throbber
Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 1 of 9
`
`Exhibit 7
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 2 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`_ a ~
`
`
`
`Dictionary of
`Computer and
`Internet Terms
`
`
`
`Eleventh Edition
`
`Douglas A. Downing, Ph.D.
`School of Business and Economics
`Seattle Pacific University
`
`Michael A. Covington, Ph.D.
`Artificial Intelligence Center
`The University of Georgia
`
`Melody Mauldin Covington
`Covington Innovations
`Athens, Georgia
`
`Catherine Anne Barrett, BRA.
`University of Kentucky Law School
`Lexington, Kentucky
`
`Sharon Covington, B.A.
`Covington Innovations
`Athens, Georgia
`
`NZ
`
`BARRON'S
`
`NIN_ANC_0026369
`
`NIN_ANC_0026369
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 3 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`
`
`ABOUT THE AUTHORS
`
`the School of
`Douglas Downing teaches economics and quantitative methods at
`Business and Economies at Seattle Pacific University, He is the author of several
`books in both Barron’s K-Z and Business Review series. Heis also the authorof Java
`Programming the Easy Way and Dictionary of Mathematics Terms, published by
`Barron’s Educational Series, Inc. He holds the Ph.D. degree in economics from
`Yale University.
`Michael Covington is Associate Director of the Artificial Intelligence Institute at
`the University of Georgia, He is the author of several books and over 250 magazine
`articles. He holds the Ph.D. degree in linguistics from Yale University.
`Melody Mauldin Covington is a graphic designerliving in Athens, Georgia. Sheis
`the author of Dictionary efDesktop Publishing (published by Barron’s).
`Catherine Anne Barrett is a graduate of the Lamar Dodd Schoolof Art (University
`of Georgia) and a student at University of Kentucky Law School.
`Sharon Covington is a graduate of Emory University.
`
`© Copyright 2013, 2009, 2006, 2003, 2000, 1998, 1996, 1995, 1992, 1989, and 1986
`by Barron's Educational Series, Inc.
`
`All rights reserved.
`Nopartof this publication maybe reproducedordistributed in
`anyform or by any means without the written permission
`of the copyright owner.
`
`Barron’s books are available at special quantity discounts to use as premiums and
`sales promotions, or for use in corporate training programs. For more information,
`please write to the Special Sales Manager, Burron’s Educational Series, Inc., at the
`mailing address indicated below.
`
`All inquiries should be addressed to:
`Barron’s Educational Series, Inc.
`250 Wireless Boulevard
`Hauppauge, NY 11788
`www.barronseduc.com
`
`ISBN: 978-0-7641-4755-5
`
`Library of Congress Control Number: 2012021295
`
`Library of Congress Cataloging-in-Publication Data
`Dictionary of computer and internet
`terms / Douglas A. Downing... [et al.]. —
`Eleventh ed.
`p.
`em.
`Includes bibliographical references and index.
`ISBN 978-0-7641-4755-5 (alk. paper)
`1. Computers—Dictionaries.
`2, Internet-Dictionarics.
`QA76,15.D667
`2012
`004.03-de23
`
`1. Downing, Douglas.
`
`2012021295
`
`PRINTED IN CHINA
`987654321
`
`NIN_ANC_0026370
`
`NIN_ANC_0026370
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 4 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22
`
`P ~
`
`
`
`BIOS
`
`|
`
`The range of numbersthat can be representedis different than before.
`Without the sign bit, 4 binary digits can hold numbers from 0 to 15; with
`the sign bit, the numbers range from —8 to 7. The table shows how.
`Positive
`Numbers
`| Negative
`Numbers|
`
`Decimal
`Binary
`Decimal
`Binary
`0
`0000
`1111
`-1
`1
`0001
`1110
`2
`2
`0010
`1101
`3
`3
`oo1l
`1100
`—4
`4
`0100
`Lo1l
`-5
`5
`0101
`1010
`-6
`6
`0110
`1001
`-1
`7
`Olli
`
` -8 L000
`
`
`
`Onreal computersit is typical to use 16 bits (2 bytes) to store integer
`values. Since one ofthesebits is the sign bit, this meansthat the largest
`positive integer that can be representedis 2'° — | = 32,767, and the most
`negative numberthat can be represented is (2'*) = -32,768, Some pro-
`gramming languages also provide an “unsigned integer” data type that
`ranges from 0 to 65,535.
`pind to associate symbols with data, or to associate one piece of data with
`another, in several different ways, among them.
`1.
`to give a variable a value.
`2.
`to allocate a specific address in memory to a variable or to the entry
`point of a procedure.
`3,
`to associate a network protocol with a particular Ethernet port or the
`like. See PROTOCOL.
`4,
`to map an XML document ontoa set ofvariables or objects in Java
`or another programming language.
`5.
`to put togetherthe pages of a book.
`binding see BIND (all definitions).
`Bing search engine from Microsoft (web address: www, bing.cont)
`biometrics measurable physical characteristics of the human body, used to
`identify an individual for security purposes. They include fingerprints,
`the distinctive appearance of faces and eyes, and the distinctive sound
`quality of one’s voice. There are computer input devices to read these
`characteristics.
`
`BIOS (Basic Input Output System) a set of procedures stored on a ROM
`chip inside PC-compatible computers, These routines handle all input-
`output functions,
`including screen graphics, so that programs do not
`have to manipulate the hardware directly. This is important because if
`the hardware is changed (e.g., by installing a newer kind of video
`
`NIN_ANC_0026371
`
`NIN_ANC_0026371
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 5 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`
`BIOS enumerator
`
`54
`
`}
`
`{
`
`adapter), the BIOS can be changed to matchit, and there is no need to
`change the application programs.
`The BIOSis not re-entrant and is therefore not easily usable by mul-
`titasking programs. Windows programs do not call the BIOS; instead,
`they usc procedures provided by the operating system,
`BIOS enumerator the BIOS routine that tells a pluiG AND PLAY system
`what hardwareis installed.
`bipolar transistor a semiconductor device formed by sandwiching a thin
`layer of P- or N-type semiconductor between two layers ofthe opposite
`type of semiconductor, (See TRANSISTOR.) The: other general
`type of
`transistor is the field-effect transistor (FET).
`bis Latin for “a second time,” used to denote revised CCITT and ITU-T
`standards, See CCITT; tTu-T.
`
`BIST (built-in self test) a feature included in newer integrated circuits and
`other clectronic equipment. An electronic device that has BIST cantest
`itself thoroughly wheneverit is urned on. See INTEGRATED CIRCUIT.
`bit a shorthand termfor binarydigit, There are only two possible binary
`digits: O and 1, (See BINARY NUMBER.) A computer memory is a collec-
`tion of devices that can storebits.
`A byte is the numberofbits (usually 8) that stand for one character.
`Memory is usually measuredin units of megabytes. Seé MEMORY; METRIC
`PREFIXES,
`
`One important measure of the capability of a microprocessor is the
`number of bits that each internal register can contain. For example, the
`classic Z80 microprocessor had 8-bit registers. The Intel 8088. used in
`the original IBM PC, had 16-bit registers but only an 8-bit bus, leading
`to some confusion as to whether it should really have been called a
`16-bit processor. Newer microprocessors have 32 or 64 bits perregister.
`In general, a processor with a greater numberofbits per instruction can
`process data more quickly (although there are other factors to consider
`that also determine a computer's speed), See also MICROPROCESSOR.
`The number of colors that can be displayed is sometimes given by
`listing the numberof bits used to represent a color. For example, a 24-bit
`color systemuses § bits for red, 8 for green, and 8 for blue, so it can
`display 2*= 256different levels of each of the three primary colors, or
`2" = 16,777,216 different mixtures ofcolors. See COLOR.
`Theterm bit is also used to indicate the quality ofdigitized sound, as
`in 8 bit or 16 bit. See SAMPLING RATE.
`
`sity and color of euch pixel. For example, 1-bit graphics can distinguish
`
`bit bucket (slang) a place where datais lost, For example, under UNIX, the
`filename /dev/nu71 can be used as a bit bucket; anything written to it
`will be ignored, but the program will think it is successfully writing to a
`file.
`
`bit depth in graphics, the numberofbits that are used to record the inten-
`
`NIN_ANC_0026372
`
`NIN_ANC_0026372
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 6 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22
`P
`
`keying
`
`Usage note: For obscure reasons this term is often spelled kernal.
`This maybe nothing more than a typing error that appeared in an influ-
`ential manual and caught on.
`
`kerning adjustment of the amount of space between certain combinations
`ofletters in proportional-pitch type. If the combination “To” is typeset
`with the sameletter spacing as “Th,” the letters seem Lo be too widely
`spaced. “To” looksbetter if the Lop ofthe “T”is allowed to overhang the
`“o”slightly. See Figure 147, Compare TRACKING.
`
`To|Without kerning
`To
`With exaggerated kerning
`FIGURE 147. Kerning
`
`279
`
`Ee
`
`key
`1. a button on a computer keybuard.
`2.
`the item by whicha data file is sorted or searched. For instance,if a
`file of names and addresses is sorted by zip codes, then the zip code is
`the key.
`information needed to decode an
`3.
`the password or other secret
`encrypted message. See ENCRYPTION.
`
`keyboard the primary computer input device for alphanumeric data. There
`are manydifferent types of keyboard layouts; for the most part the alpha-
`bet and numbersare consistently placed,but there is considerable varia-
`tion in the placement of the auxiliary characters, editing keys, and
`function keys. Most keyboards have a numeric keypad (for typing digits)
`at the right; if you use a mouse a lot, but don’t type many numbers, you
`mayprefer a narrower keyboard that omits the keypad and lets you put
`your mousecloser to where you sit. Some keyboards have a mouse-like
`pointing device built in; these are gencrally fine for menu selection but
`not precise enough for drawing.
`When buying a new computer, be sure to evaluate the keyboard care-
`fully.A keyboard that feels “dead” can be tiring to use. Practice typing
`on several different models to find one that feels good to you. Spending
`a few extra dollars for a good keyboard can be a wise investment, aftcr
`all, it is the part of your computer that youarc in contact with constantly.
`See also U.S. INTERNATIONAL; VIRTUAL KEYBOARD; WIRELESS KEYBOARD.
`
`keyboard shortcut see SHORTCUT.
`Keyboard viewer a screcn showing howto type special characters on a
`Macintosh.
`
`keyboarding entering data through the keyboard; typing.
`keying
`J.
`typing;
`keyboard.
`
`inputting information into the computer by means of the
`
`NIN_ANC_0026373
`
`NIN_ANC_0026373
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 7 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`
`
`Leopard
`Leopard version 10.5 of MAC osx.
`letter size the size of paper used for businessletters in the United States,
`8/2 * 11
`inches. Elsewhere, ISO size A4 is the nearest equivalent. See
`PAPERSIZES,
`
`288
`
`FIGURE 151. Legal- andletter-sized paper
`
`letterspacing the space betwcenletters (characters). See Figure 152. Look
`for the letterspacing controls with other FRAMEattribute commands(let-
`terspacing is sometimes called ‘TRACKING).
`
`veryloose
`loose
`normal
`tight
`touching
`FIGURE 152.Letterspacing
`
`LF(line feed) the character codethattells 4 printer or terminal to advance
`to the next line; ASCIT cade 10. See CRLF.
`Li-ion (Lithium-ion)a type of rechargeable battery widely used in portable
`computers, They have high-energy density and slowloss of charge. Dur-
`ing use, current is created by the movementoflithium ions to the posi-
`tive electrode, through a non-aqueous separator. See BATTERY.
`library
`1. a collection of files, computer programs, or subroutines. A loader
`library is a file containing subroutines that ean be linked into a machine
`language program.
`2. acollection of reference matcrials and software tools, such as clip art,
`prerecorded sounds, and predefined objects.
`license permission to use patented or copyrighted material. See PER CoM-
`PUTER, PER SEAT, PER USER; SHRINKWRAP LICENSE; SOFTWARE LICENSE.
`
`NIN_ANC_0026374
`
`NIN_ANC_0026374
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 8 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22
`-_
`
`391
`
`programming language
`
`windows and drawing on them) play a very large role in any program
`and are easy to perform.
`processor séé COPROCESSOR; CPU; MICROPROCESSOR.
`profile
`L.
`in any software package or operating system, a file of saved informa-
`tion that contains settings chosen by the user.
`2.
`in Windows,the folder containing information specific to one user,
`including account
`information, numerous settings and preferences,
`e-mail files, the DESKTOP andall the files on it, and the like. See Docu-
`MENTS AND SETTINGS. See also ROAMING USER PROFILES.
`3. a user’s home page on a social networking site, displaying basic
`biographical information and pictures.
`programasetof instructions for a computer to execute. A program can be
`written in a programming language, such as C or Java,or in an assembly
`language. See APPLICATION PROGRAM;UTILITY.
`
`programmable function key a key on a computer keyboard whose func-
`tion depends on the software being run. In many cases, programmable
`function (PF) keys can be defined as equivalent to combinations or
`sequencesof other keys.
`programmatically (adverb) by means of a computer program. For exam-
`ple, in Windows, the volumelevel of the speaker can be changed pro-
`grammatically; that is, software can changeit.
`programmera person who prepares instructions for computers.
`programming the process of composing instructions for a computer to
`carry out. A programmerneedsto develop a well-defined concept of how
`to solve a problem. (See ALGORITHM.) Then this concept mustbe trans-
`lated into a computer language. (See PROGRAMMING LANGUAGE.) Finally,
`the program needs to be typed into the computer, tested, and debugged
`before being placed into service.
`programming language a languageusedto give instructions to computers.
`During the 1960s and 1970s, a huge variety of programming languages
`were developed, most of which are no longer in wide use. Moreover,a
`substantial amount of programming is now done with special program
`developmenttools (¢.g., Visual Basic), or in programming languages
`that pertain to specific pieces of software (e.g., Maple) rather than by
`simply writing instructionsin a general-purpose language.
`The following is a rough classification of programming languages.
`Mostof these languagesare treated in separate articles in this book.
`1. General-purpose languages for large, complex programs: PL/I, C,
`C++, Pascal, Modula-2, Ada, Java, C#.
`2. General-purpose languages for smaller programs: BASIC, Visual
`Basic, Pascal, Python.
`
`NIN_ANC_0026375
`
`NIN_ANC_0026375
`
`

`

`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 9 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`a
`
`409
`
`~
`
`recursion
`
`properly before powerto the computeris turned off; otherwise, data will
`be lost. See BOOT; CTRL-ALT-DEI; SAFE MODE.
`record a collection of related data items. For example, a company may
`store information about each employee in a single record. Each record
`consists of several fields—a field for the name,a field for a Social Secu-
`rity number, and so on.
`The Pascal keyword record correspondsto struct in C. See STRUCT.
`In object-oriented languages,
`the same concept is uscd in a more
`general fashion: an OBJECT can include methods as well as data items.
`recovering erasedfiles retrieval of deleted [iles whose space has not yet
`been overwritten by other data.
`In Windows and on the Macintosh, deleted files usually go into a
`TRASH can Of RECYCLE BIN from which they can be retrieved. The disk
`spaceis not actually freed until the user empties the trash. Until then,the
`files can be restored to their original locations.
`Evenafter the trash can or recycle bin has been emptied, the physical
`disk spacethatthe file occupied is marked as free, butit is not actually
`overwritten until the space is needed for something else. If you crase a
`file accidentally, you can often get it back by using special software. As
`soon as you realize you wantto recovera file, do everything you can to
`stop other programs from writing on the same disk so that nothing else
`will be written in the space thatthe file occupied.
`
`recursion the calling of a procedure byitself, creating a new copy of the
`procedure.
`To allow recursion, a programming language must allow for local
`variables (thus, recursion is not easy to accomplish in most versions of
`BASIC). Each time the procedure is called, it needs to keep track of
`valucs for the variables that may be different from the values they had
`the last time the procedure was called. Therefore, a recursive procedure
`that calls itself many times can consumea lot of memory.
`Recursionis the natural way to solve problems that contain smaller
`problems of the same kind. Examples include drawing some kinds of
`fractals (see FRACTAL); parsing structures thal can have similar structures
`inside them (see PARSING); sorting (see QUICKSORT); and calculating the
`determinant of 4 matrix by breaking it up into smaller matrices.
`A recursive procedure can be used to calculate the factorial of an
`integer. (See FACTORIAL.) Figure 216 shows aprogramthat does so.
`A simple example of recursion involves finding factorials, defined as
`follows:
`1. The factorial of 0 or 1 is 1.
`2. The factorial of any larger whole numberx is x times the factorial
`ofx—-1.
`This definition is recursive in step 2, becauseto find a factorial, you have
`to find another factorial. It can be translated directly into a recursive
`computer program (Figure 214). Admiltedly, this is not the fastest way
`to do the computation,butit is a classic example.
`
`NIN_ANC_0026376
`
`NIN_ANC_0026376
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket