throbber
Iii-e rasofi:
`‘ yndows_NT'
`Windowsgfi
`
`.
`The Ultimate Computer Reference
`
`0 er
`7,600
`Terms
`
`"
`
`The Comprehensive Standard for
`Business, School, Lzbrary, and
`
`and were!
`
`Gila! 389 Eflustratilaas aad diagrams
`
`Extefisiife Internet sewerage
`Féfiereé En Micreséeffq" Bool‘eshelgiE “”3
`
`Caves; soffieare, hardggare, ecagepts,
`
`SAMSUNG EX. 1013 -1/12
`
`SAMSUNG EX. 1013 - 1/12
`
`

`

`
`
`
`
`Third; Editing
`
`MicmsofFPress
`
`/
`
`SAMSUNG EX. 1013 - 2/12
`
`SAMSUNG EX. 1013 - 2/12
`
`

`

`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`Copyright © 1997 by Microsoft Corporation
`All rights reserved. No part of the contents of this book may be reproduced or transmitted
`in any form or by any means without the written permission of the publisher.
`Library of Congress Cataloging-in-Publication Data
`Microsoft Press Computer Dictionary. -- 3rd ed.
`p.
`em.
`ISBN 1-57231-446-X
`1. Computers--Dictionaries. 2. Microcomputers--Dictionaries.
`I. Microsoft Press.
`QA76.15.M54 1997
`004'.03--dc21
`
`97-15489
`CIP
`
`Printed and bound in the United States of America.
`3 4 5 6 7 8 9 QMQM 2 1 0 9 8
`Distributed to the book trade in Canada by Macmillan of Canada, a division of Canada Publishing
`Corporation.
`A CIP catalogue record for this book is available from the British Library.
`Microsoft Press books are available through booksellers and distributors worldwide. For further
`information about international editions, contact your local Microsoft Corporation office. Or contact
`Press International directly at fax ( 425) 936-7329.
`Macintosh, Power Macintosh, QuickTime, and TrueType are registered trademarks of Apple Computer,
`Inc. Intel is a registered trademark of Intel Corporation. Directinput, DirectX, Microsoft, Microsoft
`Press, MS-DOS, Visual Basic, Visual C++, Win32, Win32s, Windows, Windows NT, and XENIX are
`registered trademarks and ActiveMovie, ActiveX, and Visual J++ are trademarks of Microsoft
`Corporation. Java is a trademark of Sun Microsystems, Inc. Otherproduct and company names
`mentioned herein may be the trademarks of their respective owners.
`Acquisitions Editor: Kim Fryer
`Project Editor: Maureen Williams Zimmerman, Anne Taussig
`Technical Editors: Dail Magee Jr., Gary Nelson, Jean Ross, Jim Fuchs, John Conrow, Kurt Meyer,
`Robert Lyon, Roslyn Lutsch
`
`SAMSUNG EX. 1013 - 3/12
`
`

`

`blank
`
`· block cursor
`
`computer off before saving any data, a blackout
`will cause all unsaved data to be irretrievably lost.
`The most potentially damaging situation is one in
`which a blackout occurs while a disk drive is
`reading information from or writing information
`to a disk. The information being read or written
`will probably become corrupted, causing the loss
`of a small part of a file, an entire file, or the entire
`disk; the disk drive itself might suffer damage as a
`result of the sudden power loss. The only reliable
`means of preventing damage caused by a black-
`out is to use a battery-backed uninterruptible
`power supply (UPS). See also UPS. Compare
`brownout.
`blank1 \blank\ n. The character entered by press-
`ing the spacebar. See also space character.
`blank2 \blank\ vb. To not show or not display an
`in1age on part or all of the screen.
`blanking \blan_,keng\ n. The brief suppression of
`a display signal as the electron beam in a raster-
`scan video monitor is moved into position to dis-
`play a new line. After tracing each scan line, the
`beam is at the right edge of the screen and must
`return to the· left (horizontal retrace) to begin a
`new line. The display signal must be turned off
`during the time of the retrace (horizontal blanking
`interval) to avoid overwriting the line just dis-
`played. Similarly, after tracing the bottom scan
`line, the electron beam moves to the top left cor-
`ner (vertical retrace), and the beam must be turned
`off during the time of this retrace (vertical blanking
`interval) to avoid marking the screen with the
`retrace path.
`blast \blast\ vb. See burn.
`bleed \bled\ n. In a printed document, any ele-
`ment that runs off the edge of the page or into the
`gutter. Bleeds are often used in books to mark
`important pages so they are easier to find. See also
`gutter.
`blind carbon copy \bllnd' kar'bdn kop_,e\ n. See
`bee.
`blind courtesy copy \blind' kdr"td-se kop'e\ n.
`See bee.
`blind search \bllnd sdrch_,\ n. A search for data in
`memory or on a storage device with no fore-
`knowledge as to the data's order or location. See
`linear search. Compare binary search,
`also
`indexed search.
`
`blink \blenk\ vb. To flash on and off. Cursors,
`insertion points, menu choices, warning messages,
`and other displays on a computer screen that are
`intended to catch the eye are often made to blink.
`The rate of blinking in a graphical user interface
`can sometimes be controlled by the user.
`blink speed \blenk" sped\ n. The rate at which
`the cursor indicating the active insertion point in a
`text window, or other display element, flashes on
`and off.
`blip \blip\ n. A sn1all, optically sensed mark on a
`recording medium, such as microfilm, that is used
`for counting or other tracking purposes.
`bloatware \ blot_,war\ n. Software whose files
`occupy an extremely large amount of storage
`space on a user's hard disk, especially in compar-
`ison with previous versions of the same product.
`block1 \blok\ n. 1. Generally, .a contiguous collec-
`tion of similar things that are handled together as
`a whole. 2. A section of random access memory
`temporarily assigned (allocated) to a program by
`the operating system. 3. A group of statements in
`a program that are treated as a unit. For example,
`if a stated condition is true, all of the statements in
`the block are executed, but none are executed if
`the condition is false. 4. A unit of transmitted infor-
`mation consisting of identification codes, data, and
`error-checking codes. 5. A collection of consecu-
`tive bytes of data that are read from or written to
`a device (such as a disk) as a group. 6. A rectan-
`gular grid of pixels that are handled as a unit. 7. A
`segment of text that can be selected and acted
`upon as a whole in an application.
`block2 \blok\ vb. 1. To distribute a file over fixed-
`size blocks in storage. 2. To prevent a signal from
`being transmitted. 3. To select a segment of text,
`by using a mouse, menu selection, or cursor key,
`to be acted upon in some way, such as to format
`or to delete the segment.
`block cipher \blok_, s!'fdr\ n. A private key
`encryption method that encrypts data in blocks of
`a fixed size (usually 64 bits). The encrypted data
`block contains the same number of bits as the
`original. See also encryption, private key.
`block cursor \blok_, kur'sdr\ n. An on-screen cur-
`sor that has the same width and height in pixels as
`a text-mode character cell. A block cursor is used
`in text-based applications, especially as the mouse
`
`• ,.,. ..
`
`SAMSUNG EX. 1013 - 4/12
`
`

`

`dynamic binding
`
`,.
`
`dynamic storage
`
`be created and destroyed as required. See also
`allocate, deallocate. Compare static allocation.
`dynamic binding \di-nam'ik bin'deng\ n. Bind-
`ing (converting symbolic addresses in the program
`to storage-related
`that occurs during
`program execution. The term often refers to
`object-oriented applications that determine, dur-
`ing run time, which software routines to call for
`particular data objects. Also called late binding.
`Compare static binding.
`dynamic caching \di-nam'ik kash/eng\ n. A
`technique for storing recently used data in men1-
`ory where cache size is based on how much
`memory is available rather than how much mem-
`ory is assigned to the application currently run-
`ning.
`Dynamic Data Exchange \di-nam'ik da/td eks-
`chanj', dat/d\ n. See DDE.
`dynamic dump \di-nam'ik dump/\ n. A listing,
`either stored on disk or sent to a printer, of memory
`contents generated at the time of a break in the
`execution of a program-a useful tool for program-
`mers interested in knowing what is happening at
`a certain point in the execution of a program.
`Dynamic Host Configuration Protocol
`\ di-
`nam'ik host/ kdn-fi-gydr-a'sh;:::m pr6'td-kol\ n.
`SeeDHCP.
`dynamic keys \ di-nam' ik kez /\ n. An encryption
`technique in which messages are encrypted differ-
`ently for each transmission based on different keys
`so that if a key is captured and decrypted, it would
`never be useful again. See also encryption, key
`(definition 3).
`dynamic-link library \di-nam'ik-lenk 11/brar-e\
`n. A feature of the Microsoft Windows family of
`operating systems and OS/2 that allows execut-
`able routines to be stored separately as files with
`DLL extensions and to be loaded only when
`needed by a program. A dynamic-link library has
`several advantages. First, it does not consume any
`memory until
`it
`is used. Second, because a
`dynamic-link library is a separate file, a program-
`mer can make corrections or improvements to
`only that module without affecting the operation
`of the calling program or any other dynamic-link
`library. Finally, a programmer can use the satne
`dynamic-link library with other programs. Acro-
`nym: DLL (D'L-L/).
`
`dynamic memory allocation \di-nam'ik mem/dr-e
`al-d-ka' shdn \ n. The allocation of memory to a
`process or program at run time. Dynamic men1ory
`is allocated from the system heap by the operating
`system upon request from the program.
`dynamic page \di-nam'ik pa(\ n. An HTML doc-
`ument that contains animated GIFs, Java applets,
`or ActiveX controls. See also ActiveX controls, GIF,
`HTIVIL, Java applet.
`dynamic RAM \di-nam'ik ram/, R-A-M/\ n. A
`form of semiconductor random access memory
`(RAM). Dynamic RAMs store information in inte-
`grated circuits containing capacitors. Because
`capacitors lose their charge over time, dynamic
`RAM boards must
`include
`logic
`to
`refresh
`(recharge) the RAM chips continuously. While a
`dynamic RAM is being refreshed, it cannot be read
`by the processor; if the processor must read the
`RAM while it is being refreshed, one or more wait
`states occur. Despite being slower, dynan1ic RAMs
`are more commonly used than RAMs because their
`circuitry is simpler and because they can hold up
`to four times as much data. Acronynz: DRAM
`(dram, D / ran1). See also RAM. Compare static RAM.
`dynamic random access memory
`\ di-nam' ik
`ran'ddtn ak-ses mem/dr-e\ n. See dynatnic RAM.
`dynamic relocation \di-nam'ik re-16-ka/shdn\ n.
`The relocation in memory of data or of the code
`of a currently running program by an internal sys-
`tem routine. Dynamic relocation helps a cotnputer
`use memory efficiently.
`dynamic scheduling \di-nam'ik skej'd-leng\ n.
`The management of concurrently running pro-
`cesses (programs), usually by the operating sys-
`tem.
`dynamic SLIP \di-nam'ik slip/, S'L-I-P/\ n. Short
`for dynamic Serial Line Internet Protocol. Internet
`access under SLIP in which the user's IP address is
`not permanent but is reassigned from a pool each
`time
`the user connects. The number of IP
`addresses an Internet service provider needs to
`offer is reduced to the number of connections that
`can be in use at once, rather than the total nurnber
`of subscribers. See also IP address, ISP, SLIP.
`dynamic storage \di-nam'ik stor'dj\ n. 1. Infor-
`mation storage systems whose contents will be
`lost if power is removed from the system. RAM
`(randotn access tnemory) systetns are the most
`II
`
`SAMSUNG EX. 1013 - 5/12
`
`

`

`dynamic Web page
`
`common form of dynamic storage, and both
`dynamic RAM (DRAM) and static RAM (SRAM) are
`considered forms of dynamic storage. See also
`dynamic RAM, static RAM. Compare permanent
`storage. 2. In programming, blocks of memory
`that can be allocated, deallocated, or freely
`changed in size.
`
`dynamic Web page \d1-nam'ik web/ paj\ n. A
`Web page that has fixed form but variable content,
`allowing it to be tailored to a customer's search cri-
`teria .
`. dz \dot'D-Z/\ n. On the Internet, the major geo-
`graphic domain specifying that an address is
`located in Algeria.
`
`•
`
`SAMSUNG EX. 1013 - 6/12
`
`

`

`em space
`
`en dash
`
`PCs that allows for increasing tnetnory beyond the
`Intel 80x86 microprocessor real-Inode lin1it of 1
`tnegabyte. In earlier versions of microprocessors,
`EMS bypassed this memory board limit with a
`number of 16-kilobyte banks of RAM that could be
`accessed by software. In later versions of Intel
`microprocessors, including the 80386 and 80486
`models, EMS is converted fro1n extended men1o1y
`by software memory managers, such as EMM386
`in MS-DOS 5. Now EMS is used mainly for older
`MS-DOS applications because Windows and other
`applications running in protected mode on 80386
`and higher microprocessors are free of the 1-MB
`limit. Also called LIM EMS. See also expanded
`men1ory, protected n1ode. Compare conventional
`memory, extended memory.
`em space \em/ spas\ n. A typographical unit of
`measure that is equal in width to the point size of
`a particular font. For many fonts, this is equal to
`the width of a capital M, from which the em
`space takes its name. Compare en space, fixed
`space, thin space.
`emulate \e/myoo-laf\ vb. For a hardware or soft-
`ware system to behave in the same manner as
`another hardware or software systetn. In a net-
`work, for example, microcomputers often emulate
`mainframes or terminals so that two machines can
`communicate.
`emulation \e'myd-la/shdn\ n. The process of a
`computer, device, or program imitating the func-
`tion of another computer, device, or program.
`emulator \e/myd-la'tdr\ n. Hardware or software
`designed to make one type of computer or com-
`ponent act as if it were another. By means of an
`emulator, a computer can run software written for
`another machine. In a network, microcotnputers
`might emulate mainframes or terminals so that two
`machines can con1municate.
`emulsion laser storage \e-mul'shdn la/zdr stor-
`';:)j\ n. A method for recording data in film by
`selective heating with a laser beam.
`enable \e-na/bl\ vb. To activate or turn on. Com-
`pare disable.
`encapsulate \ en-kap / Sd-lat' \ vb. To treat a collec-
`tion of structured information as a whole without
`affecting or taking notice of its internal structure.
`In communications, a message or packet con-
`structed according to one protocol, such as a TCP I
`
`IP packet, may be taken with its formatting data as
`an undifferentiated stream of bits that is then bro-
`ken up and packaged according to a lower-level
`protocol (for exan1ple, as ATM packets) to be sent
`over a particular network; at the destination, the
`lower-level packets are assembled, re-creating the
`n1essage as formatted for the encapsulated proto-
`col. In object -oriented programn1ing, the imple-
`mentation details of a class are encapsulated in a
`separate file whose contents do not need to be
`known by a programtner using that class. See also
`ATM (definition 1), object-oriented programming,
`TCP/IP.
`Encapsulated PostScript \en-kap'sd-Ei-tdd post/
`skript\ n. See EPS.
`encapsulated type \en-kap'sd-la-tdd tip/\ n. See
`abstract data type.
`encipher \en-s1/fdr\ vb. See encryption.
`encode \en-kod/\ vb. 1. In data security,
`to
`encrypt. See also encryption. 2. In programming,
`to put something into code, which frequently
`involves changing the forn1-for example, chang-
`ing a decimal number to binary-coded form. See
`also binary-coded decimal, EBCDIC.
`encryption \en-krip/sh;:)n\ n. The process of
`encoding data to prevent unauthorized access,
`especially during transmission. Encryption is usu-
`ally based on a key that is essential for decoding.
`The U.S. National Bureau of Standards created a
`complex encryption standard, Data Encryption
`Standard (DES), which provides almost unlimited
`ways to encrypt documents. See also DES.
`encryption key \en-krip/shdn ke'\ n. A sequence
`of data that is used to encrypt other data and that,
`consequently, must be used for the data's decryp-
`tion. See also decryption, encryption.
`end-around carry \end'd-round k1r/e\ n. A spe-
`cial type of end-around shift operation on a binary
`value that treats the carry bit as an extra bit; that
`is, the carry bit is moved fr01n one end of the value
`to the other. See also carry, end-around shift, shift.
`end-around shift \end'd-round
`shift/\
`n. An
`operation performed on a binary value in which a
`bit is shifted out of one end and into the other end.
`For example, a right-end shift on the value
`00101001 yields 10010100. See also shift.
`en dash \en/ dash\ n. A punctuation mark (-)
`used to show ranges of dates and numbers, as in
`
`IWS ..
`
`SAMSUNG EX. 1013 - 7/12
`
`

`

`pseudo compiler
`
`public key encryption
`
`that looks much like a mixture of English and their
`favorite programming language, such as C or Pas-
`cal, and then translate it line by line into the actual
`language being used.
`pseudo compiler \sOb/do kdm-pi'ldr\ n. A com-
`piler that generates a pseudolanguage. See also
`pseudo language.
`pseudocomputer \soo/do kdm-pyoo'tdr\ n. See
`pseudomachine.
`pseudolanguage \soo'do-lang/wdj\ n. A nonex-
`istent programming language-that is, one for
`whicb. no implementation exists. The term can
`refer either to the machine language for a non ex-
`istent processor or to a high-level language for
`which no compiler exists. See also pseudocode.
`pseudomachine \sOb' do-md-shen /\ n. Abbrevi-
`ated p-machine. A processor that doesn't actually
`exist in hardware but that is emulated in software.
`A program written for the pseudomachine can run
`on several platforms without having to be recom-
`piled. See also pseudocode, UCSD p-System.
`pseudo-operation \sOb' do-op-dr -a/ shdn \
`n.
`Abbreviated pseudo-op. In programming, a pro-
`gram instruction that conveys information to an
`assembler or compiler but is not translated into a
`machine language instruction-for example, an
`instruction that establishes the value of a constant
`or the manner in which Boolean (logical) expres-
`sions are to be evaluated.
`PSK \P'S-K/\ n. See phase-shift keying.
`PSN \P'S-N/\ n. Acronym for packet-switching
`network. See packet switching.
`p-system \ P / si' stdm \
`n. An operating system
`based on a pseudomachine implemented in soft-
`ware. A program written for the p-system is more
`portable than one written for a machine-depen-
`dent operating system. See also UCSD p-System.
`.pt \dot'P-T/\ n. On the Internet, the major geo-
`graphic domain specifying that an address is
`located in Portugal.
`P-type semiconductor \P'tip sem/e-kdn-duk-tdr,
`sem/1-kdn-duk-tdr\ n. Semiconductor material in
`which electrical conduction is carried by holes
`("vacancies" left by electrons). Whether a semi-
`conductor is N-type or P-type depends on the kind
`of dopant added during manufacture. A dopant
`with a shortage of electrons results in a P-type
`semiconductor. Compare N -type semiconductor.
`
`/pub \slash-pub/\ n. Short for public. A directory
`in an anonymous FTP archive that is accessible by
`the public and that generally contains files avail-
`able for free download. See also anonymous FTP.
`pub \pub\ n. See /pub.
`public directory \ pu 'blik ddr-ek/tdr-e\
`n. A
`directory on an FTP server that is accessible by
`anonymous users for the purpose of retrieving or
`storing files. Often the directory is called /pub. See
`also anonymous FTP, FTP (definition 1), FTP
`server, /pub.
`public domain \pu'blik do-man/\ n. The set of
`all creative works, such as books, music, or soft-
`ware, that are not covered by copyright or other
`property protection. Works in the public domain
`can be freely copied, modified, and otherwise
`used in any manner for any purpose. Much of the
`information, texts, and software on the Internet is
`in the public domain, but putting a copyrighted
`work on the Internet does not put it in the public
`domain. Compare proprietary.
`public-domain software
`\pu'blik-do-man soft/-
`war\ n. A program donated for public use by its
`owner or developer and freely available for copy-
`ing and distribution. Compare free software, free-
`ware, proprietary software, shareware.
`public files \pu'blik filz/\ n. Files with no access
`restrictions.
`public folders \pu'blik fol/ddrz\ n. The folders
`that are made accessible on a particular machine
`or by a particular user in a shared networking
`environment. Compare private folders.
`public key \ pu /blik ke' \ n. One of two keys in
`public key encryption. The user releases this key
`to the public, who can use it for encrypting mes-
`sages to be sent to the user and for decrypting the
`user's digital signature. See also public key encryp-
`tion. Compare private key.
`public key cryptography \pu'blik ke krip-to/grd-
`fe\ n. See public key encryption.
`public key encryption \pu'blik ke/ en-krip'shdn\
`n. An asymmetric scheme that uses a pair of keys
`for encryption: the public key encrypts data, and
`a corresponding secret key decrypts it. For digital
`signatures, the process is reversed: the sender uses
`the secret key to create a unique electronic num-
`ber that can be read by anyone possessing the cor-
`responding public key, which verifies that the
`
`• :11111 •
`
`SAMSUNG EX. 1013 - 8/12
`
`

`

`public rights
`
`pulse duration modulation
`
`message is truly fron1 the sender. See also private
`key, public key.
`public rights \ pu'blik r!ts/\ n. In the context of
`the Internet, the extent to which n1embers of the
`public are permitted to use (and to place) informa-
`tion on the Internet under intellectual property
`law. See also fair use, public domain, public-
`domain software.
`puck \ puk\ n. A pointing device used with a
`graphics tablet. A puck, which is often used in
`engineering applications, is a mouselike device
`with buttons for selecting items or choosing com-
`mands and a clear plastic section extending from
`one end with cross hairs printed on it. The inter-
`section of the cross hairs on the puck points to a
`location on the graphics tablet, which in turn is
`mapped to a specific location on the screen.
`Because the puck's cross hairs are on a transparent
`surface, a user can easily trace a drawing by plac-
`ing it between the graphics tablet and the puck
`and moving the cross hairs over the lines of the
`drawing. See the illustration. See also graphics tab-
`let, stylus.
`
`Puck.
`pull \ pul\ vb. 1. The process of retrieving data
`from a network server. Compare push (definition
`2). 2. See pop.
`pull-down menu \ pul / doun men' yOb \
`n. A
`menu that is pulled down from the menu bar and
`that remains available as long as the user holds it
`open. Compare drop-down menu.
`pulse \puis\ n. A transient signal, usually brief and
`with a discrete onset and offset.
`pulse amplitude modulation \ puls'
`am' pl;;}-
`n. A
`tObd mo-dy;;}-Ei/sh;dn,
`n1oj';d-Ei/shdn\
`method of encoding information in a signal by
`varying the amplitude of pulses. The unmodu-
`
`lated signal consists of a continuous train of
`pulses of constant frequency, duration, and
`amplitude. During tnodulation the pulse ampli-
`tudes are changed to reflect the
`information
`being encoded. See the illustration. Acronym:
`PAM (pam, P'A-M/). Compare pulse code modu-
`lation, pulse duration modulation, pulse position
`tnodulation.
`
`Pulse amplitude modulation.
`pulse code modulation \puis'
`kod' mo-dy;d-
`la/sh;dn, moj';d-la/sh;dn\ n. A method of encoding
`information in a signal by varying the amplitude of
`pulses. Unlike pulse amplitude modulation (PAM),
`in which pulse an1plitude can vary continuously,
`pulse code tnodulation limits pulse amplitudes to
`several predefined values. Because the signal is
`discrete, or digital, rather than analog, pulse code
`modulation is more immune to noise than PAM.
`Acronym: PCM (P'C-M/). Compare pulse ampli-
`tude modulation, pulse duration modulation,
`pulse position modulation.
`pulse duration modulation \puis' dur-a/sh;;}n mo-
`dy;d-la / sh;dn, moj-;d-la / sh;;}n \ n. A method of
`encoding information in a signal by varying the
`duration of pulses. The unmodulated signal con-
`sists of a continuous train of pulses of constant
`frequency, duration, and amplitude. During mod-
`ulation,
`to
`the pulse durations are changed
`
`Pulse duration modulation .
`
`• :JII!t -
`
`SAMSUNG EX. 1013 - 9/12
`
`

`

`ROM cartridge
`
`ROTFL
`
`ROM cartridge \rom/ kar'trij, R-0-M/\ n. A plug-
`in module that contains one or more printer fonts,
`programs, games, or other information stored in
`ROM
`(read-only memory) chips on a board
`enclosed in a plastic case with a connector
`exposed at one end so that it can easily plug into
`a printer, con1puter, game system, or other device.
`For example, a cartridge that plugs into a game
`systetn is a ROM cartridge. Also called game car-
`tridge. See also ROM (definition 1), ROM card.
`ROM emulator \rom/ em'yd-la-tdr, R-0-M/\ n. A
`special circuit containing RAM tnemory that is
`connected to a target computer in place of the
`target computer's ROM chips. A separate com-
`puter writes the contents into the RAM, and then
`the target computer reads the RAM as if it were
`ROM. ROM emulators are used to debug ROM-
`resident software without the high cost and delay
`of manufacturing chips. Even though the use of a
`ROM emulator is more expensive than program-
`ming an EPROM,
`it
`is often preferred today
`because its contents can be changed much more
`quickly than those of an EPROM. Also called ROM
`simulator. See also EEPROM, EPROM, ROM (defi-
`nition 1).
`ROM simulator \rom/ sim'yd-la-tdr, R'O-M/\ n.
`See ROM emulator.
`root \root\ n. The main or uppermost level in a
`hierarchically organized set of information. The
`root is the point from which subsets branch in a
`logical sequence that tnoves from a broad focus to
`narrower perspectives. See also leaf, tree.
`root account \root/ d-kounf, rdbt/\ n. On UNIX
`systerr1s, the account having control over the oper-
`ation of a computer. The system administrator
`uses this account for system maintenance. Also
`called superuser. See also system adn1inistrator.
`root directory \root/ ddr-ek'tdr-e\ n. The point of
`entry into the directory tree in a disk-based hierar-
`chical directory structure. Branching from this root
`are various directories and subdirectories, each of
`which can contain one or more files and subdirec-
`tories of its own. For example, in the MS-DOS
`operating system the root directory is identified by
`a name consisting of a single backslash character
`(\). Beneath the root are other directories, which
`may contain further directories, and so on. See the
`illustration.
`
`Root directory. The structure of a hierarchical
`directory; the root is identified by the backslash.
`
`root name \root/ natn, rdbt/\ n. In MS-DOS and
`Windows, the first part of a filename. In l'viS-DOS
`and earlier versions of Windows, the maximum
`length of the root name was eight characters; in
`Windows NT and later versions of Windows, the
`root name may be as long as 255 characters. See
`also 8.3, extension (definition 1), filename, long
`filenames.
`ROT13 encryption \R'O-T'thdr-ten/ en-krip'shdn\
`n. A simple encryption method in which each let-
`ter is replaced with the letter of the alphabet 13 let-
`ters after the original letter, so that A is replaced by
`N, and so forth; N, in turn, is replaced by A, and Z
`is replaced by M. ROT13 encryption is not used to
`protect messages against unauthorized readers;
`rather, it is used in newsgroups to encode mes-
`sages that a user may not want to read, such as
`sexual jokes or spoilers. Some newsreaders can
`automatically perform ROT13 encryption and
`decryption at the touch of a key.
`rotate \r6/tat\ vb. 1. To turn a model or other
`graphical image so that it is viewed at a different
`angle. 2. To move bits in a register to the left or to
`the right. The bit that moves out of the end posi-
`tion rotates to the newly vacated position at the
`opposite end of the register. Compare shift.
`rotational delay \r6-ta'shd-ndl dd-la/\ n. The
`time required for a desired disk sector to rotate to
`the read/write head. Also called rotational latency.
`rotational latency \r6-ta'shdn-dlla/tdn-se\ n. See
`rotational delay.
`RO terminal \R-0/ tdr'md-ndl\ n. Short for read-
`only terminal. A tern1inal that can receive data
`but cannot send data. Nearly all printers can be
`classified as RO terminals.
`ROTFL \R'O-T-F-L/\ See ROFL.
`Ill
`
`SAMSUNG EX. 1013 - 10/12
`
`

`

`stateful handling of 1nessages takes account of
`their content. COJnpare stateless.
`stateless \stat /Ids\ adj. Of or pertaining to a sys-
`tem_ or process that participates in an activity with-
`out monitoring all details of its state. For example,
`stateless handling of 1nessages might take account
`of only their sources and destinations but not their
`content. Compare stateful.
`statement \stat/n1dnt\ n. The s1nallest executable
`entity within a progran1ming language.
`state-of-the-art \stat/dv-dhe-arf\ adj. Up to date;
`at the forefront of current hardware or software
`technology.
`.state.us \dot-stafdot-U-S/\ n. On the Internet, the
`major geographic domain specifying
`that an
`address belongs to a state government in the
`United States.
`\stat/ik\ adj. In information processing,
`fixed or predetennined. For example, a static
`memory buffer remains invariant in size through-
`out program execution. The opposite condition is
`dynamic, or ever-changing.
`static2 \stat/ik\ n. In communications, a crackling
`noise caused by electrical interference with a
`transmitted signal. See also noise (definition 2).
`static allocation \stafik al-d-ka/shdn\ n. Appor-
`tionment of memory that occurs once, usually
`when the program starts. The men1ory remains allo-
`cated during the program's execution and is not
`deallocated until the program is finished. See also
`allocate, deallocate. Compare dynamic allocation.
`static binding \stafik b1n/deng\ n. Binding (con-
`verting symbolic addresses in the program to
`storage-related addresses) that occurs during pro-
`gram compilation or linkage. Also called early
`binding. Compare dynamic binding.
`static electricity \stafik
`d-lek-tris/d-te,
`e-lek-
`tris/d-te\ n. An electrical charge accumulated in an
`object. Although generally harmless to humans, the
`discharge of static electricity through an electronic
`circuit can cause severe damage to the circuit.
`static RAM \stafik ram/, R-A-M/\ n. A form of
`semiconductor memory (RAM) based on the logic
`circuit known as a flip-flop, which retains infonna-
`tion as long as there is enough power to run the
`device. Static RAMs are usually reserved for use in
`caches. Acronym: SRAM (S/ram, S'R-A-M/). See
`also cache, RAM. Compare dynamic RAM.
`
`\sta/shd-nar'e\ adj. Describing a type
`of document that, when opened by the user, is
`duplicated by the syste1n; the copy is opened for
`the user's n1odification while the original docu-
`tnent remains intact. Stationery documents can be
`used as docun1ent templates or boilerplates. See
`also boilerplate, template (definition 5).
`statio:nerr \sta/shd-nar'e\ n. A stationery docu-
`ment. See also stationery1.
`statistical
`\std-tis'td-kdl mul/ti-pleks-
`dr\ n. A multiplexing device that adds "intelli-
`gence" to time-division multiplexing by using buff-
`ering (temporary storage) and a microprocessor to
`combine transmission streams into a single signal
`and to allocate available bandwidth dynamically.
`Also called stat mux. See also dynamic allocation,
`n1ultiplexing, time-division n1ultiplexing.
`statistics \std-ti/stiks\ n. The branch of mathen1at-
`ics that deals with the relationships among groups
`of measurements and with the relevance of simi-
`larities and differences in those relationships. See
`also binomial distribution, Monte Carlo method,
`probability, regression analysis, standard devia-
`tion, stochastic.
`stat mux \stat/muks\ n. Seestatistical1nultiplexer.
`status \stat/us, sta/tus\ n. The condition at a par-
`ticular time of any of numerous ele1nents of com-
`puting-a device, a communications channel, a
`network station, a program, a bit, or other ele-
`ment-used to report on or to control computer
`operations.
`status bar \stat/us bar', sta/tus\ n. In Microsoft
`Windows, a space at the bottom of many program
`windows that
`a short text message about
`the current condition of the program. Some pro-
`gratns also display an explanation of the currently
`selected menu command in the status bar. See the
`illustration.
`
`Status bar.
`status codes \stat/us kodz', sta/tus\ n. Strings of
`digits or other characters that indicate the success
`or failure of some attempted action. Status codes
`were commonly used to report the results of early
`computer programs, but most software today uses
`words or graphics. Internet users, especially those
`
`SAMSUNG EX. 1013 - 11/12
`
`

`

`osoft Press®
`
`ry
`
`The Comprehensive
`Standard for Business,
`School, Library, and Home
`
`MICROSOFT PRESS COMPUTER DICTIONARY, THIRD EDITION, is the
`authoritative source of definitions for computer terms,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket