`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 1 of 126 PageID #: 3227
`
`(cid:40)(cid:59)(cid:43)(cid:44)(cid:37)(cid:44)(cid:55)(cid:3)(cid:39)
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 2 of 126 PageID #: 3228
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 2 of 126 PageID #: 3228
`
`
`
`Dictionary _of
`Computlng
`
`Fourth Edition
`
`‘
`
`JJL‘
`
`Oxford New York Tokyo
`OXFORD UN|VERS|TY PRESS
`1996
`
`
`
`DEF_J NT00000001
`
`DEF_JNT00000001
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 3 of 126 PageID #: 3229
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 3 of 126 PageID #: 3229
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1 I‘ 1"“, 1'?
`
`'
`
`jr :1},
`) 1 i U"
`
`Oxford University Press, Walton Street, Oxford OX2 6DP
`Oxford New York
`Athens Auckland Bangkok Bogota Bombay
`Buenos Aires Calcutta Cape Town Dar es Salaam
`Delhi Florence Hong Kong Istanbul Karachi
`Kuala Lumpur Madras Madrid Melbourne
`Alexico City Nairobi Paris Singapore
`Taipei Tokyo Toronto
`and associated companies in
`Berlin Ibadan
`
`Oxfbtd is a trade mark of Oxford University Press
`Published in the United States
`by Oxford University Press Inc, New York
`
`© Market House Books, 1983, 1986, 1990, 1996
`
`Firstpublished 1993
`Reprinted 1983, 1984, 1985
`Second Edition 1986
`Third Edition 1990
`Reprinted 1990, I991 (twice), 1992
`Fourth Edition 1996
`
`All rights reserved. No part oft/tispublication may be
`reproduced, stored in a retrieval system, or transmitted, in any
`form or by any means, without the prior permission in writing ofOXfo/‘d
`University Press. Within the UK, exceptions are allowed in respect oj‘any
`fair dealingfor the purpose ofresearch orprivate study, or criticism or
`review, as permitted under the Copyright, Designs and Patents Act, 1988, or
`in the case of reprographic reproduction in accordance with the terms of
`licences issued by the Copyright Licensing Agency. Enquiries concerning
`reproduction outside those terms and in other countries should be sent to
`the Rights Department, Oxford University Press, at the address above.
`This book is sold subject to the condition that it shall not,
`by way oftrade or otherwise, be lent, re—sold, hiredout, or otherwise
`circulated without thepublisher's prior consent in anyform of binding
`or cover other than that in which it is published and without a similar
`condition including this condition being imposed
`on the subsequent purchaser.
`
`A catalogue recordfor this book is availablefrom the British Library
`
`Library of Congress Cataloging in Publication Data
`(Data available)
`ISBN 0#19785385573
`
`Text prepared by Market House Books Ltd, Aylesbury
`Printed in Great Britain by
`Biddles Ltd, Guildford & King‘s Lynn
`
`.
`I
`
`‘
`
`
`
`DEF_J NT00000002
`
`DEF_JNT00000002
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is inserted by the compiler at the point of
`call, thereby avoiding the overhead of a nor—
`mal function call.
`inner code Sec concatenated coding system.
`inoculation A technique for virus prevention
`in which a uterine, the *signature (but not
`the harmful code.) of a virus, is deliberately
`added to a program. This is effective only
`against those specific viruses that are prof
`grammcd to avoid reinfecting code by detect
`ing the presence of their own signature.
`inorder traversal Anni/161' nauwfiyr symmetric
`order traversal.
`
`input 1. The process of entering data into a
`processing system or a peripheral device, or
`the data that is entered.
`Z. A signal that is applied to an electrical cir—
`euit, such as a logic circuit.
`3. To enter data or apply a signal.
`
`input area' The area of main memory that is
`currently allocated to hold incoming data.
`The processing system will usually retrieve
`data from the input area and transfer it to a
`working area or
`register before
`it
`is
`processed. The result of the processing may
`be written to an *output area. Subroutines
`are usually organized so as to replenish the
`input area from a source such as an input
`peripheral or communication line and clear
`the output area by transfer to backing store.
`input device Any device that transfers data,
`programs, or signals into a processor system.
`Such devices provide the humanicomputer
`interface, the *keyhoard being the most com7
`mon example. Early computers also used
`punched paper tape and cards but these are
`now obsolete. Current devices
`include
`*pointing devices, *data collection termir
`nals, *speech recognition units, magnetic
`*card readers, and *document scanners. See
`also logical input device.
`input-limited process A process whose speed
`of execution is limited by the rate at which
`input data is available or obtained.
`input/output (l/O) The passing of informa—
`tion into or out of the central processing unit
`of a computer system, or the part of the sys—
`tem primarily dedicated to this activity. An
`important function of most [/0 equipment
`
`
`
`
`
`
`
`
`
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 4 of 126 PageID #: 3230
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 4 of 126 PagelD #: 3230
`
`
`
`INNER CODE
`
`244
`
`is the translation between the host preces,
`sor’s signals and the sounds, actions, or syme
`bols that are understood or generated by peg,
`ple.
`In some cases it may be translation
`between two types of machine—readable sig
`nals, as when a *barwode scanner reads the
`data—encoded package and translates it
`into
`an ASCII Code. 561' also l/O.
`
`inquiry station A terminal from which info)»
`mation can be retrieved from a *database,
`Generally the terminal has a display and a
`keyboard, but
`there may also be ancillary
`devices such as a *badge reader. The user
`makes the inquiry Via the keyboard either in
`the form ofa question in plain text or by indi—
`eating a selection from a menu on the display.
`The display will show a series of possible
`selections that successively narrow the field
`of search. An inquiry station may also update
`information as the result of an action arising
`from an inquiry. An airline booking terminal
`is an example of an inquiry station. 566‘ also
`interrogation.
`inscribe To encode a document by printing
`information that is readable by both a person
`and a machine.
`
`insert 1. One of the basic actions performed on
`*sets that, when applied in the form
`inmate], 5)
`adds the element 8/ to the set S. Ife/ is already
`in S the operation has no effect on the mem—
`bership of 5. See a/xu operations on sets.
`2. One of the basic actions performed on
`*lists, that places a new element into a list,
`not necessarily at one end or the other.
`install 1. To take software from the distribu—
`tion files, which can be on floppy disks, CD .
`ROM, tapes, or on a remote networked com—
`puter, and place it in its permanent location
`from where it Will be executed. The installa—
`tion process is not just a straight copy as it
`involves unpacking compressed files, configi
`uring the software to suit its environment,
`and perhaps allowing the installer to choose
`how much of the software to install. A typical
`installation program will offer choices of
`minimum, custom, or full installations.
`2. To fit new hardware features to a computer.
`instance See instantiation, unification. See
`also object—oriented programming.
`
`DEF_J NT00000003
`
`DEF_JNT00000003
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 5 of 126 PageID #: 3231
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 5 of 126 PageID #: 3231
`
`
`
`
`‘13”
`
`IIII
`ll: LII-{L'Hnim'
`[111' wilthlny prim-v-
`III
`lw
`ulm'h mm‘m‘ mum-(HM: Ilm aha-uh!
`“'.ITthllHEIL'LI.
`{:r‘ UI purlwm 11ml
`Imw hcc'll
`l‘t'H’ILlH'L]
`In an Illl\\;Ll'\| 1_'rIn||L'«,|]nH rm: m
`Alli-Ad} JL‘li‘L‘.
`I'L-quniny [In [1.1L 1.1-: m um
`llntil llmw .lhl‘ilt] MI
`:1 h.l\( hu-n ”'.uhmiIu-‘L
`1H ”1:!“ HI'In- Ll'xil'ljll‘flh [L'I'J uh'iAI 1mm. Ilu'
`1mm] nLHmI'L (lulu) 1‘. Hpimll} tllnllilmtnl l"\
`with“? -1'~“~L‘HIIII\
`lill'lL'h. {11) .mm L‘.
`'I'Ina H- Hc-I
`IIIL' HIM: ullL‘IL‘ Hillt Hilt‘ “HLH :Ir'r HHHL mm
`nln-n-
`.‘~:IIL'HHL'\
`.II‘L‘
`L'mH}
`tunnxruhun'JH
`:n\ uh rd.
`
`network fax \ 1.1x alum-m m “hit-I1 IM' digiml
`mlirl'mnlinn Illut L'IHIIIN‘iHl‘H IIIL'
`I;l'\ Tlh'knittt
`I» tramklniHI-d :H'T'U-a- .1 this.
`I'H.‘[\\EII'L. r'ulht'l‘
`”Mn.ltllthHHpL‘L‘LhIIL'HHIILLlhtr‘t'lt1IJLIl'rtlt.
`'l'lu' h)hll'll1 mu} \wll ht,-c:|1|hu1th-d m.
`;| “GI
`illl-L' 1” i.
`II'IHI‘C #‘L‘IILlltll
`'IIJIHIIITHL l'li‘ll'l}”l“l'll|
`MIL‘II a» .1
`\\III‘LI prurmaing: alum-n1,
`Network File Service (NFS) \sz ‘.I pull-.1
`L'llih llml lllll mar .m ‘|.!in‘rm'1Ill‘lumlmuui
`HHL'I' HUH'IUJ‘I
`lltl‘
`'filu 'II‘L'LllhIL'I‘
`:lm‘
`llL't‘L‘Hw‘
`and It” “gauging.
`'HIL‘ Ht‘xlt‘tll
`\ma I:I'i_1!iH.iH_\
`lluu-[nln‘d h} ’ Hun 1n nllrm |I|u lN.‘ gut uan
`amt-mun nitlmul KILHLHE :il [\I'mnlvh tIIL‘ .Ilnlil}
`for our \\'l|l'|nl‘.llllll\. uiflmm :Iialm.
`In my
`'.lnnth'r nm‘iliiun.
`lnlh LIN-J“ In mppl}
`Imrh il lih: «Inn: and paging rulmlml'l Thu 5‘"
`IL'I'II iH mm UHL‘TCLI 1‘} Ulllt'l' nllppH-er .Imi Imn
`ht't'ullll; ‘.I LIL' lnt'lu Hullthutl H)1'\\L:I'L HI
`[IliH
`lel.
`
`network from and \H .Hni‘ml‘} pruL'l'M-m In
`31). alum .H'lm'llt'll
`In .mmhk'l.
`llHll‘.l”_‘-
`l.1l'!.'.<'1.
`LUWPUIC! hl'it‘Lint'HIh In t‘tHlHL't'l
`[IIHI \lmi
`||lllt'l' In .I m-qul'lc. ‘l'hr Hmllx Hi
`:1 kuul'L
`fl'fln' L‘ml ‘.II'c [H i:‘|l[H'Ii\L'
`||\t.‘l':l“ IIL'J'TUI‘EH‘IEHL‘
`ll} Llump. rIL'lmn'I. H'I.1lt‘dl.|~.|.~ rlml “IIHILI lw
`upt'miw Im [hr mum L‘HHIIHIH‘I', .lml In le
`\L‘l'l
`rlw Hmnlarti
`IHII‘I'LH't'H JIM pr'nlm‘nh
`mmi In [In L-\IL-I'n.ll m-I “mm mm :1 Iain] lu'l-
`IL'I' Hutui In Hw hum] n Klt‘H't'k inlnr'n.11 :IIJL'H-
`\
`I]L'[\\lll‘|‘ F'I'nnl LHILI
`Hull [and \iL‘L‘
`\L'I-MJ
`Hm iIIMI ho \Iu'ul Illl1l!|flt[1‘t'\
`.l alllglL' m‘l-
`UHI'L ilHL‘l‘IHLL'
`:lll‘ml‘xy wu'rnl mmpnm-h.
`III
`nlmgh tum-
`Iht‘ $34.1“an l'rm'll HM Hm}
`1W
`Lunaitlcrt'LI .1 ’ynlt'nn) “1"‘lvl'itlutu
`network
`interconnection
`.‘m
`m‘l\\m'LIny,. IIHM'IM
`nmIIIL-HJ
`network layer ul
`.wnsn Lin-r rrh‘mn-u HIHLIL'I‘
`
`I'LmI'Imn.
`
`.‘m'
`
`NEURAL NETWORK
`
`lu‘ .I|'[I\ll\ (:I nmn
`network manage-mam ‘I
`nuinn‘n lmmpum‘] nut-mm L. \L'HHHLH‘ L'hIIL'
`I‘m“) LLIM IILHHH'LH‘ .lt't'|'(IH'\|I|{‘\4|1||HITILHII
`indent-mkmh urn-Janina nnils. uln-n Irum .l
`IILImlIL-r' H!
`tllllt'l't‘lll hltl'tlflhfl'k‘
`.lk
`\ll‘” .15
`llhiIH.‘ m \ iL‘." PHIULIL'LI
`h} nIIw:
`.munuiu
`Hmlx .la
`‘]'l"J'~. [or utmlt;
`I'BJI'M [If
`Iln‘ m-I
`“UI'L In ua'dL-I Im' Iln m-Iu m-L. In M'
`I'LLI'I
`r‘L-li
`AH). fur I.Iu\h 1.: IN' “It‘lHTHl'L‘.
`if-HliHUL ‘IIHI
`l'k']‘):li\L‘t|. :Ltnl I'm ||It':|t"l\'\1>1L:l*-u.l nlmlt'mhc
`LIL'\L‘|II]|L‘Ii in .I c'nml'u‘lrd IIILIIII'II.‘I'. 1|
`I'u m‘l'l'h
`‘4:ll‘\
`thML‘Hli'L;J!|:Ij_'\.'I11L'IIl M'IHII} ulwrurmg
`.ll M'\L‘l.ll
`\HL'IH:
`(‘.I) IULIIiIM' wHL‘cliHH l‘l Liillil ml mm“
`Ill) HHIIIHL' LIJHL'tlillll wal Ll.ll:i (Ill milum (1|
`L'unm-umm .Iml HI IlL-Imn'L I‘lmlh‘.
`EL')
`.ll‘i‘H"
`In qnn‘} l‘w Halllk (a! m'lmn‘l.
`INNIL'H'
`i11l‘l'tll'1 In :I.\.'-i~l in I:ILI|I lm‘llinll;
`ttl'l JIM!” In t Hmml th‘ \|.Ithh n] IIL‘InIu‘k
`Inuit-LL Im'ludin:Y t1"xL‘lltFtt‘
`l'L-uhll'liflpv NIL!
`IL'luutlillg; uilh whum't"
`(r! .mltilil) In “IIIHh‘M 1|L‘I\\Ul'l\ Ilndh lr-II11
`HL'E‘1IL'L.:IHL|
`In rusunl'lum‘u rmlling infiunm
`Iirm.
`IdL'JHL thc ITI.II1.:;:L‘1' \wnlltl Mu: In [w ‘.IML'
`[n I'u‘x‘harrn '.I“ IIICNL‘ th‘m iln'a I'I'Iml .1 \un'Lmu
`rum L‘unIIt-rfml m llw m-rum't.‘
`I"ur lhig1 1”le-
`I‘lfll'ltfl Iln' mules HILM ll"l"ll'lht‘|\('h ht' Ira-mud
`m.
`.I\ll.lt'L'.‘-r-;|N(‘ whjt‘rl‘.‘ nn Ihu; rut-[Mark .lml
`llwrt'
`[111ml he :1 pltmmfl [Inn :IHuuH fililmllh
`.mtlmriml .III-l qurllth-nl
`|‘n.-:'~.nm|ul In turn
`uul
`Imlh IhL'
`lumnlu .Il‘|i\'il'|{.'~‘
`(‘4) mm :11)
`.LImIL.
`.lilLl HI
`l-ilxl‘ L‘H'Tt‘LEi‘L‘ :lttmu in II‘I('
`L-u-mIII-.1Hillli'c.'IIIIL'H.‘imlanlHML'pl'nlm'uI.
`‘HNMI’ (Mmph‘ Ih'Imu'L mumgmnn-nl prom
`mt).
`.HlLI
`IIL;I:|\
`HH hllpl‘litfl'N mm HI.Ir'Lt-I
`pl'mlthfh ”I'M (MI DI‘HLLNH H\'\| P \l‘ll'I‘iL'L .mJ
`LIJH'IIHRHILiH.
`
`wild An impulm' mlunp, [ht-1r “ml-Anni: .m L. HI
`
`network topology .N'n‘ Iu-I MUI'L .ITLIJJIL-L'
`
`network virtual terminal (NUT) Hu- 'H‘l‘
`\I'Z'l'. Nu m5” \Irliml IL'I'miI'mI.
`
`\ L'IHHleIL'i' «mt-m lmwi
`neural computer
`Ibll
`_I
`‘ m‘urnl m-mmL,
`
`\Iurm U‘ rumlmld-
`neural "EtWDTk (LII' net)
`Iiun illnpirrd 11) Iln‘ HI'ULHII‘L‘ Md JLIHL'H-m or
`IIN' ht-lilt. (in: ll'l'HilVH HI
`I|Ii~.
`in iIH IuHmu
`IIIIN'
`llllfitllfltl‘l H '.I "ut'lgllltwlxlll't'L‘lt'L]11mph.
`‘ \mln Ill IIK' Elllph um tn‘ Illl ”1' “W. ‘l‘II'I'HJ la
`dim'wlr
`\I L'M‘II limr inmml ‘Ill Iln- on det -
`
`DEF_JNT00000071
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 6 of 126 PageID #: 3232
`
`V
`
`Di CSI
`Jill
`
`v The most comprehensive computing dictionary suer published
`v More than 18,,909 entries
`
`DEF_JNT00000004
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 7 of 126 PageID #: 3233
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 7 of 126 PageID #: 3233
`
`IBM DICTIONARY
`IBM DICTIONARY
`OF COMPUTING
`OF COMPUTING
`
`DEF_J NT00000005
`
`DEF_JNT00000005
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 8 of 126 PageID #: 3234
`
`IBM DICTIONARY
`OF COMPUTING
`
`Compiled and edited by
`GEORGE McDANIEL
`
`McGRAW-HILL, INC.
`New York San Francisco Washington, D.C. Auckland Bogota
`Caracas Lisbon London Madrid Mexico City Milan
`Montreal New Delhi San Juan Singapore
`Sydney Tokyo Toronto
`
`DEF_JNT00000006
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 9 of 126 PageID #: 3235
`
`Limitation of Liability
`While the Editor and Publisher of this book have made reasonable efforts to
`ensure the accuracy and timeliness of the information contained herein, nei-
`ther the Editor nor the Publisher shall have any liability with respect to loss or
`damage caused or alleged to be caused by reliance on any information con-
`tained herein.
`
`Copyright © 1994 by International Business Machines Corporation. All rights
`reserved. Printed in the United States of America. Except as permitted under
`the United States Copyright Act of 1976, no part of this publication may be
`reproduced or distributed in any form or by any means, or stored in a data
`base or retrieval system, without the prior written permisssion of the pub-
`lisher.
`
`1 2 3 4 5 67 8 9 0 DOC/DOC 9 9 8 7 6 5 4 3
`
`ISBN 0-07-031488-8 (HC)
`ISBN 0-07-031489-6 (PBK)
`
`The sponsoring editor for this book was Daniel A. Gonneau and the
`production supervisor was Thomas G. Kowalczyk.
`
`Printed and bound by R. R. Donnelley & Sons Company.
`
`Tenth Edition (August 1993)
`This is a major revision of the IBM Dictionary of Computing, SC20-1699-8,
`which is made obsolete by this edition. Changes are made periodically to the
`information provided herein.
`It is possible that this material may contain reference to, or information about,
`IBM products (machines and programs), programming, or services that are
`not announced in your country. Such references or information must not be
`construed to mean that IBM intends to announce such IBM products, pro-
`gramming, or services in your country. Comments may be addressed to IBM
`Corporation, Department E37/656, P. O. Box 12195, Research Triangle Park,
`NC 27709.
`
`International Edition
`Copyright © 1994 by International Business Machines Corporation. Exclusive
`rights by McGraw-Hill, Inc. for manufacture and export. This book cannot be
`re-exported from the country to which it is consigned by McGraw-Hill. The
`International Edition is not available in North America.
`When ordering this title, use ISBN 0-07-113383-6.
`
`This book is printed on acid-free paper.
`
`DEF_JNT00000007
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 10 of 126 PageID #: 3236
`
`Special Notice
`
`The following terms are trademarks or registered trademarks of the IBM Corpora-
`tion in the United States or other countries:
`• ACF/VTAM (cid:9)
`• Advanced Function Printing (cid:9)
`• AFP (cid:9)
`• AlXwindows (cid:9)
`• AIX (cid:9)
`• AIX Enhanced X-Windows
`• AML/2
`• Application System/400
`• APPN
`• AS/400
`• BookMaster
`• Common User Access
`• CUA
`• DATABASE 2
`• DB2
`• DFSMS
`• ES CON
`• Enterprise Systems Connection
`• graPHIGS
`• IBM
`• IBM Operating System/2
`• ImagePlus
`• InfoExplorer
`• InfoWindow
`
`• LinkWay
`• Micro Channel
`• MVS/DFP
`• MVS/ESA
`• MVS/SP
`• MVS/XA
`• NetView
`• Operating System/400
`• OS/2
`• OS/400
`• PC Network
`• PenPM operating system
`• Port-A-Punch
`• Presentation Manager
`• PROFS
`• PS
`• PS/2
`• RISC System/6000
`• SAA
`• Selectric
`• SNAP/SHOT
`• Storyboard
`• System/360
`• System/370
`
`V
`
`DEF_JNT00000008
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 11 of 126 PageID #: 3237
`
`• VM/ESA
`• VM/XA
`• VTAM
`
`• Systems Application Architecture (cid:9)
`• Ultimedia (cid:9)
`• Virtual Machine/Extended (cid:9)
`Architecture
`The following terms are trademarks or registered trademarks of other organizations:
`• AT&T (Trademark of American Telephone and Telegraph Co.)
`• Beta (Trademark of Sony Corporation)
`• Multimedia PC (Trademark of Multimedia PC Marketing Council)
`• Mylar (Trademark of E.I. du Pont de Nemours & Co., Inc.)
`• UNIX (Trademark of AT&T Bell Laboratories)
`• XENIX (Trademark of the Microsoft Corporation with enhancements by the
`University of California at Berkeley)
`
`vi
`
`DEF_JNT00000009
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 12 of 126 PageID #: 3238
`
`Preface
`
`Although this is the tenth edition of the IBM Dictionary of Computing, it is the first
`edition to be made generally available to the public. Beginning as a small manual
`more than 20 years ago, when it was used primarily as a reference for IBM's techni-
`cal writers, it has grown steadily in size, scope, and audience. It now contains more
`than 22,000 entries selected from the full range of IBM's hardware and software
`products. In addition, it reprints by permission entries from industry standards in
`both the United States and the international community (see below).
`This dictionary provides a comprehensive reference for anyone who uses, main-
`tains, or has an interest in information processing systems, communication products
`and facilities, personal computers and office systems. Some of these terms may have
`other meanings in other contexts, or among people not familiar with the use of these
`terms in information processing, communication, personal computers, and office
`systems. With the exception of common electrical and metric measures, the dictio-
`nary excludes terms that are defined in nontechnical dictionaries and that have no
`special meaning in information processing.
`
`Sources
`This dictionary includes terms and definitions from:
`The American National Standard Dictionary for Information Systems, ANSI
`X3.172-1990, copyright 1990 by the American National Standards Institute
`(ANSI). Copies may be purchased from the American National Standards Insti-
`tute, 11 West 42nd Street, New York, New York 10036. Definitions are identified
`by the symbol (A) after the definition.
`The ANSI/EIA Standard-440-A, Fiber Optic Terminology. Copies may be pur-
`chased from the Electronic Industries Association, 2001 Pennsylvania Avenue,
`N.W., Washington, DC 20006. Definitions are identified by the symbol (E) after
`the definition.
`The Information Technology Vocabulary, developed by Subcommittee 1, Joint
`Technical Committee 1, of the International Organization for Standardization
`and the International Electrotechnical Commission (ISO/IEC JTC1/SC1). Defi-
`nitions of published parts of this vocabulary are identified by the symbol (I) after
`the definition; definitions taken from draft international standards, committee
`
`DEF_JNT00000010
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 13 of 126 PageID #: 3239
`
`drafts, and working papers being developed by ISO/IEC JTC1/SC1 are identified
`by the symbol (T) after the definition, indicating that final agreement has not yet
`been reached among the participating National Bodies of SC1.
`• Information for IBM products. Definitions that are specific to IBM products are
`so labeled, for example, "In SNA," or "In VM."
`
`Sequence and Organization of Entries
`This dictionary uses the letter-by-letter method of alphabetizing entries. Only alpha-
`betic and numerical characters are used to determine sequence; special characters
`and spaces between words are ignored.
`Each entry consists of a single-word or multiple-word term or the abbreviation or
`acronym for a term, followed by a commentary. A commentary includes one or
`more items (definitions or references) and is organized as follows:
`• An item number, if the commentary contains two or more items.
`• A usage label, indicating the area of application of the term, for example, "In pro-
`gramming," or "In SNA."
`• A descriptive phrase, stating the basic meaning of the term. The descriptive
`phrase is assumed to be preceded by "the term is defined as ..." The part of speech
`being defined is indicated by the opening words of the descriptive phrase: "To ..."
`indicates a verb and "Pertaining to ..." indicates a modifier. Any other wording
`indicates a noun or noun phrase.
`• Annotative sentences, providing additional or explanatory information.
`• References, directing the reader to other entries or items in the dictionary.
`• A source label, for example, (A), (E), (I), or (T), that follows the definition and
`identifies the originator of the definition. See "Sources" above. Definitions with-
`out source labels are IBM definitions.
`
`VIII
`
`DEF_JNT00000011
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 14 of 126 PageID #: 3240
`
`Synonym for (cid:9)
`
`Synonymous with (cid:9)
`
`References
`The following cross-references are used in this dictionary:
`Contrast with (cid:9)
`This refers to a term that has an opposed or substan-
`tively different meaning.
`This indicates that the term has the same meaning as a
`preferred term, which is defined in its proper place in
`the dictionary.
`This is a backward reference from a defined term to all
`other terms that have the same meaning.
`This refers the reader to multiple-word terms that have
`the same last word.
`This refers the reader to terms that have a related, but
`not synonymous, meaning.
`Deprecated term for This indicates that the term should not be used. It
`refers to a preferred term, which is defined in its
`proper place in the dictionary.
`
`See (cid:9)
`
`See also (cid:9)
`
`Selection of Terms
`A term is a word or group of words to be defined. In this dictionary, the singular
`form of the noun and the infinitive form of the verb are the terms most often
`selected to be defined. If the term may be abbreviated, the abbreviation is given in
`parentheses immediately following the term. The abbreviation is also defined in its
`proper place in the dictionary.
`
`Comments Requested
`Terminology in the computer field is constantly evolving. No printed reference can
`hope to remain current for long. For that reason, we are continually revising the con-
`tent of this book, adding new terms and definitions as they gain acceptance, discard-
`ing old entries as they become obsolete. In order to keep up with these changes, we
`invite comments from all of our users. Please address them as follows:
`IBM Dictionary of Computing
`IBM Corporation
`Dept. E37, Bldg. 656
`Research Triangle Park, NC 27709
`Telephone 919-254-0209
`Fax 919-254-0343
`Internet: ibmterms@vnet.ibm.com
`When you send comments to IBM, you grant IBM a nonexclusive right to use or dis-
`tribute your comments in any way it believes appropriate without incurring any obli-
`gation to you.
`
`ix
`
`DEF_JNT00000012
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 15 of 126 PageID #: 3241
`
`Acknowledgments
`Only someone who has tried to make a large dictionary has any idea of how many
`people are needed to complete the task. Moreover, not even the dictionary maker
`himself knows exactly who all those people are. Entries, suggestions, complaints, and
`queries seem to come from everywhere, and the terms and definitions that eventu-
`ally result have been touched by many hands, not a few of them unseen. For this rea-
`son, any "Acknowledgments" list is likely to be incomplete. This list is no
`exception.
`There are some colleagues, however, both inside and outside IBM, whose assis-
`tance and support demand recognition. With apologies to those equally deserving
`who have been omitted, the editor would like to thank the following, in no particu-
`lar order:
`• The users of earlier editions who took the time to comment and make suggestions
`• Gary Violette, contract administrator extraordinary, without whose help this edi-
`tion would have been impossible
`• Lisa Champion, David Heath, Robin Langford, Lori Lathrop, Anita Mannion,
`Anne Rice, Adrianne Roberts, Carolyn Stephens, H. Ueno, Ian Wright, and all
`the other IBM terminology coordinators and editors who have provided me and
`this book with glossaries, comments, and other valuable input.
`• Mary Sturgeon, who did the same, but in such generous measure as to warrant
`special recognition
`• The members and consultants of ANSI-approved committee X3K5: Richard
`Batey, Lionel Difford, Eugene Dwyer, Rex Klopfenstein, Stanley Kurzban, Ste-
`fan Langsner, Jimmie Logan, Roy Mullinax, D. F. Stevens, Helmut Thiess, Saul
`Zaveler
`• Past and present members of ISO SC/i Working Group 7, including: Lars
`Algotsson, Bernard Bourguignon, Chantal Brochu, Boris Ermolayev, Gunnar
`Grahn, Evelyn Gray, Hideo Kikuchi, Hanna Kuznicka, Johanne L'Heureux,
`Francine Pitre
`• Bao Pham and Christian Mayer for their translation assistance
`• Dan Aitken, Rich Overton, and Mike Payst, for their invaluable help with macros,
`style files, programs, and other tools, always provided readily and, very often,
`immediately
`• Edie Lessick, who always understood why this book kept shoving all other proj-
`ects aside
`• Daniel Gonneau of McGraw-Hill
`• Aleck, Jim, Debbie, Judy, Betty, and Al
`• My Production Department buddies, Jean Billings, Steve Joyce, Marie Kolodij,
`Sandra Raynor, and Carole Lynch, who had to explain repeatedly the arcane
`details of such topics as BookMaster, PostScript, and the internal distribution of
`IBM books, and kept inviting me to lunch anyway
`
`x
`
`DEF_JNT00000013
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 16 of 126 PageID #: 3242
`
`• Last and most importantly of all, the creator and for two decades sustainer of this
`book, John Wood. Through edition after edition, it was he more than anyone else
`who left his indelible imprint here. I would be dishonest not to recognize that this
`work is, and will continue to be, "The Book of John."
`
`George McDaniel
`Research Triangle Park, N. C.
`
`xi
`
`DEF_JNT00000014
`
`
`
`
`
`1...._.___...1-._._,_____I
`
`DICTIONARY
`IBM DICTIONARY
`COMPUTING
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 17 of 126 PageID #: 3243
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 17 of 126 PageID #: 3243
`
`| i
`
`OF COMPUTING
`
`DEF_JNT00000015
`
`DEF_JNT00000015
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 18 of 126 PageID #: 3244
`
`holder
`
`41 ] (cid:9)
`
`auto-answer
`
`authority holder In the AS/400 system, an object that
`specifies and reserves an authority for a program-
`described database file before the file is created.
`When the file is created, the authority specified in the
`holder is linked to the file.
`
`authorization (1) In computer security, the right
`granted to a user to communicate with or make use of
`a computer system. (T) (cid:9)
`(2) An access right.
`(3) The process of granting a user either complete or
`restricted access to an object, resource, or function.
`(4) See also clearance.
`
`authorization checking The action of determining
`whether a user is permitted access to a
`RACF-protected resource.
`
`authorization code A code made up of user identifi-
`cation and password, used to protect against unauthor-
`ized access to data and system facilities.
`
`authorization credentials The evidence of a user's
`authority to access DPPX/DTMS resources. Authori-
`zation credentials are defined for a user in the user's
`profile. The authorization credentials required for
`access to a DPPX/DTMS resource, such as a database,
`are defined in the profile for the resource.
`
`authorization exit routine In VTAM programs, an
`optional installation exit routine that approves or dis-
`approves requests for session initiation.
`
`authorization ID In SQL, a user profile. A name
`identifying a user to whom privileges can be granted.
`
`node is authorized, all information it sends about itself
`is accepted. The authorization status of an end node
`is system-defined in its network node server. Contrast
`with unauthorized APPN end node.
`
`authorized command In DPPX, a command with a
`nonzero function authority credential (FAC) in its
`command profile.
`
`authorized end node Synonym for authorized APPN
`end node.
`
`authorized environment In DPPX, an active environ-
`ment whose associated user profile contains a nonzero
`function authority credential (FAC).
`
`authorized library A library that may contain author-
`ized programs.
`
`authorized operator In the NetView program, an
`operator who has been authorized to receive undeliver-
`able messages and lost terminal messages.
`
`authorized path In VTAM programs for MVS, a
`facility that enables an application program to specify
`that a data transfer or related operation be carried out
`in a privileged and more efficient manner.
`
`authorized program A system program or user
`program that is allowed to use restricted functions.
`
`authorized program analysis report (APAR) A
`report of a problem caused by a suspected defect in a
`current unaltered release of a program.
`
`authorization list In the AS/400 system, a list of two
`or more user IDs and their authorities for system
`resources.
`
`authorized program facility A facility that permits
`identification of programs authorized to use restricted
`functions.
`
`authorization list management authority In the
`AS/400 system, an object authority that allows the
`user to add users to, remove users from, and change
`users' authorities on the authorization list.
`
`authorized receiver In the NetView program, an
`authorized operator who receives all the unsolicited
`and authorized-receiver messages not assigned to a
`specific operator.
`
`authorization message An NCCF message that is
`directed to an authorized operator; for example, a
`message about the use of NCCF, such as a successful
`logon, repeated unsuccessful logons, a logon rejected
`because of an invalid password, a data services
`Manager error message, or logoff.
`
`authorize To permit or give authority to a user to
`communicate with or make use of an object, resource,
`or function.
`
`authorized APPN end node
`In APPN, an end node
`that is "trusted" by its network node server to supply
`directory and routing information about its resources
`that will affect the network directory database. If a
`
`authorized state A condition in which a problem
`program has access to resources that would otherwise
`not be available.
`authorized user (1) In DPPX, a user whose user
`profile contains a nonzero function authority credential
`(FAC). See also database administrator. See space
`manager.
`auto-abstract (1) Pertaining to the material abstracted
`from a document by machine methods. (2) To select
`keywords from a document by machine methods.
`
`auto-answer Synonym for automatic answering.
`
`DEF_JNT00000016
`
`
`
`Case 2:16-cv-00741-RWS Document 202-4 Filed 07/11/17 Page 19 of 126 PageID #: 3245
`
`condition-name-condition (cid:9)
`
`[1361 (cid:9)
`
`configuration report server (C$S)
`
`Note: When condition-name is used in the general
`formats, it represents a unique data item reference
`consisting of a syntactically correct combination of a
`condition-name, together with qualifiers and sub-
`scripts, as required for uniqueness of reference.
`
`condition-name-condition In COBOL, the proposi-
`tion, for which a truth value can be determined, that
`the value of a conditional variable is a member of the
`set of values attributed to a condition-name associated
`with the conditional variable.
`
`conditions See entry conditions.
`
`condition values In the IBM 8100 Information
`System, the values assigned to various combinations
`of the condition indicators; they may be used as mask
`values in conditional branching operations.
`
`conduit A pipe for protecting electric wires or cables.
`
`conference call Teleconferencing in which all partic-
`ipants are connected through telephone circuits that
`allow for the transmission of voice and possibly FAX
`messages. (T) See also computer conferencing.
`
`conference control Synonym for sensitivity control.
`
`conference microphone On dictation equipment, a
`microphone specially designed to record speech simul-
`tan