice of providing computer and com-
`munication facilities to businesses or individuals, especially
`for use in creating Web and electronic commerce sites. A
`hosting service can provide high-speed access to the Inter-
`net, redundant power and data storage, and 24-hour mainte-
`nance at lower cost than implementing the same services
`independently. See also host?, virtual hosting.
`
`Host Integration Server #. A software application from
`Microsoft Corporation to allow businesses to integrate
`existing application, data, and network assets with new
`business applications and technologies. Host Integration
`Server preserves a company’s existing legacy infrastruc-
`ture and investments, while providing out-of-the-box
`
`256
`
`
`
`rag.
`
`RAM compression
`
`(asymmetric digital subscriber line) that is capable of
`adjusting transmission speed (bandwidth) based on signal
`quality and length of the transmission line. As the signal
`quality improves or deteriorates while a transmission line
`is being used, the transmission speed is adjusted accord-
`ingly. See also ADSL, xDSL.
`
`rag a. [rregularity along the left or right edge of a set of
`lines of text on a printed page. Rag complements justifica-
`tion, in which one or both edges of the text form a straight
`vertical line. See the illustration. See aise justify, ragged
`left, ragged right.
`
`Justified
`
`Ragged right
`
`Ragged left
`
`Rag.
`
`ragged left adj. Of, relating to, or being lines of text
`whose left ends are not vertically aligned but form an
`irregular edge. Text may be right-justified and have a
`ragged left margin. Ragged-left text is used infrequently—
`typically, for visual effect in advertisements. See also tag,
`tight-justify.
`
`ragged rght adj. Of, relating to, or being lines of text
`whose right ends are not vertically aligned but form an
`irregular edge. Letters and other word-processed docu-
`ments are commonlyleft-justified, with ragged-right mar-
`gins. See also left-justify, rag.
`
`RAID #. Acronym for redundant array of independent (or
`inexpensive) disks. A data storage methodin which data is
`distributed across a group of computer disk drives that
`function as a single storage unit. All the information
`stored on each of the disks is duplicated on other disks in
`the array. This redundancy ensures that no information
`will be lost if one of the disks fails. RAID is generally
`used on network servers where data accessibility is critical
`andfault tolerance is required. There are various defined
`levels of RAID, each offering differing trade-offs among
`access speed,reliability, and cost. See also disk controller,
`etror-correction coding, Hamming code, hard disk, parity
`bit, server (definition 1).
`
`RAID array n. See RAID.
`
`437
`
`RAM #. Acronym for random access memory. Semicon-
`ductot-based memory that can be read and written by the
`central processing unit (CPU) or other hardware devices.
`The storage locations can be accessed in any order. Note
`that the various types of ROM memory are capable of ran-
`dom access but cannot be written to. The term RAM, how-
`ever, is generally understood to refer to volatile memory
`that can be written to as well as read. Compare cote,
`EPROM,flash memory, PROM, ROM (definition 2).
`
`RAMAC x. 1. Acronym for Random Access Method of
`Accounting Control. Developed by an IBM team led by
`Reynold B. Johnson, RAMAC wasthe first computer disk
`drive. It was introduced in 1956, The original RAMAC
`consisted of a stack of 50 24-inch platters, with a storage
`capacity of 5 megabytes and an average accesstime of1
`second, 2. A high-speed, high-capacity disk storage sys-
`tem introduced by IBM in 1994. Based on the original
`RAMACstorage device, it was designed to fulfill enter-
`prise requirements for efficient and fault-tolerant storage.
`Rambus DRAM n. See RORAM.
`
`Rambus dynamic random access memory x. See
`RDRAM.
`
`RAM cache #. Short for random access memory cache.
`Cache memory that is used by the system to store and
`retrieve data from the RAM. Frequently accessed seg-
`ments of data may be stored in the cache for quicker
`access compared with secondary storage devices such as
`disks. See alse cache, RAM.
`
`RAM card x. Short for random access memory card. An
`add-in circuit board containing RAM memory and the
`interface logic necessary to decode memory addresses.
`
`RAM cartridge x. See memory cartridge.
`
`RAM chip x. Short for random access memory chip. A
`semiconductor storage device. RAM chips can be either
`dynamicor static memory. See aiso dynamic RAM, RAM,
`static RAM.
`
`RAM compression nv. Short for random access memory
`compression. This technology was an attempt by a number
`of software vendors to solve the problem of running out of
`global memory under Windows3.x. Compression ofthe
`usual contents of RAM may lessen the system’s need to
`read or write to virtual (hard disk-based) memory and thus
`speed up the system, as virtual memory is much slower than
`physical KAM. Becauseofthe falling prices of RAM and
`the introduction of operating systems that handle RAM
`
`