`
`Exhibit 7
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 2 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`_ a ~
`
`
`
`Dictionary of
`Computer and
`Internet Terms
`
`
`
`Eleventh Edition
`
`Douglas A. Downing, Ph.D.
`School of Business and Economics
`Seattle Pacific University
`
`Michael A. Covington, Ph.D.
`Artificial Intelligence Center
`The University of Georgia
`
`Melody Mauldin Covington
`Covington Innovations
`Athens, Georgia
`
`Catherine Anne Barrett, BRA.
`University of Kentucky Law School
`Lexington, Kentucky
`
`Sharon Covington, B.A.
`Covington Innovations
`Athens, Georgia
`
`NZ
`
`BARRON'S
`
`NIN_ANC_0026369
`
`NIN_ANC_0026369
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 3 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`
`
`ABOUT THE AUTHORS
`
`the School of
`Douglas Downing teaches economics and quantitative methods at
`Business and Economies at Seattle Pacific University, He is the author of several
`books in both Barron’s K-Z and Business Review series. Heis also the authorof Java
`Programming the Easy Way and Dictionary of Mathematics Terms, published by
`Barron’s Educational Series, Inc. He holds the Ph.D. degree in economics from
`Yale University.
`Michael Covington is Associate Director of the Artificial Intelligence Institute at
`the University of Georgia, He is the author of several books and over 250 magazine
`articles. He holds the Ph.D. degree in linguistics from Yale University.
`Melody Mauldin Covington is a graphic designerliving in Athens, Georgia. Sheis
`the author of Dictionary efDesktop Publishing (published by Barron’s).
`Catherine Anne Barrett is a graduate of the Lamar Dodd Schoolof Art (University
`of Georgia) and a student at University of Kentucky Law School.
`Sharon Covington is a graduate of Emory University.
`
`© Copyright 2013, 2009, 2006, 2003, 2000, 1998, 1996, 1995, 1992, 1989, and 1986
`by Barron's Educational Series, Inc.
`
`All rights reserved.
`Nopartof this publication maybe reproducedordistributed in
`anyform or by any means without the written permission
`of the copyright owner.
`
`Barron’s books are available at special quantity discounts to use as premiums and
`sales promotions, or for use in corporate training programs. For more information,
`please write to the Special Sales Manager, Burron’s Educational Series, Inc., at the
`mailing address indicated below.
`
`All inquiries should be addressed to:
`Barron’s Educational Series, Inc.
`250 Wireless Boulevard
`Hauppauge, NY 11788
`www.barronseduc.com
`
`ISBN: 978-0-7641-4755-5
`
`Library of Congress Control Number: 2012021295
`
`Library of Congress Cataloging-in-Publication Data
`Dictionary of computer and internet
`terms / Douglas A. Downing... [et al.]. —
`Eleventh ed.
`p.
`em.
`Includes bibliographical references and index.
`ISBN 978-0-7641-4755-5 (alk. paper)
`1. Computers—Dictionaries.
`2, Internet-Dictionarics.
`QA76,15.D667
`2012
`004.03-de23
`
`1. Downing, Douglas.
`
`2012021295
`
`PRINTED IN CHINA
`987654321
`
`NIN_ANC_0026370
`
`NIN_ANC_0026370
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 4 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22
`
`P ~
`
`
`
`BIOS
`
`|
`
`The range of numbersthat can be representedis different than before.
`Without the sign bit, 4 binary digits can hold numbers from 0 to 15; with
`the sign bit, the numbers range from —8 to 7. The table shows how.
`Positive
`Numbers
`| Negative
`Numbers|
`
`Decimal
`Binary
`Decimal
`Binary
`0
`0000
`1111
`-1
`1
`0001
`1110
`2
`2
`0010
`1101
`3
`3
`oo1l
`1100
`—4
`4
`0100
`Lo1l
`-5
`5
`0101
`1010
`-6
`6
`0110
`1001
`-1
`7
`Olli
`
` -8 L000
`
`
`
`Onreal computersit is typical to use 16 bits (2 bytes) to store integer
`values. Since one ofthesebits is the sign bit, this meansthat the largest
`positive integer that can be representedis 2'° — | = 32,767, and the most
`negative numberthat can be represented is (2'*) = -32,768, Some pro-
`gramming languages also provide an “unsigned integer” data type that
`ranges from 0 to 65,535.
`pind to associate symbols with data, or to associate one piece of data with
`another, in several different ways, among them.
`1.
`to give a variable a value.
`2.
`to allocate a specific address in memory to a variable or to the entry
`point of a procedure.
`3,
`to associate a network protocol with a particular Ethernet port or the
`like. See PROTOCOL.
`4,
`to map an XML document ontoa set ofvariables or objects in Java
`or another programming language.
`5.
`to put togetherthe pages of a book.
`binding see BIND (all definitions).
`Bing search engine from Microsoft (web address: www, bing.cont)
`biometrics measurable physical characteristics of the human body, used to
`identify an individual for security purposes. They include fingerprints,
`the distinctive appearance of faces and eyes, and the distinctive sound
`quality of one’s voice. There are computer input devices to read these
`characteristics.
`
`BIOS (Basic Input Output System) a set of procedures stored on a ROM
`chip inside PC-compatible computers, These routines handle all input-
`output functions,
`including screen graphics, so that programs do not
`have to manipulate the hardware directly. This is important because if
`the hardware is changed (e.g., by installing a newer kind of video
`
`NIN_ANC_0026371
`
`NIN_ANC_0026371
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 5 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`
`BIOS enumerator
`
`54
`
`}
`
`{
`
`adapter), the BIOS can be changed to matchit, and there is no need to
`change the application programs.
`The BIOSis not re-entrant and is therefore not easily usable by mul-
`titasking programs. Windows programs do not call the BIOS; instead,
`they usc procedures provided by the operating system,
`BIOS enumerator the BIOS routine that tells a pluiG AND PLAY system
`what hardwareis installed.
`bipolar transistor a semiconductor device formed by sandwiching a thin
`layer of P- or N-type semiconductor between two layers ofthe opposite
`type of semiconductor, (See TRANSISTOR.) The: other general
`type of
`transistor is the field-effect transistor (FET).
`bis Latin for “a second time,” used to denote revised CCITT and ITU-T
`standards, See CCITT; tTu-T.
`
`BIST (built-in self test) a feature included in newer integrated circuits and
`other clectronic equipment. An electronic device that has BIST cantest
`itself thoroughly wheneverit is urned on. See INTEGRATED CIRCUIT.
`bit a shorthand termfor binarydigit, There are only two possible binary
`digits: O and 1, (See BINARY NUMBER.) A computer memory is a collec-
`tion of devices that can storebits.
`A byte is the numberofbits (usually 8) that stand for one character.
`Memory is usually measuredin units of megabytes. Seé MEMORY; METRIC
`PREFIXES,
`
`One important measure of the capability of a microprocessor is the
`number of bits that each internal register can contain. For example, the
`classic Z80 microprocessor had 8-bit registers. The Intel 8088. used in
`the original IBM PC, had 16-bit registers but only an 8-bit bus, leading
`to some confusion as to whether it should really have been called a
`16-bit processor. Newer microprocessors have 32 or 64 bits perregister.
`In general, a processor with a greater numberofbits per instruction can
`process data more quickly (although there are other factors to consider
`that also determine a computer's speed), See also MICROPROCESSOR.
`The number of colors that can be displayed is sometimes given by
`listing the numberof bits used to represent a color. For example, a 24-bit
`color systemuses § bits for red, 8 for green, and 8 for blue, so it can
`display 2*= 256different levels of each of the three primary colors, or
`2" = 16,777,216 different mixtures ofcolors. See COLOR.
`Theterm bit is also used to indicate the quality ofdigitized sound, as
`in 8 bit or 16 bit. See SAMPLING RATE.
`
`sity and color of euch pixel. For example, 1-bit graphics can distinguish
`
`bit bucket (slang) a place where datais lost, For example, under UNIX, the
`filename /dev/nu71 can be used as a bit bucket; anything written to it
`will be ignored, but the program will think it is successfully writing to a
`file.
`
`bit depth in graphics, the numberofbits that are used to record the inten-
`
`NIN_ANC_0026372
`
`NIN_ANC_0026372
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 6 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22
`P
`
`keying
`
`Usage note: For obscure reasons this term is often spelled kernal.
`This maybe nothing more than a typing error that appeared in an influ-
`ential manual and caught on.
`
`kerning adjustment of the amount of space between certain combinations
`ofletters in proportional-pitch type. If the combination “To” is typeset
`with the sameletter spacing as “Th,” the letters seem Lo be too widely
`spaced. “To” looksbetter if the Lop ofthe “T”is allowed to overhang the
`“o”slightly. See Figure 147, Compare TRACKING.
`
`To|Without kerning
`To
`With exaggerated kerning
`FIGURE 147. Kerning
`
`279
`
`Ee
`
`key
`1. a button on a computer keybuard.
`2.
`the item by whicha data file is sorted or searched. For instance,if a
`file of names and addresses is sorted by zip codes, then the zip code is
`the key.
`information needed to decode an
`3.
`the password or other secret
`encrypted message. See ENCRYPTION.
`
`keyboard the primary computer input device for alphanumeric data. There
`are manydifferent types of keyboard layouts; for the most part the alpha-
`bet and numbersare consistently placed,but there is considerable varia-
`tion in the placement of the auxiliary characters, editing keys, and
`function keys. Most keyboards have a numeric keypad (for typing digits)
`at the right; if you use a mouse a lot, but don’t type many numbers, you
`mayprefer a narrower keyboard that omits the keypad and lets you put
`your mousecloser to where you sit. Some keyboards have a mouse-like
`pointing device built in; these are gencrally fine for menu selection but
`not precise enough for drawing.
`When buying a new computer, be sure to evaluate the keyboard care-
`fully.A keyboard that feels “dead” can be tiring to use. Practice typing
`on several different models to find one that feels good to you. Spending
`a few extra dollars for a good keyboard can be a wise investment, aftcr
`all, it is the part of your computer that youarc in contact with constantly.
`See also U.S. INTERNATIONAL; VIRTUAL KEYBOARD; WIRELESS KEYBOARD.
`
`keyboard shortcut see SHORTCUT.
`Keyboard viewer a screcn showing howto type special characters on a
`Macintosh.
`
`keyboarding entering data through the keyboard; typing.
`keying
`J.
`typing;
`keyboard.
`
`inputting information into the computer by means of the
`
`NIN_ANC_0026373
`
`NIN_ANC_0026373
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 7 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`
`
`Leopard
`Leopard version 10.5 of MAC osx.
`letter size the size of paper used for businessletters in the United States,
`8/2 * 11
`inches. Elsewhere, ISO size A4 is the nearest equivalent. See
`PAPERSIZES,
`
`288
`
`FIGURE 151. Legal- andletter-sized paper
`
`letterspacing the space betwcenletters (characters). See Figure 152. Look
`for the letterspacing controls with other FRAMEattribute commands(let-
`terspacing is sometimes called ‘TRACKING).
`
`veryloose
`loose
`normal
`tight
`touching
`FIGURE 152.Letterspacing
`
`LF(line feed) the character codethattells 4 printer or terminal to advance
`to the next line; ASCIT cade 10. See CRLF.
`Li-ion (Lithium-ion)a type of rechargeable battery widely used in portable
`computers, They have high-energy density and slowloss of charge. Dur-
`ing use, current is created by the movementoflithium ions to the posi-
`tive electrode, through a non-aqueous separator. See BATTERY.
`library
`1. a collection of files, computer programs, or subroutines. A loader
`library is a file containing subroutines that ean be linked into a machine
`language program.
`2. acollection of reference matcrials and software tools, such as clip art,
`prerecorded sounds, and predefined objects.
`license permission to use patented or copyrighted material. See PER CoM-
`PUTER, PER SEAT, PER USER; SHRINKWRAP LICENSE; SOFTWARE LICENSE.
`
`NIN_ANC_0026374
`
`NIN_ANC_0026374
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 8 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22
`-_
`
`391
`
`programming language
`
`windows and drawing on them) play a very large role in any program
`and are easy to perform.
`processor séé COPROCESSOR; CPU; MICROPROCESSOR.
`profile
`L.
`in any software package or operating system, a file of saved informa-
`tion that contains settings chosen by the user.
`2.
`in Windows,the folder containing information specific to one user,
`including account
`information, numerous settings and preferences,
`e-mail files, the DESKTOP andall the files on it, and the like. See Docu-
`MENTS AND SETTINGS. See also ROAMING USER PROFILES.
`3. a user’s home page on a social networking site, displaying basic
`biographical information and pictures.
`programasetof instructions for a computer to execute. A program can be
`written in a programming language, such as C or Java,or in an assembly
`language. See APPLICATION PROGRAM;UTILITY.
`
`programmable function key a key on a computer keyboard whose func-
`tion depends on the software being run. In many cases, programmable
`function (PF) keys can be defined as equivalent to combinations or
`sequencesof other keys.
`programmatically (adverb) by means of a computer program. For exam-
`ple, in Windows, the volumelevel of the speaker can be changed pro-
`grammatically; that is, software can changeit.
`programmera person who prepares instructions for computers.
`programming the process of composing instructions for a computer to
`carry out. A programmerneedsto develop a well-defined concept of how
`to solve a problem. (See ALGORITHM.) Then this concept mustbe trans-
`lated into a computer language. (See PROGRAMMING LANGUAGE.) Finally,
`the program needs to be typed into the computer, tested, and debugged
`before being placed into service.
`programming language a languageusedto give instructions to computers.
`During the 1960s and 1970s, a huge variety of programming languages
`were developed, most of which are no longer in wide use. Moreover,a
`substantial amount of programming is now done with special program
`developmenttools (¢.g., Visual Basic), or in programming languages
`that pertain to specific pieces of software (e.g., Maple) rather than by
`simply writing instructionsin a general-purpose language.
`The following is a rough classification of programming languages.
`Mostof these languagesare treated in separate articles in this book.
`1. General-purpose languages for large, complex programs: PL/I, C,
`C++, Pascal, Modula-2, Ada, Java, C#.
`2. General-purpose languages for smaller programs: BASIC, Visual
`Basic, Pascal, Python.
`
`NIN_ANC_0026375
`
`NIN_ANC_0026375
`
`
`
`Case 6:21-cv-00735-ADA Document 32-10 Filed 01/27/22 Page 9 of 9
`-cv-00735-ADA Document 32-10 Filed 01/27/22 P.
`
`a
`
`409
`
`~
`
`recursion
`
`properly before powerto the computeris turned off; otherwise, data will
`be lost. See BOOT; CTRL-ALT-DEI; SAFE MODE.
`record a collection of related data items. For example, a company may
`store information about each employee in a single record. Each record
`consists of several fields—a field for the name,a field for a Social Secu-
`rity number, and so on.
`The Pascal keyword record correspondsto struct in C. See STRUCT.
`In object-oriented languages,
`the same concept is uscd in a more
`general fashion: an OBJECT can include methods as well as data items.
`recovering erasedfiles retrieval of deleted [iles whose space has not yet
`been overwritten by other data.
`In Windows and on the Macintosh, deleted files usually go into a
`TRASH can Of RECYCLE BIN from which they can be retrieved. The disk
`spaceis not actually freed until the user empties the trash. Until then,the
`files can be restored to their original locations.
`Evenafter the trash can or recycle bin has been emptied, the physical
`disk spacethatthe file occupied is marked as free, butit is not actually
`overwritten until the space is needed for something else. If you crase a
`file accidentally, you can often get it back by using special software. As
`soon as you realize you wantto recovera file, do everything you can to
`stop other programs from writing on the same disk so that nothing else
`will be written in the space thatthe file occupied.
`
`recursion the calling of a procedure byitself, creating a new copy of the
`procedure.
`To allow recursion, a programming language must allow for local
`variables (thus, recursion is not easy to accomplish in most versions of
`BASIC). Each time the procedure is called, it needs to keep track of
`valucs for the variables that may be different from the values they had
`the last time the procedure was called. Therefore, a recursive procedure
`that calls itself many times can consumea lot of memory.
`Recursionis the natural way to solve problems that contain smaller
`problems of the same kind. Examples include drawing some kinds of
`fractals (see FRACTAL); parsing structures thal can have similar structures
`inside them (see PARSING); sorting (see QUICKSORT); and calculating the
`determinant of 4 matrix by breaking it up into smaller matrices.
`A recursive procedure can be used to calculate the factorial of an
`integer. (See FACTORIAL.) Figure 216 shows aprogramthat does so.
`A simple example of recursion involves finding factorials, defined as
`follows:
`1. The factorial of 0 or 1 is 1.
`2. The factorial of any larger whole numberx is x times the factorial
`ofx—-1.
`This definition is recursive in step 2, becauseto find a factorial, you have
`to find another factorial. It can be translated directly into a recursive
`computer program (Figure 214). Admiltedly, this is not the fastest way
`to do the computation,butit is a classic example.
`
`NIN_ANC_0026376
`
`NIN_ANC_0026376
`
`