throbber
Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 1 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 1 of 12
`
`EXHIBIT 16
`EXHIBIT 16
`
`
`
`
`
`
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 2 of 12
`Case 1:20-cv-00034-ADA Document 45-
`
`1113 Ultimate Computer Refinance
`
`
`
`Microsoft-“Press
`
`DEFS_ANCORA00002094
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 3 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 3 of 12
`
`MN
`
`MEMORIAL LIBRARY
`W
`
`Microsoft Press
`
`Cgmgputer
`Iblctmlmry
`
`Third Edition
`
`MicrosofrPress
`
`DEFS_ANCORA00002095
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 4 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 4 of 12
`
`_
`
`I Mud-l.
`
`‘."
`
`I
`
`5
`
`PUBLISHED BY .
`Microsoft Press
`
`‘
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 199? by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted
`in any form or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging—in—Pttblication Data
`Microsoft Press Computer Dictionary. -- 3rd ed.
`p.
`cm.
`ISBN 1-5723l-446-X
`
`i. Computers—Dictionaries.
`I. Microsoft Press.
`
`2. Microcompu[era-Dictionaries.
`
`QA76.15.M54 I997
`004'.t)3—~dc21
`
`9115489
`CIP
`
`Printed and bound in tlte United States of America.
`
`23456739 QMQM 210987
`
`Distributed to the book trade in Canada by Macmillan of Canada, a division of Canada Publishing
`Corporation.
`
`A ClP catalogue record for this hook is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors Worldwide. For further
`information about international editions, contact your local Microsoft Corporation office. 01' contact
`Microsoft Press International directly at fax [425) 936-7329.
`
`Macintosh, Power Macintosh. QuiekTime. and TrueType are registered trademarks of Apple Computer.
`Inc. Intel is a registered trademark of Intel Corporation. Directinput. DirectX, Microsoft. Microsoft
`Press, MS-DOS. Visual Basic. Visual C++. Win32. Win32s. Windows. Windows NT. and XENIX are
`
`registered trademarks and ActiveMovie. ActiveX, and Visual J++ are trademarks of Microsoft
`Corporation. Java is a trademark of Sun Microsystems, Inc. Other product and company names
`mentioned herein may be the trademarks of their respective owners.
`
`Acquisitions Editor: Kim Fryer
`Project Editor: Maureen Williams Zimmerman. Anne 'I’aussig
`Technical Editors: Dail Magec Jr., Gary Nelson. Jean Ross. Jim Fuchs. John Conrow, Kurt Meyer.
`Robert Lyon, Roslyn Lutsch
`
`I throw
`Moment-1|
`_
`iiiblei'i‘iliy OI \‘Fijr '.".‘.1'
`:[i —. N‘atjlsfl
`. _'.i .‘
`'
`:5 I" “flint
`.1"“"'-;~1494
`
`'l
`
`'
`
`DEFS_ANCORA00002096
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 5 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 5 of 12
`alert box
`
`the particular host adapter used. AC'mHjmf: ASP]
`
`tA‘S-P-I’, a spa. See also adapter. SCSI.
`.21:
`\dot‘A—EW it. On the Internet, the major geo—
`
`graphic domain specifying that an address
`located in United Arab iimiralcs.
`
`is
`
`.af \dot‘A-FW it. On the Internet, the major geo-
`
`gntphic domain specifying that an address is
`located in Afghanistan.
`AFDW \A'F-I)-W'\
`ii. See Active Framework for
`
`Data Warehousing.
`AFIPS \fi'lips\
`it. Acronym for American Federa—
`tion of Information Processing Societies. An orga-
`nization formed in 1961 for the advancement of
`
`computing and informs[ion—related concerns. The
`US. representative of the International Federation
`of Information Processing. AFIPS was replaced by
`
`the Federation on Computing in the United States
`(FOCUS) in 1900.
`
`AFR \A‘F—KW :1er Acronym for away from. key—
`board. A phrase occasionally seen in live chat ser-
`vices on the interact and online infonnation
`
`scwices as an indication that one is momentarily
`unable to answer. See also chatI (definition ll.
`.af.mil
`\dot-A—F‘dot-mil’.
`dot—A~I*“doL—M-l-L’\
`
`it.
`
`the major geographic domain
`On the Internet.
`specifying that an address belongs to the United
`States Air Force.
`
`AFS \A‘F—SW it. Acronym for Andrew File System.
`Carnegie-Mellon’s distributed file system for facili—
`tating accessibility Io ren'iole files in large net~
`works.
`
`\dot‘A—GW it. On the Internet, the major geo-
`.33,
`graphic domain specifying that an address is
`located in Antigua and Barbuda.
`
`agent \a’iant\ n. 1. A program that performs a
`background task for a user and reports to the user
`when the task is done or some expected event has
`taken place. 2. A program that searches through
`arcl'tives or other repositories of information on a
`topic specified by the user. Agents of this sort are
`used moSI often on the Internet and are generally
`dedicated to searching a single type of informa-
`tion repository.
`such as postings on Usenet
`groups. Spiders are a type of agent used on the
`Internet. Afso coiled intelligent agent. Se ’ arise spi—
`
`der. 3. In client/server applications. a process that
`mediates between the client and the server. 4. In
`
`Simple Network Management Protocol (SNMP), a
`
`program that monitors network traffic. See also
`SNMP.
`
`.ai \dot‘A-IW it. On the Internet, the major geo-
`
`graphic domain specifying that an address is
`located in Anguilla.
`AI \A~I’\
`it. See artificial intelligence.
`.aiff \clot‘A-I-F-F’\
`ii. The file extension that iden-
`
`tifies audio files in the sound format originally
`
`used on Apple and Silicon Graphics (56!) com-
`puters.
`AIFF \A‘ I—F—F '\ n. The sound format originally used
`
`on Apple and Silicon Graphics (561! computers.
`AIFF stores wavefonn files in an 8-bit monaural
`format. See (“'50 wax-’eforrn.
`
`AIX \A‘l-X‘\ ii. Acronym for Advanced Interactive
`Executive. A version of the UNIX system provided
`by IBM for its UNIX workstations and its PCs.
`.ak.us \dot—A—K‘dot—U—S'\ H. On the Internet. the
`
`major geographic domain specifying that an
`address is located in Alaska. United States.
`
`.31 \dot‘A-L‘\
`
`it. On the Internet, the maior geo-
`
`graphic domain specifying that an address is
`located in Albania.
`
`alarm \a-liirmW H. A visual or auditory signal from
`a computer alerting the user to an error or [award—
`ous situation.
`
`\o-lart‘\ n. 1. On the Macintosh and in many
`alert
`graphical user
`interfaces, an audible or visual
`alarm that signals an error or represents a warning
`of some sort. See raise alert box. 2. In program-
`ming, an asynchronous notification sent by one
`thread to another. The alert interrupts the recipient
`thread at defined points in its execution and
`
`“nurses it to execute an asynchronous procedure
`“all. See aim asynchronous procedure call, thread
`{definition 11.
`
`alert box \a~lort’ boks‘i n. An tin-screen box.
`
`in
`
`:1 graphical user interface, that is used to deliver a
`message or warning. An alert hos from Windows.
`See the illustration. Compare dialog box.
`
`
`
`Alert box.
`
`
`
`I t‘h'umtm'al met he mums: bitumen lam tti-‘lli 1: us tam-l J
`——_
`
`DEFSHANCORAOOOO2097
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 6 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 6 of 12
`BISYNC
`binding time
`
`information (such as a memory address. a data
`type. or an actual value}. See also binding time,
`dynamic binding, static binding.
`in a
`binding tilne \l'iin'deng tim‘\ n. The point
`program‘s use at which binding of information
`occurs, usually in reference to program elements
`being bound to their storage locations and values.
`The In: rat common binding times are during com-
`pilation tcompiledime binding). during linking
`{link-time binding). and during program execution
`(tun-time binding).
`.S‘ee air” bind, compile—time
`binding, link-time binding, run-time binding.
`BinHexl \bin'heks‘t
`ti. 1. A code for converting
`binary data files into ASCII
`text so they can be
`
`transmitted via email to another computer or in a
`newagroup post. This method can be used when
`standard ASCII characters are needed for transmis—
`
`sion, as they are on the Internet. Biol-[ex is used
`
`most frequently by Mac users. See (rise MIME.
`2.An Apple Macintosh program for converting
`binary data files into ASCII text and vice versa
`using the Binl—Iex code. Currrpaie uudecode'.
`uuenct ide '.
`rib. To convert a binary file
`BinHexJ ‘thin'helrfl
`into printable ?—bit ASCII text or to convert the
`resulting ASCII
`text
`tile back to binary format
`using, the Binl'lex program. Comprm.’ uudecode").
`u uencodc 2.
`
`binomial distribution \bi—nt'i'me-ai dis-trn-bytfil
`shard H.
`In statistics, a list or a Function that
`
`describes the probabilities of the possible values
`of a random variable chosen by Int-ans of a Ber-
`
`noulli sampling process. A Bernoulli process has
`three characteristics: each trial has only two possi-
`ble trutcrrates—~sttt'cess or
`laiiure: each trial
`is
`
`independent of all other trials; and the probability
`of success for each trial is constant. A binomial dis-
`
`Iribution can be used to calculate the probability
`
`ol‘ getting a specified number ol' successes in a
`Bernoulli process. For example, the binomial dis
`tribution can be uric-d to calculate the probability
`of getting a ? three times in 30 rolls of a pair of
`thee. Afro coiled Bernoulli distribution.
`
`it. The study of living organ—
`bionics \l)i~on 'iks‘\
`isms. their characteristics. and the ways they lunc—
`
`h‘. Acronym for basic
`BIOS \bi'os, B‘l—O-S'l.
`input/output system. On IKE-compatible comput—
`ers.
`the set of essential software routines that test
`
`the operating system,
`hardware at startup, start
`and support the transfer of data among hardware
`devices. The BIOS is stored in read-only memory
`(ROM) so that it can be executed when-the com-
`
`to perfor-
`puter is turned on. Although critical
`mance. the BIOS is usually invisible to computer
`users. See also AMI BIOS. CMOS setup, Phoenix
`BIOS, ROM [3105. Compare Toolbox.
`bipolar \bi‘pfi'lafl
`(Stuff. 1. Having two opposite
`states, such as positive and negative. 2. In infor-
`mation transfer and processing, pertaining to or
`
`characteristic of a signal in which opposite volt-
`age polarities represent on and off,
`true and
`
`false. or some other pair of values. See ditto nort-
`return to Zero. Compare unipolar. 3. In electron—
`ics. pertaining to or characteristic of a transistor
`having two types of charge carriers. See rtiso tran—
`sistor.
`
`it. See business information system.
`BIS \B‘ I-S’\
`bistable \bi‘stft'bl‘t adj. Of, pertaining to, or char-
`acteristic ot‘a system or device that has two possi~
`ble states. such as on and off. See also flip—flop.
`bistable circuit Uni-stab] sar'kad it. Any circuit
`that has only two stable states. The transition
`between them must be initiated from outside the
`
`circuit. A bistable circuit is capable of storing I bit
`of information.
`bistable multivibrator \bT-stft‘bl
`
`mul-tT-vT‘bra-
`
`it. See Flip-{lop
`tar, nttII-te-\-'i'bra-tar\
`BISYNC \bi'sEnM it. Short for binary synchro-
`
`nous communications protocol. A communica—
`tions
`standard devvloperl by
`IBM. BISYNC
`transmissions are encoded in either ASCII or
`
`EBCDIC. Messages can be of any length and are
`sent in units called frames, optionally“ preceded by
`
`a message header. BISYNC uses synchronous
`transmission. in which message elements are sep-
`arated by a specific time interval, so each frame is
`preceded and followed by special characters that
`enable the sending and receiving machines to syn-
`chronize their clocks, STX and ETX are control
`
`characters that mark the beginning and end of the
`
`lion, with a view toward creating hardware that
`can simulate or duplicate the activities ol’ a birth agi-
`cal system. See also cybernetics.
`
`message text; BCC is a set of characters used to
`verify the accuracyr of transmission. See the illus—
`tration on the next page. Also cuffed BSC.
`
`
`
`DEFSHANCORAOOOO2098
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 7 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 7 of 12
`
`Enhanced [DE
`
`1990—192, and in compound adjectives where one
`part is hyphenated or consists of two words, as in
`pre—Civil “far. The en dash is named alter a typo—
`graphical unit of measure, the on space, which is
`half the width of an em space. See also em space.
`
`(footprint em dash, hyphen.
`End key \end’ ke\
`it. A cursor-control key that
`moves the cursor to a certain position. usually to
`the end of a line, the end of a screen, or the end
`
`of a file, depending on the program.
`endless loop \end' las ltfiph it. See infinite loop.
`end mark \end" mitrld n. A symbol
`that desig-
`nates the end of some entity, such as a file or word
`processing document.
`ii. A code placed by a
`end-of-file \eiid'av-til’\
`program after the last byte of a file to tell the corn-
`puter‘s operating system that no additional data
`follows. In ASCII. end-of-l'ile is represented by the
`decimal value 26 (hexadecimal 1A} or the Ctrl—Z
`
`control character. Acronym: EDF (E'O—F').
`end-of-lext \cnd‘av-tekst '\ n.
`In data transmis—
`
`sion. :1 character used to mark the end of a text
`
`file. Ended—text does not necessarily signify the
`end of transmission; other information, such as
`
`error—checking or transmission control characters,
`can be included at the end of the file. In ASCII,
`
`end—of—text is represented by the decimal value 5
`{hexadecimal 05}. Acronym: ETX (ET—X").
`end-of—transmission \end‘av—tntnz-mish‘an‘t
`
`n.
`
`A character representing the end of a transmission.
`In ASCII. the end-of—transmission character has the
`
`decimal value 4 [hexadecimal {Vi}. Acronym: EOT
`(ITO-Tl
`
`endpoint \cnd‘point't n. The beginning or end of
`a line segment.
`end user \end’ yo‘fi‘zafl n. The ultimate user of a
`computer or computer applicatitiin in its finished,
`marketable form.
`
`\end‘yothi-zar
`End-User License Agreement
`li’sans a—gre‘mand n. A legal agreement between
`a software manufacturer and the software's pur-
`chaser with regard to terms of distribution, resale,
`and restricted use. Acmrr-vm; EULA tycfi'lo, FILT-
`L—A’),
`
`line-r3)r Star \en'sr—je stiir‘\ H. A symbol affixed to
`systems and components
`that
`tlentiites
`lower
`power—consumption design. Energy Star
`is
`the
`name of an Envirt'rnmental Protection Agency pro-
`
`gram that encourages PC manufacturers to build
`systems that are energy efficient. Requirements
`dictate that systems or monittin‘s be capable of
`automatically entering a "sleep state” or a lower
`power-consumption state while the unit is inac-
`tive, where [he low-power state is defined its 50
`walls or less. Systems and monitors that comply
`with these guidelines are marked with an Energy
`Star sticker.
`
`engine \en'jam It. A processor or portion of a
`program that determines how the program than
`ages and manipulates data. The term engine is
`most often used in relation to a specific program;
`for example, a database engine contains the tools
`for manipulating a database.
`(Tomprire liacltwend
`processor, front—end processor.
`Enhanced Expanded Memory Specification
`\en—hansd‘
`elts-pan"dad mcm'ar-t‘:
`spcs‘a—fa—
`kfi‘sham it. Set-'EEMS.
`
`Enhanced Graphics Adapter \en—hansd" gral"iks
`a-dap'tar\ it. See EGA.
`Enhanced Graphics Display \en—hansd‘ gntf'iks
`dis—plfiW H. A PC video display capable of produc-
`ing graphic images with resolutions ranging lrtmt
`jZO X 200 Lhrough (340 X 400 pixels, in color or in
`black and white. Resolution and color depth
`
`depend on the vertical and horizontal scanning fre—
`quencies of the display. the capabilities ot‘the video
`display controller card. and available video RAM.
`Enhanced [DE \en-hansd‘
`I-D-E'\
`it. Short
`for
`
`Enhanced Integrated Drive Electronics. An exten-
`sion of the [DE standard, Enhanced IDE is a hard—
`
`ware interface standard for disk drive designs that
`house control circuits in the drives themselves.
`It
`
`allows for standardized interfaces to the system
`
`bus while providing for advanced features, such as
`3:331:55.
`burst data
`transfer
`and direct data
`
`Enhanced IDE accommodates drives as large as
`
`8.4 gigabytes (IDE supports up to 528 megabytes).
`It supports the. ATA—Z interlace, which permits
`transfer rates up to 13.?) megabytes per second
`t'lDlj permits up to 5.3 megabytes per second],
`and the ATAPI interface. which connects drives for
`
`CD-ROMS, optical discs and tapes, and multiple
`channels. Most PCs have Enhanced IDE drives,
`
`which are cheaper than SCSI drives and provide
`much of the same functionality. Acmrt‘t’m: HIDE
`{13“ I~D—E "l. Scerrfso IDE, SCSI.
`
`IV“
`-
`
`DEFS_ANCORA00002099
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 8 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 8 of 12
`filtering program
`
`FIR port
`
`designated output destination. A database filter, for
`example. might flag information of a certain age.
`2. In communications and electronics. hardware or
`
`software that selectively passes certain elements of
`a signal anti eliminates or minimizes others. A filter
`on a communications network, for example. must
`
`be designed to transmit a certain frequency but
`attenuate (dampen) Frequencies above it (a low—
`pass filter}, those below it (a highpass filter), or
`those above and below it (a bandpass filter}. 3. A
`
`pattern or mask through which data is passed to
`weed out specified items. For instance, a filter tiSed
`in e-mail or in retrieving newsgroup messages can
`allow users to filter out messages from other users.
`See (rise e—niail filter, mask. 4. In computer graph-
`ics. a special effect or production effect
`that
`is
`applied to bitmapped images: for example. shifting
`pixels within an image. making elements of the
`image transparent. or distorting the image. Some
`filters are built into a graphics program, such as a
`paint program or an image editor. Others are sep—
`arate software. packages that plug into the graphics
`program. See also bitmapped graphics. image edi—
`tor. paint program.
`
`it. A
`filtering program \fil’tar-éng pro‘gram\
`program that filters inl‘ol‘matit'in and presents only
`results that match the qualifications defined in the
`program.
`
`FilterKeys \fil 'tar-kéz'\ n. A Windows 95 accessi—
`bility control panel feature that enables users with
`physical disabilities to use the keyboard. With liil—
`Ierlx'eys.
`the system ignores brief and repeated
`keystrokes that result from slow or inaccurate fin—
`
`ger movements. See 5:!er accessibility. Crunjiai‘e
`Mouseiieys. ShowSounds, SoundSentrv. Sticky~
`Keys, ToggleKeys.
`Final-Form-Text DCA \fT nal-li’it‘m—teltst’ D-C-A ’\
`
`copy, and delete files; and to launch applications.
`items in the system are. often represented as icons,
`and a mouse or similar pointing device is used to
`
`manipulate these items. The Finder was the first
`commercially successful graphical user interface.
`and it helped launch a wave of interest in icon-
`based systems. See also M u ltiFinder.
`finger]
`\I’Eng'or‘t
`it. An internet utility. originally
`limited to UNIX but now available on many other
`
`platforms. that enables a user to obtain informa-
`
`tion on other users who may be at other sites (if
`those sites permit access by finger}. Given an e-
`mail address. finger returns the user's full name. an
`
`indication of whether or not the user is currently
`logged on, and any other irifta'ination the user has
`chosen to supply as a profile. Given a first or last
`name,
`finger returns the logon names of users
`whose. first or last names match.
`
`rib. To obtain information on a
`\fEng’ar‘t
`Finger“3
`user by means of the finger program.
`n. A
`fingerprint reader \lEttg'-ar-print
`ré‘dafl
`scanner that reads human fingerprints for animal'-
`ison to a database of stored fingerprint images.
`FIPS Itfips, F‘l-I’-S'\
`it. St.“ Federal
`information
`Processing Standards.
`
`firewall \tir’wiih a. A security system intended to
`
`protect an organization's network against external
`threats. such as hackers. coming from another net—
`
`wrtirk. such as the lnternet. A firewall prevents
`enn‘tputers
`in the organization's network from
`communicating directly with computers external
`to the network and vice versa. Instead, all commu-
`
`nication is routed through a proxy server outside
`of the organization’s network. and the proxy
`server decides whether it is safe to let a particular
`message or file pass through to the organization’s
`netwrirk.
`
`n. A standard in Document Content Architecture
`
`firmware \farnt 'wftfl
`
`it. Software routines stored
`
`for storing documents in ready-to-print
`(DCA)
`form for interchange between dissimilar progra ms.
`A related standard is Revisable»Fortn—'l‘ext DCA
`
`( RFI'DCA ). .‘lCiUlt‘Fm: F FTDCA (1:~ F-T D-C-A "). See
`also DCA (definition 1). (firmware Revisahle—li‘orm—
`Text [)CA.
`find \find\ ch...9eese;trcl1‘a.
`Finder \fl'n’dofl n. The standard interface to the
`
`Macintosh operating system, allowing the user to
`view the contents of directories (folders): to move.
`
`(ROM). L'nlike r'andt'im
`in read-only memoryr
`access memory (RAM). read-only memory stays
`
`intact even in the absence of electrical power.
`
`input/output
`low—level
`and
`routines
`Startup
`instructions are stored in firmware. It falls lJetween
`software and hardware in terms of ease of modifi—
`
`cation. Seeriisu RAM. ROM.
`
`FIR port \Fl-R’ pot“ :3. Short for fast infrared
`port. A wireless [/0 port. most common on a
`portable computer. that exchanges data with an
`
`DEFS_ANCORAOOOO21OO
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 9 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Pa 9 9 of 12
`m
`
`when a new version is installed. For example. will
`a new spreadsheet software release he able to
`read the existing business records without expen—
`sive and time-consuming conversion to a new for-
`mat? Many legacy systems are based on mainframe
`computers. which are heing slowly replaced in
`many organizations hy L‘llttl‘ll.r"5tfl‘\’{':l' architectures.
`.S'ee also mainframe computer. Cmnpmc client/
`sewer architecture.
`
`legend \lej 'and\ 31. Text that describes or explains
`a graphic. usually printed lielow the graphic. On a
`graph or map. the legend is the key to the patterns
`or the symht'ils used.
`ziy‘
`Lempel Ziv algorithm \le1n“pal
`and. n. A mathematical algorithm designed tr.)
`
`al 'ga-ridh-
`
`reduce a data file's size without sacrificing its
`
`integrity. See also .1211.
`length \length‘t
`it. The number of linear units of
`storage space occupied by an ohiect. such as a file
`on disk or a data structure in a program. typically
`
`measured in hits, hytcs. or lilocks.
`less than \les‘ dhan\ my. Seerelationai operator.
`less than or equal to \Ies‘ dhan Cur E'ltwal to?“
`(elf. See relational operator.
`letterbomb \let'or—homW n. An e-mail message
`
`that is intended to impair the recipient's computer
`use. Some sequences of control characters can
`lock up a terminal. tiles attached to the message
`may contain viruses or Trojan horses. and a suffi—
`ciently large message can overflow a mailhox or
`crash a system. Riordan control character, e—maill
`{definition '1). mailbox. Trojan horse. virus.
`
`ruff. Pertaining to
`letter quality \let'ar kwii’la-tr3\
`or being a level of print quality on dra-tnatrix
`printers that
`is better than draft quality. As the
`name implies. letter quality is supposed to he crisp
`and dark enough for use in husiness letters. See
`trtfso print quality. Ctmtprn'e dntft quality. near—
`letter-quality.
`letter-quality printer \let‘Or kwit-ls—te printed
`it. Any printer that produces output high enough
`in quality to he acceptable for business letters. See
`also daisy—wheel printer. laser printer.
`level 1 cache \ley‘al wsn’ kash'\ it. Seell cache.
`level 2 cache \lev‘al it?) hash‘\ N. Ste L2 cache.
`
`lexicographic sort \leks‘a-kn—grat‘ik s6rt'\ u. A
`sort that arranges items in the order in which they
`
`would appear if listed in a dictionary. A lexico—
`
`ltgi‘ru‘ihic sort puts numbers. for instance. Where
`they would he if they Were spelled out; for exam—
`ple. in? wmtld fall
`in the F's. 6?”??chth alphanu-
`meric sort.
`
`lexicon \lelts's‘lmnW it. 1. The words of a lan~
`
`guage and their definitions. 2. In programming.
`the identifiers. keywords. constants. and other ele—
`ments of a language that make up its "Vocahulaiy."
`The ways in which these vocahulary elements can
`he put
`together is
`the syntax of the language.
`Catapult? syntax.
`LF \L-l-"\ u. .‘feelinefeed.
`
`LHARC \L‘l-t~A"lt—C'\ n. A freeware file—compres—
`sion utility program developed hy Haruyasu
`‘r'oshizaki and introduced in 1988. With LllARC,
`the contents of one or more files can he cont~
`
`pressed into a singular. smaller tile. with the exten-
`sion .lhtt. A copy of the program is required to
`
`uncompress these files. LHARC can also emhed a
`small program with the compressed information
`and save everything in a single file. called a self-
`
`extt‘acting archive. with an .exe extension. As a
`
`result.
`
`the recipient of the compressed file does
`
`not need a separate utility program to uncompress
`the file. Swarm freeware. PKZIP. utility program.
`.li
`\tlot‘I.-I'\ n. On the Internet.
`the maior geo—
`
`graphic domain specifying that an address is
`located in Liechtenstein.
`
`library \li 'hrflr‘E. li'lit‘ar~e\ n. 1. In programming.
`a collection of routines stored in a file. Each set of
`
`instructions in a lihrary has a name. and each per-
`forms a different task. 2. A ct'illet‘rion of software
`
`or data files.
`
`library routine \li’hrar'e rtE—ten‘.li'brar-e\ n. In
`progranuning. a routine stored in a collection of
`routines [a library} that can he used hy any pm-
`grain that can link into the library. See also func—
`tion lihrary, lihraiy {definition '1 1.
`.libJJs \dot-llh'dotdLi—S'_. dot-lrl-B‘dot-ll—SN It. On
`
`the Internet. the major geographic domain speci-
`
`fying that an address belongs to a lihrary in the
`United States.
`
`license agreement \If 'sens o-gre' ntant\ u. A legal
`contract between a software provider and a user
`specifying the rights of the user regarding the soft—
`ware. Usually the license agreement
`is in effect
`with retail software once the user opens the soft—
`ware package.
`
`I_
`
`DEFS_ANCORAOOOO2101
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 10 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 10 of 12
`
`noninterlaced
`
`normalize
`
`without striking it mechanically. The most com—
`mon types are ink—jet. thermal. and laser printers.
`See who ink-jet printer.
`laser printer,
`thermal
`printer. GJHIIJH‘J'L’ impact printer.
`draft. A display
`noninterlaccd \non‘in'tar-li'isd\
`method on raster-scan t'rtonitors in which the elec—
`tron beam scans each line of the screen once dur-
`
`ing each refresh cycle. Compare interlacing.
`in'tor-
`nonmaskable interrupt \non‘mas—kowbl
`upt\
`it. A hardware interrtlpt
`that bypasses and
`takes priority over interrupt requests generated by
`software and by the keyboard and other such
`devices. A nonmaskable interrupt cannot he over—
`ruled (masked) by another service request and is
`issued to the microprocessor only in disastrous cir-
`cumstances. such as severe memory errors or
`impending pt iwer failures. .‘lcrrnrttttt: NM] (N‘M-l 'l.
`Compare maskablc interrupt.
`nonprocedural language \nodpm—séviar-al lang—
`wojl. n. A programming language that does not
`follrwv the procedural paradigm of executing state-
`rnents, subroutine calls, and control
`structures
`
`sequentially but instead describes a set of facts and
`relationships and then is queried for
`specific
`results. (Li'nttfirtre procedural languag
`nonreturn to zero \non‘ ra—tarn ta zér'o‘i H. 1. In
`
`data transmission. a method of E'Jl'lt‘tltlir‘lg data in
`which the signal representing binary digits alter—
`nates between positive and negatiVe voltage when
`there is it change in digits from '1 to 0 or vice t-‘ersa.
`In other Words,
`the signal does not return to a
`zero. or neutral,
`level after transmission of each
`
`hit. ‘l‘iming is used to distinguish one hit from the
`next. 2. In the recording of data on a magnetic
`surface, a method in which one magnetic state
`represents a l and, usually. the. opposite state rep—
`resents a ti. Acuin‘t’m: NRZ tN‘R—Z’l.
`
`nontrivial \non‘triv 'E-ah ruff. Being either difficult
`or particularly meaningful. For example. a con‘tpli—
`cated programmed procedure to handle a difficult
`problem would represent a nontrivial st ilution,
`nonuniform memory architecture \rton'yfifi-
`tin-form mentor-é iir'ltn—tek—chufl H. A system
`architecture designed for Sequent‘s Non—Uniform
`Access Memory, :1 type of distributed shared mem-
`ory using a number of shared memory segments
`instead of a single centraliZed physical memory.
`Acronym.- NI ‘MA t nan 'mn. N"t"-l\*I—A').
`
`n‘tctn'ar—EW
`nonvolatile memory \ntm‘vol'a—tal
`n. A storage system that does not lose data when
`power is removed from it. Intended to refer to
`
`core memory. ROM, EPROM, flash memory. hub-
`ble memory, or battery—hacked CMOS RAM, the
`term is occasionally used in reference to disk sub»
`systems as well. See also bubble memory, t'ZMOH
`RAM. core. EPROM, flash memory, ROM.
`NO-OP \no'op. N0—(_)-P"\
`ll.
`.5'ce
`tin—operation
`instruction.
`
`in—
`net-operation instruction \no'op—ar-fi 'shan
`struk‘sham n. A machine instruction that has no
`
`results other than to cause the processor to use up
`clock cycles. Such instructions are useful in certain
`situations, such as padding out
`liming loops or
`forcing subsequent instructions to align on certain
`memory boundaries.
`.rlcmnym: Ni J—OI’
`(no op.
`(list i
`N‘O—O—P’l. NOP
`t'nt‘i'op, N"(J~i"‘i.
`Sec
`machine instruction.
`
`NOP \nfi'op. N"O—P"t H. See i‘to—opcution instruc-
`lion.
`
`normal distribution \nr‘n“ma| dis‘trmbyrfi ‘shmn
`it. In statistics, a type of function that describes the
`prr.)b:tbilities of the possible values of a random
`variable. The function. whose graph is the familiar
`bell-shaped curve. can he used to determine the
`
`prol‘iability that the value of the variable will fall
`Within a particular interval of values.
`normal form \nor‘tnal form’\ n. 1. In a relational
`
`database. a set of guidelines for structuring infor-
`mation to avoid redundancy and inconsistency
`and to promote efficient use of resources. A table
`in first normal form adheres to the first guideline,
`one in secrntd normal form adheres to the first two
`
`guidelines. and so forth. 2. In programming. the
`metalanguage sometimes called the Backus nor—
`mal form tBackus—Nttur form l. a language used for
`describing the syntax of other languagesuspecifi—
`cally. ALGOL {it}, for which it was invented. See
`also Backus—Nam form.
`
`normal hyphen \nt'ir'tnal retain it. St’t’ hyphen.
`normalize \nor'nin-liz'\ ch. 1. in programming,
`to adjust the fixed-point and exponent portions of
`a floating-point number to bring the fixed-point
`portions within a specific range. 2.
`in database
`management. to apply a body of techniques to a
`relational database in order to minimize the inclu~
`
`sion of duplication information. Nonnalization
`
`DEFS_ANCORAOOOO2102
`
`

`

`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 11 of 12
`Case 1:20-cv-00034-ADA Document 45-18 Filed 03/20/20 Page 11 of 12
`
`profile
`
` programmable read-only memory
`
`ob. To analyze a program to
`profile \pro‘fil‘t
`determine how much time is spent
`in different
`parts of the program during execution.
`Profiles for Open Systems Internetworklng
`Technology \pi‘o‘filz liar o‘pnn si‘stomz in‘tor-
`net‘war-kéng tek-nola-ja it. See POSIT.
`
`program \pifi’graim n. A sequence of instruc-
`tions that can be executed by a computer. The
`term can refer to the original sottrce code or to the
`
`executable (machine language} version. Also
`called software. See also program creation, rou-
`tine. statement.
`
`program card \pro’gntm kitrd‘l.
`ROM card.
`
`it. See PC Card.
`
`program cartridge \pro'gram kiir‘trii‘t
`ROM cartridge.
`program counter \pro'gram koun“tar\ rr.A1'egis-
`ter (small. high-speed memory circuit within a
`microprocessor} that contains the address (loca-
`tion) of the instruction to be executed next in the
`
`H. See
`
`program sequence.
`
`program creation \pi-c’r'grant kre-a‘sham n. The
`process of producing an executable file. Tradition-
`ally. program creation comprises three steps; (1}
`compiling the high~level source code into assem-
`bly language source code;
`('2) assembling the
`assembly language source code into machine-
`codc obiect files; and t5) linking the machine-code
`object Files with various data files, run-time Files,
`and libranr files into an executable file. Some com—
`pilers go directly front high-level
`source to
`machine—code object, and some integrated devel—
`opment environments compress all
`three steps
`into a single command. See also assembler. com-
`piler [definition 2:}, linker, program.
`program file \pro’gntm fil‘\ n. A disk file that
`contains the executable portionts) of a computer
`program. Depending on its size and complexity.
`an application or other program. such as an oper-
`ating system, can be stored in several different
`files, each containing the instructions necessary for
`some part of the program’s overall functit'ming.
`Compare document file.
`program generator \pro'gram jcn’or—a—tafl n. A
`program that creates other programs {usually in
`source code} based on a set of specifications and
`relationships given by

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket