throbber
Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 1 of 126 PageID #: 1622
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 1 of 126 PageID #: 1622
`
`(cid:40)(cid:59)(cid:43)(cid:44)(cid:37)(cid:44)(cid:55)(cid:3)(cid:39)
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 2 of 126 PageID #: 1623
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 2 of 126 PageID #: 1623
`
`
`
`Dictionary _of
`Computlng
`
`Fourth Edition
`
`‘
`
`JJL‘
`
`Oxford New York Tokyo
`OXFORD UN|VERS|TY PRESS
`1996
`
`
`
`DEF_J NT00000001
`
`DEF_JNT00000001
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 3 of 126 PageID #: 1624
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 3 of 126 PageID #: 1624
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1 I‘ 1"“, 1'?
`
`'
`
`jr :1},
`) I!
`i U"
`
`Oxford University Press, Walton Street, Oxford OX2 6DP
`Oxford New York
`Athens Auckland Bangkok Bogota Bombay
`Buenos Aires Calcutta Cape Town Dar es Salaam
`Delhi Florence Hong Kong Istanbul Karachi
`Kuala Lumpur Madras Madrid Melbourne
`Alexico City Nairobi Paris Singapore
`Taipei Tokyo Toronto
`and associated companies in
`Berlin Ibadan
`
`Oxfbtd is a trade mark of Oxford University Press
`Published in the United States
`by Oxford University Press Inc, New York
`
`© Market House Books, 1983, 1986, 1990, 1996
`
`Firstpublished 1993
`Reprinted 1983, 1984, 1985
`Second Edition 1986
`Third Edition 1990
`Reprinted 1990, 1991 (twice), 1992
`Fourth Edition 1996
`
`All rights reserved. No part oft/tispublication may be
`reproduced, stored in a retrieval system, or transmitted, in any
`form or by any means, without the prior permission in writing ofOXfo/‘d
`University Press. Within the UK, exceptions are allowed in respect oj‘any
`fair dealingfor the purpose ofresearch orprivate study, or criticism or
`review, as permitted under the Copyright, Designs and Patents Act, 1988, or
`in the case of reprographic reproduction in accordance with the terms of
`licences issued by the Copyright Licensing Agency. Enquiries concerning
`reproduction outside those terms and in other countries should be sent to
`the Rights Department, Oxford University Press, at the address above.
`This book is sold subject to the condition that it shall not,
`by way oftrade or otherwise, be lent, re—sold, hiretlout, or otherwise
`circulated without thepublisher's prior consent in anyform of binding
`or cover other than that in which it is published and without a similar
`condition including this condition being imposed
`on the subsequent purchaser.
`
`A catalogue recordfor this book is availablefrom the British Library
`
`Library of Congress Cataloging in Publication Data
`(Data available)
`ISBN 0#19785385573
`
`Text prepared by Market House Books Ltd, Aylesbury
`Printed in Great Britain by
`Biddles Ltd, Guildford & King‘s Lynn
`
`.
`I
`
`‘
`
`
`
`DEF_J NT00000002
`
`DEF_JNT00000002
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is inserted by the compiler at the point of
`call, thereby avoiding the overhead of a nor—
`mal function call.
`inner code Sec concatenated coding system.
`inoculation A technique for virus prevention
`in which a uterine, the *signature (but not
`the harmful code.) of a virus, is deliberately
`added to a program. This is effective only
`against those specific viruses that are prof
`grammcd to avoid reinfecting code by detect
`ing the presence of their own signature.
`inorder traversal Anni/161' nauwfiyr symmetric
`order traversal.
`
`input 1. The process of entering data into a
`processing system or a peripheral device, or
`the data that is entered.
`Z. A signal that is applied to an electrical cir—
`euit, such as a logic circuit.
`3. To enter data or apply a signal.
`
`input area' The area of main memory that is
`currently allocated to hold incoming data.
`The processing system will usually retrieve
`data from the input area and transfer it to a
`working area or
`register before
`it
`is
`processed. The result of the processing may
`be written to an *output area. Subroutines
`are usually organized so as to replenish the
`input area from a source such as an input
`peripheral or communication line and clear
`the output area by transfer to backing store.
`input device Any device that transfers data,
`programs, or signals into a processor system.
`Such devices provide the humanicomputer
`interface, the *keyhoard being the most com7
`mon example. Early computers also used
`punched paper tape and cards but these are
`now obsolete. Current devices
`include
`*pointing devices, *data collection termir
`nals, *speech recognition units, magnetic
`*card readers, and *document scanners. See
`also logical input device.
`input-limited process A process whose speed
`of execution is limited by the rate at which
`input data is available or obtained.
`input/output (l/O) The passing of informa—
`tion into or out of the central processing unit
`of a computer system, or the part of the sys—
`tem primarily dedicated to this activity. An
`important function of most [/0 equipment
`
`
`
`
`
`
`
`
`
`
`
`
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 4 of 126 PageID #: 1625
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 4 of 126 PagelD #: 1625
`
`
`
`INNER CODE
`
`244
`
`is the translation between the host preces,
`sor’s signals and the sounds, actions, or syme
`bols that are understood or generated by peg,
`ple.
`In some cases it may be translation
`between two types of machine—readable sig
`nals, as when a *barwode scanner reads the
`data—encoded package and translates it
`into
`an ASCII Code. 561' also l/O.
`
`inquiry station A terminal from which info)»
`mation can be retrieved from a *database,
`Generally the terminal has a display and a
`keyboard, but
`there may also be ancillary
`devices such as a *badge reader. The user
`makes the inquiry Via the keyboard either in
`the form ofa question in plain text or by indi—
`eating a selection from a menu on the display.
`The display will show a series of possible
`selections that successively narrow the field
`of search. An inquiry station may also update
`information as the result of an action arising
`from an inquiry. An airline booking terminal
`is an example of an inquiry station. 566‘ also
`interrogation.
`inscribe To encode a document by printing
`information that is readable by both a person
`and a machine.
`
`insert 1. One of the basic actions performed on
`*sets that, when applied in the form
`inmate], 5)
`adds the element 8/ to the set S. Ife/ is already
`in S the operation has no effect on the mem—
`bership of 5. See a/xu operations on sets.
`2. One of the basic actions performed on
`*lists, that places a new element into a list,
`not necessarily at one end or the other.
`install 1. To take software from the distribu—
`tion files, which can be on floppy disks, CD .
`ROM, tapes, or on a remote networked com—
`puter, and place it in its permanent location
`from where it Will be executed. The installa—
`tion process is not just a straight copy as it
`involves unpacking compressed files, configi
`uring the software to suit its environment,
`and perhaps allowing the installer to choose
`how much of the software to install. A typical
`installation program will offer choices of
`minimum, custom, or full installations.
`2. To fit new hardware features to a computer.
`instance See instantiation, unification. See
`also object—oriented programming.
`
`DEF_J NT00000003
`
`DEF_JNT00000003
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 5 of 126 PageID #: 1626
`
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 5 of 126 PageID #: 1626
`
`
`
`
`‘13”
`
`IIII
`ll: LII-{L'Hnim'
`IIIL' wilthlny prim-v-
`III
`lw
`ulm'h mm‘m‘ mum-(HM: Ilm aha-uh!
`“'.ITthllHEIL'LI.
`{:r‘ UI purlu'ta 11ml
`Imw hcc'll
`l‘t'H’ILlH'L]
`In an Illl\\;Ll'\| 1_'rIn||L'«,|]nH rm: m
`Alli-Ad} JL‘li‘L‘.
`I'L-quniny [In [Lnkt't m um
`llntil llmw .lhl‘ilt] MI
`:1 h.l\( hu-n ”'.uhmiIu-‘L
`1H ”1:!“ HI'In- LlwilLL'HHh [L'I'J uh'iAI MILM. Ilu'
`1mm] nLHmI'L (lulu) 1‘. Hpimll} tllnllilmtnl l"\
`with“? -1'~“~L‘HIIII\
`lill'lL'h. {11) .mm L‘.
`'I'Ina H- Hc-I
`IIIL' HIM: ullL‘IL‘ Huh Hilt‘ “HLH :Ir'r HHHL mm
`nln-n-
`.‘~:IIL'HHL'\
`.II‘L‘
`L'mH}
`g.:t,‘c:~t:lhlln'.lr\
`:n\ uh rd.
`
`network fax HM alum-m m “hit-I1 IM' digiml
`mlirl'mnlinn Illut L'IHIIIN‘iHl‘H IIIL'
`I;l'\ Tlh'knittt
`I» tramklniHI-d :H'T'U-a- .1 this.
`I'H.‘[\\EII'L. r'ulht'l‘
`than .lLIIm :1 H|\i.‘L'Lh IIL'HHHL “5in Inmlvrm
`'l-Itl'h)hll'l|1 mu} \wll ht,-c:|1|hu1th-d m.
`;| “GI
`illl-L' 1” i.
`II'IHI‘C #‘L‘IILlltll
`'IIJIHIIITHL l'li‘ll'IHHHl'lll
`MIL‘II a» .1
`\\III‘LI prurmaing: alum-n1,
`Network File Service (NFS) \sz ‘.I llr'tllu
`L'llih llml lllll mar .m ‘|.!in‘rm'1Ill‘lnmlmuui
`HHL'I' HUH'IUJ‘I
`lltl‘
`'filu 'II‘L'LllhIL'I‘
`:lm‘
`llL't‘L‘Hw‘
`and It” “gauging.
`'HIL‘ Ht‘xlt‘tll
`\ma I:I'i_1!iH.iH_\
`lluu-[nln‘d h} ’ Hun 1n nllrm |I|u lN.‘ gut uan
`amt-mun nitlmul than: it [\I'mnlvh tIIL‘ .Ilnlil}
`for our \\'l|l'|nl‘.llllll\. uiflmm :Iialm.
`In my
`'.lnnth'r nm‘iliiun.
`lnlh LIN-J“ In mppl}
`Imrh il lih: «Inn: and paging rulmlml'l
`'l‘ht- “"1
`IL'I'II iH mm UHL‘TCLI 1‘} Ulllt'l' nllppH-er .Imi Imn
`ht't'ullll; ‘.I LIL' lnt'lu Hullthutl H)1'\\L:I'L HI
`[IliH
`lel.
`
`network from and \H .Hni‘ml‘} pruL'l'M-m In
`31). alum .H'lm'llt'll
`In .mmhk'l.
`llHll‘.l”_‘-
`l.1l'!.'.<'1.
`LUWPUIC! hl'it‘Lint'HIh In t‘tHlHL't'l
`[IIHI \lmi
`||lllt'l' In .I m-qul'lc. ‘l'hr Hmllx Hi
`:1 kuul'L
`fl'fln' L‘ml ‘.II'c [H il‘lll‘l'HH'
`||\t.‘l':l“ IIL'J'TUI‘EH‘IEHL‘
`ll} Llump. rIL'lmn'I. H'I.1lt‘dl.|~.|.~ rlml “IIHILI lw
`upt'miw Im [hr mum L‘HHIIHIH‘I', .lml In le
`\L‘l'l
`rlw Hmnlarti “Horton-w JIM pr'nlm‘nh
`mmi In [In L-\IL-I'n.ll m-I um mm :1 Iain] lu'l-
`IL'I' Hutui In Hw hum] n Klt‘H't'k inlnr'n.11 :IIJL'H-
`\
`I]L'[\\lll‘|‘ F'I'nnl LHILI
`Hull [and \iL‘L‘
`\L'I-MJ
`Hm iIIMI ho \Iu'ul Illl1l!|flt[1‘t'\
`.l alllglL' m‘l-
`UHI'L iIHL'I‘IHLL'
`:lll‘ml‘xy wu'rnl mmpnm-h.
`III
`nlmgh tum-
`Iht‘ $34.1“an l'rm'll HM Hm}
`1W
`Lunaitlcrt'LI .1 ’ynlt'nn) “1"‘lvl'itlutu
`network
`interconnection
`.‘m
`m‘l\\m'LIny,. IIHM'IIVI
`nmIIIL-HJ
`network layer ul
`.wnsn Lin-r rrh‘mn-u HIHLIL'I‘
`
`I'LmI'Imn.
`
`.‘m'
`
`NEURAL NETWORK
`
`lu‘ .I|'[I\ll\ (:I nmn
`network manage-mam ‘I
`nuinn‘n lmmpum'] nut-mm L. \L'HHHLH‘ L111“:
`I‘m“) LLIM IILHHH'LH‘ .lt't'|'(IH'\|I|{‘\4|1||HITILHII
`indent-mkmh urn-Janina nnils. uln-n Irum .l
`IILImlIL-r' H!
`tllllt'l't‘lll hltl'tlthlfl'k‘
`JR “1‘” .ll.
`llhiIH.‘ m \ iL‘." pn-mlnl
`h} nIIw:
`.munuiu
`Hmlx .la
`‘]'l"J'~. [or utmlt;
`I'BJI'M [If
`Iln‘ m-I
`“UI'L In ua'dL-I Im' Iln m-Iu m-L. In M'
`I'LLI'I
`r‘L-li
`AH). fur I.Iu\h 1.: IN' “It‘lHTHl'L‘.
`if-HliHUL ‘IIHI
`l'k']‘):li\L‘t|. :Ltnl I'm ||It':|t"l\'\1>1L:l*-u.l nlmlt'mhc
`LIL'\L‘|II]|L‘Ii in .I c'nml'u‘lrd IIILIIII'II.‘I'.
`il
`I'u m‘l'l'h
`‘4:ll‘\ lu Inna '.x
`ll'LulliljJt'lUL'lll n'llul} ulwrurmg
`.ll M'\L‘l.ll
`\HL'IH:
`(i1)IULIISIM'LHHL‘CU‘IHl‘lLiilliltllllllIf-I-IL.
`Ill) HHIIIHL' LIJHL'tlillll wal Ll.ll:i (Ill milum ul
`L'unm-umm .Iml HI IlL-Imn'L I‘lmlh‘.
`EL') ANN} In qnn‘} l‘w Halllk (a! m'lmn‘l.
`INNIL'H' in I‘I'tll't
`In :I.\.'-i~l in I:ILI|I lllmlilill;
`ttl'l JIM!” In t Hmml th‘ \|.Ithh n] IIL‘InIu‘k
`Inuit-LL Im'ludin:Y tt"xL‘lltFtt‘
`l'L-uhll'liflpv NIL!
`IL'luutlillg; uilh whum't"
`(r! .mltilil) In “IIIHh‘M 1|L‘I\\Ul'l\ Ilndh lr-II11
`HL'E‘1IL'L.:IHL|
`In rusunl'lum‘u rmlling infiunm
`Iirm.
`IdL'JHL thc ITI.II1.:;:L‘1' \wnlltl Mu: In [w ‘.IML'
`[n I'u‘x‘harrn '.I“ IIICNL‘ th‘m iln'a I'I'Iml .1 \un'Lmu
`rum L‘unIIt-rfml m llw m-rum't.‘
`I"ur lhig1 1”le-
`I‘lfll'ltfl Iln' mules HILM ll'tl'tl'lht‘lu'h ht' Ira-mud
`m.
`.I\ll.lt'L'.‘-r-;|N(‘ whjt‘rl‘.‘ nn Ihu; rut-[Mark .lml
`llwrt'
`[111ml he :1 pltmmfl [Inn :IHuuH fililmllh
`.mtlmriml .III-l m|khl|th.-:|
`|‘n.-:'~.nm|ul In turn
`uul
`Imlh IhL'
`lumnlu .Il‘|i\'il'|{.'~‘
`(‘4) mm :11)
`.LImIL.
`.lilLl HI
`l-ilxl‘ L‘H'Tt‘LEi‘L‘ :lttmu in II‘I('
`L-u-mIII-.1Hillli'c.'IIIIL'H.‘inrlhlltlillllL'pl'nlm'uI.
`‘HNMI’ (MIHPII‘ Ih'Imu'L mumgmnn-nl prom
`mt).
`.HlLI
`IIL;I:|\
`HH hllpl‘litII'N mm HI.Ir'Lt-I
`pl'mlthfh ”I'M (MI DI‘HLLNH H\'\| P \l‘ll'I‘iL'L .mJ
`LIJH'IIHRHILiH.
`
`u‘lldrm irll‘wulm'mlunp,[twt'rx'l>l|1ltlli1wlg.IT'MHI
`
`network topology .N'n‘ Iu-I MUI'L .ITLIJJIL-L'
`
`network virtual terminal (NUT) Hu- 'H‘l‘
`\I'Z'l'. Nu m5” \Irliml IL'I'miI'mI.
`
`\ L'IHHleIL'i' «mt-m lmwi
`neural computer
`Ibll
`_I
`‘ m‘urnl m-mmL,
`
`\Iurm U‘ rumlmld-
`neural "EtWDTk (LII' net)
`Iiun illnpirrd 11) Iln‘ HI'ULHII‘L‘ Md JLIHL'H-m or
`IIN' ht-lilt. (in: ll'l'HilVH HI
`I|Ii~.
`in iIH IuHmu
`IIIIN'
`llllfitllfltl‘l H '.I "\u'lgllltwl llll't'L‘IL't] _Lxr'.||:h.
`‘ \mln Ill IIK' umph um tn‘ Illl ”1' nH'. ‘l‘ll'l'tl: la
`dim'wlr
`\I L'M‘II limr inmml ‘IH Iln- on det -
`
`DEF_JNT00000071
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 6 of 126 PageID #: 1627
`
`V
`
`Di CSI
`Jill
`
`v The most comprehensive computing dictionary suer published
`v More than 18,,909 entries
`
`DEF_JNT00000004
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 7 of 126 PageID #: 1628
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 7 of 126 PageID #: 1628
`
`IBM DICTIONARY
`IBM DICTIONARY
`OF COMPUTING
`OF COMPUTING
`
`DEF_J NT00000005
`
`DEF_JNT00000005
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 8 of 126 PageID #: 1629
`
`IBM DICTIONARY
`OF COMPUTING
`
`Compiled and edited by
`GEORGE McDANIEL
`
`McGRAW-HILL, INC.
`New York San Francisco Washington, D.C. Auckland Bogota
`Caracas Lisbon London Madrid Mexico City Milan
`Montreal New Delhi San Juan Singapore
`Sydney Tokyo Toronto
`
`DEF_JNT00000006
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 9 of 126 PageID #: 1630
`
`Limitation of Liability
`While the Editor and Publisher of this book have made reasonable efforts to
`ensure the accuracy and timeliness of the information contained herein, nei-
`ther the Editor nor the Publisher shall have any liability with respect to loss or
`damage caused or alleged to be caused by reliance on any information con-
`tained herein.
`
`Copyright © 1994 by International Business Machines Corporation. All rights
`reserved. Printed in the United States of America. Except as permitted under
`the United States Copyright Act of 1976, no part of this publication may be
`reproduced or distributed in any form or by any means, or stored in a data
`base or retrieval system, without the prior written permisssion of the pub-
`lisher.
`
`1 2 3 4 5 67 8 9 0 DOC/DOC 9 9 8 7 6 5 4 3
`
`ISBN 0-07-031488-8 (HC)
`ISBN 0-07-031489-6 (PBK)
`
`The sponsoring editor for this book was Daniel A. Gonneau and the
`production supervisor was Thomas G. Kowalczyk.
`
`Printed and bound by R. R. Donnelley & Sons Company.
`
`Tenth Edition (August 1993)
`This is a major revision of the IBM Dictionary of Computing, SC20-1699-8,
`which is made obsolete by this edition. Changes are made periodically to the
`information provided herein.
`It is possible that this material may contain reference to, or information about,
`IBM products (machines and programs), programming, or services that are
`not announced in your country. Such references or information must not be
`construed to mean that IBM intends to announce such IBM products, pro-
`gramming, or services in your country. Comments may be addressed to IBM
`Corporation, Department E37/656, P. O. Box 12195, Research Triangle Park,
`NC 27709.
`
`International Edition
`Copyright © 1994 by International Business Machines Corporation. Exclusive
`rights by McGraw-Hill, Inc. for manufacture and export. This book cannot be
`re-exported from the country to which it is consigned by McGraw-Hill. The
`International Edition is not available in North America.
`When ordering this title, use ISBN 0-07-113383-6.
`
`This book is printed on acid-free paper.
`
`DEF_JNT00000007
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 10 of 126 PageID #: 1631
`
`Special Notice
`
`The following terms are trademarks or registered trademarks of the IBM Corpora-
`tion in the United States or other countries:
`• ACF/VTAM (cid:9)
`• Advanced Function Printing (cid:9)
`• AFP (cid:9)
`• AlXwindows (cid:9)
`• AIX (cid:9)
`• AIX Enhanced X-Windows
`• AML/2
`• Application System/400
`• APPN
`• AS/400
`• BookMaster
`• Common User Access
`• CUA
`• DATABASE 2
`• DB2
`• DFSMS
`• ES CON
`• Enterprise Systems Connection
`• graPHIGS
`• IBM
`• IBM Operating System/2
`• ImagePlus
`• InfoExplorer
`• InfoWindow
`
`• LinkWay
`• Micro Channel
`• MVS/DFP
`• MVS/ESA
`• MVS/SP
`• MVS/XA
`• NetView
`• Operating System/400
`• OS/2
`• OS/400
`• PC Network
`• PenPM operating system
`• Port-A-Punch
`• Presentation Manager
`• PROFS
`• PS
`• PS/2
`• RISC System/6000
`• SAA
`• Selectric
`• SNAP/SHOT
`• Storyboard
`• System/360
`• System/370
`
`V
`
`DEF_JNT00000008
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 11 of 126 PageID #: 1632
`
`• VM/ESA
`• VM/XA
`• VTAM
`
`• Systems Application Architecture (cid:9)
`• Ultimedia (cid:9)
`• Virtual Machine/Extended (cid:9)
`Architecture
`The following terms are trademarks or registered trademarks of other organizations:
`• AT&T (Trademark of American Telephone and Telegraph Co.)
`• Beta (Trademark of Sony Corporation)
`• Multimedia PC (Trademark of Multimedia PC Marketing Council)
`• Mylar (Trademark of E.I. du Pont de Nemours & Co., Inc.)
`• UNIX (Trademark of AT&T Bell Laboratories)
`• XENIX (Trademark of the Microsoft Corporation with enhancements by the
`University of California at Berkeley)
`
`vi
`
`DEF_JNT00000009
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 12 of 126 PageID #: 1633
`
`Preface
`
`Although this is the tenth edition of the IBM Dictionary of Computing, it is the first
`edition to be made generally available to the public. Beginning as a small manual
`more than 20 years ago, when it was used primarily as a reference for IBM's techni-
`cal writers, it has grown steadily in size, scope, and audience. It now contains more
`than 22,000 entries selected from the full range of IBM's hardware and software
`products. In addition, it reprints by permission entries from industry standards in
`both the United States and the international community (see below).
`This dictionary provides a comprehensive reference for anyone who uses, main-
`tains, or has an interest in information processing systems, communication products
`and facilities, personal computers and office systems. Some of these terms may have
`other meanings in other contexts, or among people not familiar with the use of these
`terms in information processing, communication, personal computers, and office
`systems. With the exception of common electrical and metric measures, the dictio-
`nary excludes terms that are defined in nontechnical dictionaries and that have no
`special meaning in information processing.
`
`Sources
`This dictionary includes terms and definitions from:
`The American National Standard Dictionary for Information Systems, ANSI
`X3.172-1990, copyright 1990 by the American National Standards Institute
`(ANSI). Copies may be purchased from the American National Standards Insti-
`tute, 11 West 42nd Street, New York, New York 10036. Definitions are identified
`by the symbol (A) after the definition.
`The ANSI/EIA Standard-440-A, Fiber Optic Terminology. Copies may be pur-
`chased from the Electronic Industries Association, 2001 Pennsylvania Avenue,
`N.W., Washington, DC 20006. Definitions are identified by the symbol (E) after
`the definition.
`The Information Technology Vocabulary, developed by Subcommittee 1, Joint
`Technical Committee 1, of the International Organization for Standardization
`and the International Electrotechnical Commission (ISO/IEC JTC1/SC1). Defi-
`nitions of published parts of this vocabulary are identified by the symbol (I) after
`the definition; definitions taken from draft international standards, committee
`
`DEF_JNT00000010
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 13 of 126 PageID #: 1634
`
`drafts, and working papers being developed by ISO/IEC JTC1/SC1 are identified
`by the symbol (T) after the definition, indicating that final agreement has not yet
`been reached among the participating National Bodies of SC1.
`• Information for IBM products. Definitions that are specific to IBM products are
`so labeled, for example, "In SNA," or "In VM."
`
`Sequence and Organization of Entries
`This dictionary uses the letter-by-letter method of alphabetizing entries. Only alpha-
`betic and numerical characters are used to determine sequence; special characters
`and spaces between words are ignored.
`Each entry consists of a single-word or multiple-word term or the abbreviation or
`acronym for a term, followed by a commentary. A commentary includes one or
`more items (definitions or references) and is organized as follows:
`• An item number, if the commentary contains two or more items.
`• A usage label, indicating the area of application of the term, for example, "In pro-
`gramming," or "In SNA."
`• A descriptive phrase, stating the basic meaning of the term. The descriptive
`phrase is assumed to be preceded by "the term is defined as ..." The part of speech
`being defined is indicated by the opening words of the descriptive phrase: "To ..."
`indicates a verb and "Pertaining to ..." indicates a modifier. Any other wording
`indicates a noun or noun phrase.
`• Annotative sentences, providing additional or explanatory information.
`• References, directing the reader to other entries or items in the dictionary.
`• A source label, for example, (A), (E), (I), or (T), that follows the definition and
`identifies the originator of the definition. See "Sources" above. Definitions with-
`out source labels are IBM definitions.
`
`VIII
`
`DEF_JNT00000011
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 14 of 126 PageID #: 1635
`
`Synonym for (cid:9)
`
`Synonymous with (cid:9)
`
`References
`The following cross-references are used in this dictionary:
`Contrast with (cid:9)
`This refers to a term that has an opposed or substan-
`tively different meaning.
`This indicates that the term has the same meaning as a
`preferred term, which is defined in its proper place in
`the dictionary.
`This is a backward reference from a defined term to all
`other terms that have the same meaning.
`This refers the reader to multiple-word terms that have
`the same last word.
`This refers the reader to terms that have a related, but
`not synonymous, meaning.
`Deprecated term for This indicates that the term should not be used. It
`refers to a preferred term, which is defined in its
`proper place in the dictionary.
`
`See (cid:9)
`
`See also (cid:9)
`
`Selection of Terms
`A term is a word or group of words to be defined. In this dictionary, the singular
`form of the noun and the infinitive form of the verb are the terms most often
`selected to be defined. If the term may be abbreviated, the abbreviation is given in
`parentheses immediately following the term. The abbreviation is also defined in its
`proper place in the dictionary.
`
`Comments Requested
`Terminology in the computer field is constantly evolving. No printed reference can
`hope to remain current for long. For that reason, we are continually revising the con-
`tent of this book, adding new terms and definitions as they gain acceptance, discard-
`ing old entries as they become obsolete. In order to keep up with these changes, we
`invite comments from all of our users. Please address them as follows:
`IBM Dictionary of Computing
`IBM Corporation
`Dept. E37, Bldg. 656
`Research Triangle Park, NC 27709
`Telephone 919-254-0209
`Fax 919-254-0343
`Internet: ibmterms@vnet.ibm.com
`When you send comments to IBM, you grant IBM a nonexclusive right to use or dis-
`tribute your comments in any way it believes appropriate without incurring any obli-
`gation to you.
`
`ix
`
`DEF_JNT00000012
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 15 of 126 PageID #: 1636
`
`Acknowledgments
`Only someone who has tried to make a large dictionary has any idea of how many
`people are needed to complete the task. Moreover, not even the dictionary maker
`himself knows exactly who all those people are. Entries, suggestions, complaints, and
`queries seem to come from everywhere, and the terms and definitions that eventu-
`ally result have been touched by many hands, not a few of them unseen. For this rea-
`son, any "Acknowledgments" list is likely to be incomplete. This list is no
`exception.
`There are some colleagues, however, both inside and outside IBM, whose assis-
`tance and support demand recognition. With apologies to those equally deserving
`who have been omitted, the editor would like to thank the following, in no particu-
`lar order:
`• The users of earlier editions who took the time to comment and make suggestions
`• Gary Violette, contract administrator extraordinary, without whose help this edi-
`tion would have been impossible
`• Lisa Champion, David Heath, Robin Langford, Lori Lathrop, Anita Mannion,
`Anne Rice, Adrianne Roberts, Carolyn Stephens, H. Ueno, Ian Wright, and all
`the other IBM terminology coordinators and editors who have provided me and
`this book with glossaries, comments, and other valuable input.
`• Mary Sturgeon, who did the same, but in such generous measure as to warrant
`special recognition
`• The members and consultants of ANSI-approved committee X3K5: Richard
`Batey, Lionel Difford, Eugene Dwyer, Rex Klopfenstein, Stanley Kurzban, Ste-
`fan Langsner, Jimmie Logan, Roy Mullinax, D. F. Stevens, Helmut Thiess, Saul
`Zaveler
`• Past and present members of ISO SC/i Working Group 7, including: Lars
`Algotsson, Bernard Bourguignon, Chantal Brochu, Boris Ermolayev, Gunnar
`Grahn, Evelyn Gray, Hideo Kikuchi, Hanna Kuznicka, Johanne L'Heureux,
`Francine Pitre
`• Bao Pham and Christian Mayer for their translation assistance
`• Dan Aitken, Rich Overton, and Mike Payst, for their invaluable help with macros,
`style files, programs, and other tools, always provided readily and, very often,
`immediately
`• Edie Lessick, who always understood why this book kept shoving all other proj-
`ects aside
`• Daniel Gonneau of McGraw-Hill
`• Aleck, Jim, Debbie, Judy, Betty, and Al
`• My Production Department buddies, Jean Billings, Steve Joyce, Marie Kolodij,
`Sandra Raynor, and Carole Lynch, who had to explain repeatedly the arcane
`details of such topics as BookMaster, PostScript, and the internal distribution of
`IBM books, and kept inviting me to lunch anyway
`
`x
`
`DEF_JNT00000013
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 16 of 126 PageID #: 1637
`
`• Last and most importantly of all, the creator and for two decades sustainer of this
`book, John Wood. Through edition after edition, it was he more than anyone else
`who left his indelible imprint here. I would be dishonest not to recognize that this
`work is, and will continue to be, "The Book of John."
`
`George McDaniel
`Research Triangle Park, N. C.
`
`xi
`
`DEF_JNT00000014
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 17 of 126 PageID #: 1638
`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 17 of 126 PageID #: 1638
`
`| i
`
`m.I
`
`OF COMPUTING
`
`DICTIONARY
`IBM DICTIONARY
`COMPUTING
`
`DEF_JNT00000015
`
`DEF_JNT00000015
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 18 of 126 PageID #: 1639
`
`holder
`
`41 ] (cid:9)
`
`auto-answer
`
`authority holder In the AS/400 system, an object that
`specifies and reserves an authority for a program-
`described database file before the file is created.
`When the file is created, the authority specified in the
`holder is linked to the file.
`
`authorization (1) In computer security, the right
`granted to a user to communicate with or make use of
`a computer system. (T) (cid:9)
`(2) An access right.
`(3) The process of granting a user either complete or
`restricted access to an object, resource, or function.
`(4) See also clearance.
`
`authorization checking The action of determining
`whether a user is permitted access to a
`RACF-protected resource.
`
`authorization code A code made up of user identifi-
`cation and password, used to protect against unauthor-
`ized access to data and system facilities.
`
`authorization credentials The evidence of a user's
`authority to access DPPX/DTMS resources. Authori-
`zation credentials are defined for a user in the user's
`profile. The authorization credentials required for
`access to a DPPX/DTMS resource, such as a database,
`are defined in the profile for the resource.
`
`authorization exit routine In VTAM programs, an
`optional installation exit routine that approves or dis-
`approves requests for session initiation.
`
`authorization ID In SQL, a user profile. A name
`identifying a user to whom privileges can be granted.
`
`node is authorized, all information it sends about itself
`is accepted. The authorization status of an end node
`is system-defined in its network node server. Contrast
`with unauthorized APPN end node.
`
`authorized command In DPPX, a command with a
`nonzero function authority credential (FAC) in its
`command profile.
`
`authorized end node Synonym for authorized APPN
`end node.
`
`authorized environment In DPPX, an active environ-
`ment whose associated user profile contains a nonzero
`function authority credential (FAC).
`
`authorized library A library that may contain author-
`ized programs.
`
`authorized operator In the NetView program, an
`operator who has been authorized to receive undeliver-
`able messages and lost terminal messages.
`
`authorized path In VTAM programs for MVS, a
`facility that enables an application program to specify
`that a data transfer or related operation be carried out
`in a privileged and more efficient manner.
`
`authorized program A system program or user
`program that is allowed to use restricted functions.
`
`authorized program analysis report (APAR) A
`report of a problem caused by a suspected defect in a
`current unaltered release of a program.
`
`authorization list In the AS/400 system, a list of two
`or more user IDs and their authorities for system
`resources.
`
`authorized program facility A facility that permits
`identification of programs authorized to use restricted
`functions.
`
`authorization list management authority In the
`AS/400 system, an object authority that allows the
`user to add users to, remove users from, and change
`users' authorities on the authorization list.
`
`authorized receiver In the NetView program, an
`authorized operator who receives all the unsolicited
`and authorized-receiver messages not assigned to a
`specific operator.
`
`authorization message An NCCF message that is
`directed to an authorized operator; for example, a
`message about the use of NCCF, such as a successful
`logon, repeated unsuccessful logons, a logon rejected
`because of an invalid password, a data services
`Manager error message, or logoff.
`
`authorize To permit or give authority to a user to
`communicate with or make use of an object, resource,
`or function.
`
`authorized APPN end node
`In APPN, an end node
`that is "trusted" by its network node server to supply
`directory and routing information about its resources
`that will affect the network directory database. If a
`
`authorized state A condition in which a problem
`program has access to resources that would otherwise
`not be available.
`authorized user (1) In DPPX, a user whose user
`profile contains a nonzero function authority credential
`(FAC). See also database administrator. See space
`manager.
`auto-abstract (1) Pertaining to the material abstracted
`from a document by machine methods. (2) To select
`keywords from a document by machine methods.
`
`auto-answer Synonym for automatic answering.
`
`DEF_JNT00000016
`
`

`

`Case 2:16-cv-00741-RWS Document 148-4 Filed 04/20/17 Page 19 of 126 PageID #: 1640
`
`condition-name-condition (cid:9)
`
`[1361 (cid:9)
`
`configuration report server (C$S)
`
`Note: When condition-name is used in the general
`formats, it represents a unique data item reference
`consisting of a syntactically correct combination of a
`condition-name, together with qualifiers and sub-
`scripts, as required for uniqueness of reference.
`
`condition-name-condition In COBOL, the proposi-
`tion, for which a truth value can be determined, that
`the value of a conditional variable is a member of the
`set of values attributed to a condition-name associated
`with the conditional variable.
`
`conditions See entry conditions.
`
`condition values In the IBM 8100 Information
`System, the values assigned to various combinations
`of the condition indicators; they may be used as mask
`values in conditional branching operations.
`
`conduit A pipe for protecting electric wires or cables.
`
`conference call Teleconferencing in which all partic-
`ipants are connected through telephone circuits that
`allow for the transmission of voice and possibly FAX
`messages. (T) See also computer conferencing.
`
`conference control Synonym for sensitivity control.
`
`conference microphone On dictation equipment, a
`microphone specially designed to record speech simul-
`taneously from mor

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket