You are on page 1of 285

The Facts On File

DICTIONARY
of
COMPUTER SCIENCE
Revised Edition
The Facts On File

DICTIONARY
of
COMPUTER SCIENCE
Revised Edition

Edited by
John Daintith
Edmund Wright
The Facts On File Dictionary of Computer Science
Revised Edition

Copyright © 2001, 2006 by Market House Books Ltd

All rights reserved. No part of this book may be reproduced or utilized in any
form or by any means, electronic or mechanical, including photocopying,
recording, or by any information storage or retrieval systems, without
permission in writing from the publisher. For information contact:

Facts On File, Inc.


An imprint of Infobase Publishing
132 West 31st Street
New York NY 10001

For Library of Congress Cataloging-in-Publication Data,


please contact Facts On File, Inc.
ISBN 0-8160-5999-3

Facts On File books are available at special discounts when purchased in bulk
quantities for businesses, associations, institutions, or sales promotions. Please call
our Special Sales Department in New York at (212) 967-8800 or (800) 322-8755.

You can find Facts On File on the World Wide Web at


http://www.factsonfile.com

Compiled and typeset by Market House Books Ltd, Aylesbury, UK

Printed in the United States of America

MP 10 9 8 7 6 5 4 3 2 1

This book is printed on acid-free paper


PREFACE

This dictionary is one of a series designed for use in schools. It is intended for stu-
dents of computer science, but we hope that it will also be helpful to other science
students and to anyone interested in computers. Facts On File also publishes dictio-
naries in a variety of disciplines, including astronomy, chemistry, biology, earth sci-
ence, physics, mathematics, forensic science, weather and climate, and marine
science.

The first edition of this book was published in 2001. This second edition has been
extensively revised and extended and now contains over 2,450 headwords covering
the terminology of computing. A totally new feature of this edition is the inclusion
of over 500 pronunciations for terms that are not in everyday use. A number of ap-
pendixes have been included covering mathematical symbols and notation, file ex-
tensions, domain names, and numerical conversions. There is also a list of Web sites
and a bibliography. A guide to using the dictionary has also been added to this lat-
est version of the book.

We would like to thank all the people who have cooperated in producing this book.
A list of contributors is given on the acknowledgments page. We are also grateful to
the many people who have given additional help and advice.

v
ACKNOWLEDGMENTS

Editors (previous editions)

Valerie Illingworth M.Phil.


John O. E. Clark B.Sc.

Contributors

John Illingworth B.Sc., M.Sc.


Martin Tolley B.Sc.
Margaret Tuthill B.Sc.

Pronunciations

William Gould B.A.

vi
CONTENTS

Preface v

Acknowledgments vi

Guide to Using the Dictionary viii

Pronunciation Key x

Entries A to Z 1

Appendixes
Symbols and Notation
Arithmetic and algebra 251
Geometry and trigonometry 252
Sets and logic 253
Calculus 254
File Extensions 255
Organizational Top-Level 258
Domain Names
Geographic Top-Level 259
Domain Names
United States Subdomain Names 264
Number Conversions 265

Web Sites 272

Bibliography 273

vii
GUIDE TO USING THE DICTIONARY

The main features of dictionary entries are as follows.

Headwords
The main term being defined is in bold type:

access In general, to obtain or write


data; for example, to access a file or to
access a Web site.

Variants
Sometimes a word has a synonym or alternative spelling. This is placed in brackets after
the headword, and is also in bold type:

flip-flop (bistable) An electronic circuit


that has two stable states, either of which
can be maintained until the circuit is made
to switch, or ‘flip’, to the other state.

Here, ‘bistable’ is another term for ‘flip-flop’. Generally, the entry for the synonym con-
sists of a simple cross-reference:

bistable ... See flip-flop.

Abbreviations
Abbreviations for terms are treated in the same way as variants:

storage area network (SAN) A high-


speed device connected to a network’s
servers, on which their data is stored rather
than on local hard disks.

The entry for the abbreviation consists of a reference:

SAN See storage area network.

Often, the main entry is given at the abbreviation:

DLL (dynamic linked library) A Microsoft


Windows standard for sharing code be-
tween programs.

In these cases, the entry for the full form consists of a reference:

dynamic link library See DLL.

viii
Multiple definitions
Some terms have two or more distinct senses. These are numbered in bold type

cell 1. A LOCATION in memory or a REG-


ISTER... .
2. A box on the screen in a spreadsheet
program or in a spreadsheet-like grid ... .

Cross-references
These are references within an entry to other entries that may give additional useful in-
formation. Cross-references are indicated in two ways. When the word appears in the de-
finition, it is printed in small capitals:

case statement A conditional CONTROL


STRUCTURE that appears in many program-
ming languages and allows a selection to be
made between several choices... .

In this case the cross-reference is to the entry for ‘control structure’.

Alternatively, a cross-reference may be indicated by ‘See’, ‘See also’, or ‘Compare’, usu-


ally at the end of an entry:

scalable font Any font that can be


scaled to produce characters of different
sizes without any loss in quality. See also
outline font.

Hidden entries
Sometimes it is convenient to define one term within the entry for another term:

scripting language A language that al-


lows the user to execute a sequence of op-
erations automatically ... by specifying
them in a text file called a script.

Here, ‘script’ is a hidden entry under ‘scripting language’, and is indicated by italic type.
The individual entries consists of a simple cross-reference:

script See scripting language.

Pronunciations
Where appropriate pronunciations are indicated immediately after the headword, en-
closed in forward slashes:

biometrics /bÿ-ŏ-met-riks/ The study,


measurement, and analysis of human bio-
logical characteristics.

Note that simple words in everyday language are not given pronunciations. Also head-
words that are two-word phrases do not have pronunciations if the component words are
pronounced elsewhere in the dictionary.

ix
Pronunciation Key

A consonant is sometimes doubled to prevent accidental mispronunciation of a syllable


resembling a familiar word; for example, /ass-id/ /acid/,rather than /as-id/ and /ul-tră-
/sonn-iks// /ultrasonics/, rather than /ul-tră-son-iks/. An apostrophe is used: (a) between
two consonants forming a syllable, as in /den-t’l/ /dental/,and (b) between two letters when
the syllable might otherwise be mispronounced through resembling a familiar word, as in
/th’e-ră-pee/ /therapy/ and /tal’k/ /talc/. The symbols used are:

/a/ as in back /bak/, active /ak-tiv/ /nk/ as in rank /rank/, bronchus /bronk-ŭs/
/ă/ as in abduct /ăb-dukt/, gamma /gam-ă/ /o/ as in pot /pot/
/ah/ as in palm /pahm/, father /fah-ther/, /ô/ as in dog /dôg/
/air/ as in care /kair/, aerospace /air-ŏ- /o/ as in buttock /but-ŏk/
spays/ /oh/ as in home /hohm/, post /pohst/
/ar/ as in tar /tar/, starfish /star-fish/, heart /oi/ as in boil /boil/
/hart/ /oo/ as in food /food/, croup /kroop/, fluke
/aw/ as in jaw /jaw/, gall /gawl/, taut /tawt/ /flook/
/ay/ as in mania /may-niă/ ,grey /gray/ /oor/ as in pruritus /proor-ÿ-tis/
/b/ as in bed /bed/ /or/ as in organ /or-găn/, wart /wort/
/ch/ as in chin /chin/ /ow/ as in powder /pow-der/, pouch
/d/ as in day /day/ /powch/
/e/ as in red /red/ /p/ as in pill /pil/
/ĕ/ as in bowel /bow-ĕl/ /r/ as in rib /rib/
/ee/ as in see /see/, haem /heem/, caffeine /s/ as in skin /skin/, cell /sel/
//kaf-een/,/ baby /bay-bee/ /sh/ as in shock /shok/, action /ak-shŏn/
/eer/ as in fear /feer/, serum /seer-ŭm/ /t/ as in tone /tohn/
/er/ as in dermal /der-măl/, labour /lay-ber/ /th/ as in thin /thin/, stealth /stelth/
/ew/ as in dew /dew/, nucleus /new-klee-ŭs/ /th/ as in then /then/, bathe /bayth/
/ewr/ as in epidural /ep-i-dewr-ăl/ /u/ as in pulp /pulp/, blood /blud/
/f/ as in fat /fat/, phobia /foh-biă/, rough /ŭ/ as in typhus /tÿ-fŭs/
/ruf/ /û/ as in pull /pûl/, hook /hûk/
/g/ as in gag /gag/ /v/ as in vein /vayn/
/h/ as in hip /hip/ /w/ as in wind /wind/
/i/ as in fit /fit/, reduction /ri-duk-shăn/ /y/ as in yeast /yeest/
/j/ as in jaw /jaw/, gene /jeen/, ridge /rij/ /ÿ/ as in bite /bÿt/, high /hÿ/, hyperfine /hÿ-
/k/ as in kidney /kid-nee/, chlorine /klor- per-fÿn/
een/, crisis /krÿ-sis/ /yoo/ as in unit /yoo-nit/, formula /form-
/ks/ as in toxic /toks-ik/ yoo-lă/
/kw/ as in quadrate /kwod-rayt/ /yoor/ as in pure /pyoor/, ureter /yoor-ee-
/l/ as in liver /liv-er/, seal /seel/ ter/
/m/ as in milk /milk/ /ÿr/ as in fire /fÿr/
/n/ as in nit /nit/ /z/ as in zinc /zink/, glucose /gloo-kohz/
/ng/ as in sing /sing/ /zh/ as in vision /vizh-ŏn/

x
A

abend /ă-bend/ The premature stopping combination of keys that can be used to
of a program caused by a program error, carry out a specified function. For exam-
system failure, power failure, etc. The term ple, ctrl+V (pressing the control key and
is a contraction of ‘abnormal end’. See also the letter V) is a method of pasting data in
abort. many applications.

abort To halt a processing activity in a access In general, to obtain or write


computer before some planned conclusion data; for example, to access a file or to ac-
has been reached. The activity is halted, by cess a Web site.
the OPERATING SYSTEM or by human inter-
vention, because a point has been reached Access (Microsoft Access) A DATABASE
beyond which processing cannot continue. MANAGEMENT SYSTEM for RELATIONAL
The process may have tried to obey an un- DATABASES developed by Microsoft. First
defined instruction or may have failed to released in 1992, it has been upgraded sev-
obey some operating condition of the com- eral times and the current version is Access
puter. It is also possible for the processing 2003. Access forms part of some versions
activity to bring itself to a halt when it be- of Microsoft OFFICE.
comes apparent that it cannot reach a suc-
cessful conclusion. A person monitoring access methods See file; database.
the progress of a program may terminate it
because it has gone on too long, or is pro- access privilege The status given to a
ducing meaningless or incorrect output. particular user or group of users on a sin-
gle computer or on a network, specifying
ABS /abz/ See Basic. what data can be viewed and which system
operations are allowable. Payroll informa-
absolute address 1. An ADDRESS that tion or medical records, for example,
identifies a storage location (or a device) would generally be restricted in availabil-
without the use of any intermediate refer- ity.
ence. See also addressing mode.
2. An address permanently assigned by the access provider An organization, usu-
machine designer to a storage location. ally a commercial company, that provides
users with access to the Internet. See ISP.
absolute addressing See direct address-
ing. access time The time taken to retrieve a
particular item of data from a storage loca-
accelerated graphics port See AGP. tion. This is equivalent to the time interval
between an item of data being called from
accelerator board (accelerator card) A the location and being ready to use. The
printed circuit board that replaces or aug- access time depends on the method by
ments the processor to give enhanced per- which the data is accessed and on the type
formance. of storage.
There is RANDOM ACCESS to data in MAIN
accelerator key (shortcut key) A key or STORE, and the data is available for use al-

1
account

most immediately. There is also random 00000101


access to data on magnetic disk BACKING to
STORE, but the access time is considerably 00010001
longer than for main store. The access time In some processors there is only one accu-
for disk storage has two components: the mulator. In others there are a number of
time taken for the read/write head to get to general-purpose registers, any one of
a particular TRACK is called the seek time; which can act as an accumulator.
the delay allowing an item of data in that
track to become available under the ACK /ak/ A message (‘acknowledge’),
read/write head is known as the latency, such as ASCII character 6 transmitted as a
and on average is equal to half the time for control code, sent from a receiving device
a complete revolution of the disk. The time to a sending device to show that a trans-
required to transfer data between disk and mission was successfully received and, if
main store also forms part of the access appropriate, that the receiving device is
time. ready for the next transmission. See also
In the case of MAGNETIC TAPE, data is re- acknowledgment.
trieved by SERIAL ACCESS and it may take
several minutes to reach a particular stor- acknowledgment A means by which a
age location. device receiving transmitted data can indi-
cate to the sending device whether the data
account A method of identifying a par- has been correctly received or not. The
ticular user on a computer or a network, receiving device returns a confirming mes-
usually by a unique name. An account can sage, known as a positive acknowledg-
be used for the allocation of access and fa- ment, for each block of data received
cilities such as E-MAIL. On a commercial correctly. When an error is detected in a
network accounts can be used to keep block of data, the receiver returns a nega-
track of billing information. An account is tive acknowledgment to indicate that this
usually protected by a password, which is block should be retransmitted by the send-
known only to the user and can be changed ing device. See also ACK; NAK.
only by the user or the system administra- A failure on the part of the receiver to
tor. send an acknowledgment of either kind
within a set time, or the failure of the
accounting package A software appli- sender to respond to an acknowledgment
cation used to automate the accounting op- by sending another block in a set time, is
erations of a business. called a TIMEOUT, and normally results in
retransmission of the last block or another
accumulator An electronic device – a acknowledgment.
REGISTER – that acts as a temporary store in
the arithmetic and logic unit (ALU) and in acoustic coupler A device formerly
which the result of an arithmetic or logic used to convert binary data into a form
operation is formed. For example, a num- that could be transmitted along a tele-
ber (held in main store) can be added to the phone line. An ordinary telephone handset
existing contents of the accumulator and was placed in a depression in the acoustic
the total would then appear in the accumu- coupler to make the connection between
lator; the addition is performed by the coupler and telephone system. The result-
ALU. If, say, the number 5 is held in the ac- ing telephone signal was a sequence of low-
cumulator and the number 12 is to be and high-pitched sounds representing the
added, then the contents will change to 17. binary 0s and 1s making up the data. An
The contents of the accumulator are in bi- acoustic coupler could also accept such a
nary form and the number of bits stored is signal from a telephone line, converting it
normally equal to the WORD LENGTH. The into the corresponding data that could
above example would cause the contents of then be fed to a computer. The binary data
an 8-bit accumulator to change from was fed into and out of the acoustic cou-

2
A/D converter

pler by cable. Acoustic couplers have now tor display; TFT display) A high-quality
been superseded by MODEMS. color display using LCD technology. For-
merly used only in laptop and notepad
Acrobat Trademark A collection of pro- computers, active matrix displays are now
grams developed by Adobe Systems, Inc. found in flat panel displays for desktop
for reproduction of printed documents in computers.
their original form and for electronic pub-
lications. The system involves conversion Active Server Pages See ASP.
of a formatted file (from a word processor,
DTP application, etc.) into a portable doc- ActiveX /ak-tă-veks/ Trademark A de-
ument format (PDF) file. This file format velopment by Microsoft of a loosely de-
can be read by the application Acrobat fined collection of technologies based on
Reader, which is freely available. The PDF COM used to enable different software com-
file contains all the formatting and fonts of ponents to interact. The most common
the original document and is particularly example is ActiveX controls, which are
useful for electronic transmission or publi- separately developed components that add
cation of documents in which layout is im- functionality to programs or Web pages.
portant (e.g. official publications, legal Examples range from reusable program
documents, etc.). PDF files can be gener- components, such as calendars, clocks,
ated directly from many applications. They and various types of data entry/display
can also be produced from PostScript files tools, to complex special effects for Web
using the application Acrobat Distiller. pages.
PDF files can also have bookmarks and hy-
perlinks embedded and can be indexed. See Ada /ay-dă/ Trademark A programming
also PostScript. language named after Ada, Lady Lovelace,
the mathematician and sometime assistant
active Operating or being used. For ex- to Charles Babbage. Ada was developed as
ample, the active cell in a spreadsheet is the a result of a competition for a new pro-
one selected at a particular time; the active gramming language organized by the US
window in an application is the one af- Department of Defense in the late 1970s. It
fected by input from the keyboard or cur- was designed to be used in EMBEDDED sys-
sor. tems, i.e. in situations where a computer
forms part of a specialized system such as a
Active Directory Trademark A method cruise missile or a manufacturing plant.
of organizing a Windows network. Every Ada is a large high-level language embody-
object on the network – users, groups of ing concepts developed in earlier languages
users, printers, disk DIRECTORIES, network such as PASCAL, but carrying them much
services (e.g. e-mail) – can be arranged in a further. There is now an international stan-
logical structure that controls which ob- dard for Ada.
jects can interact with which other objects
and in what way: for example which users adapter A printed circuit board inserted
can access the contents of a given disk into a computer in order to enable it to in-
directory, which users can manage which terface with a peripheral device, such as a
other users, etc. This logical structure modem or sound card.
need not match the physical structure of
the network. If the sales department of Adaptive Server Enterprise See SQL
a large company is spread across mul- Server.
tiple sites and so multiple LANs, Active Di-
rectory can be configured to make it ap- ADC See A/D converter.
pear as a single unit to the rest of the
network. A/D converter (analog to digital con-
verter; ADC) A device for sampling an
active matrix display (thin film transis- ANALOG SIGNAL and converting it into an

3
adder

equivalent DIGITAL SIGNAL, i.e. for convert- address 1. A number used to specify a
ing a continuously varying signal, such as a LOCATION within computer memory, usu-
voltage, into a series of binary values that ally to allow storage or retrieval of an item
are suitable for use by a computer. See also of information at this location. The words
D/A converter. ‘address’ and ‘location’ are actually used as
synonyms, as in ordinary speech. In back-
ing store an address identifies a specific
SECTOR on a magnetic disk or a specific
A 0110 BLOCK on a magnetic tape. In main store an
B 0100 address identifies a particular location
holding a WORD or a BYTE. When a location
S 1010
is specified it is said to be addressed. In
C 0100
some computers, processor REGISTERS
and/or INPUT/OUTPUT DEVICES can also be
Binary addition addressed.
The reference to an address appears in a
adder An electronic device – a LOGIC CIR- MACHINE INSTRUCTION. An instruction is
CUIT – that adds together two numbers. It normally made up of a combination of an
can also subtract two numbers using two’s OPERATION CODE and some way of specify-
complement arithmetic (see complement). ing the OPERAND (or operands) upon which
The numbers are represented as binary sig- the operation is to be performed. This is
nals that are fed into the device (see digital commonly done by specifying the MACHINE
signal). The binary output represents the ADDRESS of the operand. The process is
sum of the numbers. known as DIRECT ADDRESSING.
When two binary (or decimal) numbers Direct addressing is one of a variety of
are added, each step of the addition gener- processes by which the storage location to
ates a sum digit, which forms part of the be accessed is determined from the ma-
answer, and a carry digit, which is passed chine instruction. Alternative ADDRESSING
to the next step. In the table, S is the sum MODES are used in cases where the machine
and C the carry resulting from the addition address is too large to be comfortably in-
of two binary numbers A and B, equal to cluded in a machine instruction, or where it
0110 (i.e. 6) and 0100 (i.e. 4). This is a type is not necessary or not possible to assign an
of TRUTH TABLE. explicit address.
Within the adder, addition is performed 2. The means used to specify the location
electronically on corresponding pairs of of a participant in a computer NETWORK; in
bits (the two least significant bits, the two particular, the sequence of characters used
next least significant bits, etc.). The cir- to specify the destination of an e-mail.
cuitry involved in this must be able not
only to add a particular pair of bits to pro- address bus See bus.
duce a sum bit but also to add the carry bit
from the previous step in the addition. The addressing mode Any of various meth-
sum bits together form the final answer ods by which an ADDRESS can be specified
that is output from the device. The final in the address part of a MACHINE INSTRUC-
carry bit is discarded or is used to detect TION. The methods include DIRECT AD-
OVERFLOW. DRESSING, IMMEDIATE ADDRESSING, INDIRECT
ADDRESSING, INDEXED ADDRESSING, and REL-
add-in card See expansion card. ATIVE ADDRESSING, all of which are used in
computer systems. Whatever method is
add-on 1. A device that is external to a used, the computer’s hardware applies ap-
computer and plugged into it in order to in- propriate rules to derive an ABSOLUTE AD-
crease its capabilities. DRESS. See table overleaf.
2. A small program that enhances a larger
one. address part A part of a MACHINE IN-

4
Advanced Research Project Agency Network

ADDRESSING MODES

Instruction Source of value


move 1,1 the contents of location 1
move immediate 1,1 the value 1, given in the instruction
move indirect 1,1 the value found at the address stored at location 1
move indexed 1,1 (2) the value found at the address formed by adding 1 to
contents of register 2
move 1, TABLE + 3 the value found at the address formed by adding 3 to
the value of the symbol ‘TABLE’

STRUCTION that usually contains only an therefore important that their passwords
ADDRESS, or information on where to find are known only to authorized people.
or how to construct an address. There may
be more than one address part in an in- Adobe Type Manager /ă-doh-bee/
struction. In a JUMP INSTRUCTION one of the (ATM) Software produced by Adobe
addresses may specify the location of the Systems, Inc. used to control PostScript
next instruction to be executed. FONTS.

address register A REGISTER (i.e. a tem- ADSL (asymmetric digital subscriber


porary location) in which an ADDRESS is line) A standard for high-speed digital in-
stored. See also instruction address regis- formation transfer, including video,
ter; memory address register. through ordinary copper telephone lines
using a variant of DSL. It transfers data
address resolution The specification of much faster in one direction than in the
a computer’s address in a form that enables other and can share a wire with a tele-
phone; this makes it suitable for Internet
it to communicate effectively with the In-
users, who typically download much more
ternet.
data than they upload. Maximum speeds
are 8Mbps downloading and 800 Kbps up-
address resolution protocol (ARP) A
loading. The actual speed declines with the
standard used to specify the address of a
length of the wires and operational speeds
computer or other item of hardware on a
are slower: 1Mbps downloading and
local area network (LAN) that is connected 256Kbs uploading. ADSL was developed
to the Internet. to compete with cable companies using
fiber-optic transmission lines. Compare
address space See machine address. SCSL. See also VDSL.
administrator (superuser; supervisor) ADSL transceiver A peripheral device
The controlling ACCOUNT on a computer or that translates computer BINARY DATA into
network. People who log on to this account the format required for ADSL transmis-
have few, if any, restrictions on their ac- sion, and vice versa. Because of the similar-
tions: they can access all data, issue any ity of its functions to those of a MODEM, it
command supported by the operating sys- is often incorrectly called an ADSL
tem or application programs, and create, modem.
manage, and delete other accounts. Such
accounts are necessary for effective system Advanced Research Project Agency
management, but are security risks. It is Network See ARPANET.

5
Advanced Technology Attachment

Advanced Technology Attachment algorithm /al-gŏ-rith-’m/ A set of simple


See ATA. and clearly defined instructions or steps
that when followed precisely enables some
adware 1. A piece of software that dis- operation to be performed. No personal
plays unwanted advertisements. It is usu- judgments have to be made. The operation
ally concealed in Web pages or software could involve, say, baking a cake, con-
downloaded from the Internet. See also structing a cupboard, building a house,
spyware; malware. producing business accounts, and so on. It
2. Applications that display advertise- may involve a mathematical calculation –
ments. The revenue from these allows the e.g. addition, multiplication, taking a
program to be cheap or even free of charge square root – or a selection process. Algo-
to the user. rithms can be devised for a great variety of
operations, ranging widely in complexity.
agent A program that runs in the back- As the complexity increases, the number of
ground but informs the user when specified steps to be taken increases. The same oper-
conditions are met. A common type of ation can often be performed by different
agent searches through databases for infor- algorithms.
mation on a particular user-defined topic. Algorithms are used for the solution of
Such programs are useful for searching the problems. Since they involve no personal
Internet, usually across one type of infor- judgment, they are suitable subjects for
mation resource only. They can be set to computers to handle. When a computer is
perform searches at regular intervals, re- to perform some specific task, an appropri-
porting back with any information, or its ate algorithm is selected or is specially writ-
location, when found. ten. It is expressed in a formal notation – a
PROGRAMMING LANGUAGE – and as such
AGP (accelerated graphics port) A spec- forms a major part of a computer PRO-
ification for a high-performance BUS run- GRAM. Much that is said about programs
ning directly between a graphics controller applies to algorithms, and vice versa.
and a computer’s memory. With AGP,
video data does not have to be transferred algorithmic language /al-gŏ-rith-mik/
through the primary (PCI) bus and the con- A programming language, for example
sequent increase in speed gives smoother C++ or Basic, that uses algorithms for pro-
and faster image transfer and display. cessing.

AI See artificial intelligence. alias A name for a person or group using


e-mail that is simpler or easier to remember
alert box A panel displayed on-screen to than the full name.
give a user a warning or important mes-
sage. aliasing The production of visibly jagged
edges on curves or diagonals, caused when
Algol /al-gol/ A high-level PROGRAM- the resolution of a screen or printer is too
MING LANGUAGE whose name is derived low.
from algorithmic language. It was the re-
sult of the deliberations of an international align To space text so that it neatly
committee in the late 1950s, which culmi- touches a reference line, especially the left
nated in the Algol-60 Report in 1960. Al- or right margin. See also justify.
though never widely used and now
defunct, Algol-60 was a turning point in allocation See resource allocation; stor-
language development since it was de- age allocation.
signed to reflect mathematical ALGORITHMS
rather than the architecture of computers. alpha /al-fă/ Describing the initial ver-
It strongly influenced many succeeding lan- sion of a new piece of software, tested by a
guages, such as PASCAL, C, and ADA. small number of users. See beta.

6
AND operation

alphanumeric character Any of the 26 representation that is required by a DIGITAL


letters of the alphabet, capital or lower case COMPUTER. Their major application is in
(i.e. A–Z, a–z), or any of the digits 0–9. An SIMULATION, i.e. in imitating the behavior
alphanumeric character set is a CHARACTER of some existing or intended system, or
SET that contains the alphanumeric char- some aspect of that behavior, for purposes
acters and may in addition include some of design, research, etc. Another important
SPECIAL CHARACTERS and the SPACE CHARAC- application is PROCESS CONTROL in industry
TER. or manufacturing, where data has to be
continuously monitored.
AltaVista /al-tă-viss-tă/ A highly popu- An analog computer can be used in con-
lar Internet SEARCH ENGINE. junction with a digital computer, forming
what is known as a hybrid computer. A
alt key /awlt/ A key found on some key- hybrid computer, which can process both
boards that is similar to the control key analog and discrete data, often has advan-
and is used in conjunction with other keys. tages over an analog computer in, say,
In Windows, for example, pressing the alt process control.
key and the tab key cycles the focus
through the active applications. An alt key analog signal A continuously varying
is a standard feature on PC keyboards. value of voltage or current. Compare digi-
tal signal.
ALU See arithmetic and logic unit.
analog to digital converter See A/D
AMD Trademark The world’s second- converter.
largest manufacturer of MICROPROCESSORS,
Advanced Micro Devices, Inc., founded in Analytical Engine A calculating ma-
1969. Its chips are compatible with those chine planned by Charles Babbage in 1834,
produced by INTEL. but never constructed. The machine was to
follow his DIFFERENCE ENGINE but to be of
America Online See AOL. more general application and to be pro-
grammed by punched cards. Babbage was
amplitude See signal. supported in this work by Ada Lovelace
(see Ada). A full-scale working version of
analog computer A computer that ac- the machine was constructed at the Lon-
cepts and processes data in the form of a don Science Museum to celebrate Bab-
continuously variable quantity whose mag- bage’s bicentenary in 1992.
nitude is made proportional to the value
of the data. An analog computer solves AND gate A LOGIC GATE whose output
problems by physical analogy, usually elec- is high only when all (two or more) inputs
trical. Each quantity (e.g. temperature, are high; otherwise the output is low. It
speed, displacement) that occurs in the thus performs the AND OPERATION on its in-
problem is represented in the computer by puts and has the same TRUTH TABLE. The
a continuously variable quantity such as truth table for a gate with two inputs (A, B)
voltage. Circuit elements in the computer is shown overleaf, where 0 represents a low
are interconnected in such a way that the signal level and 1 a high level.
voltages fed to them interact in the same
way as the quantities in the real-life prob- AND operation A LOGIC OPERATION
lem interact. The output voltage then rep- combining two statements or formulae, A
resents the numerical solution of the and B, in such a way that the outcome is
problem. true only if A and B are both true; other-
Analog computers are used in situations wise the outcome is false. The TRUTH TABLE
where a continuous representation of data for the AND operation is shown overleaf,
is more appropriate and so both more ac- where the two truth values are represented
curate and much faster than the discrete by 0 (false) a

7
animation

A B output/outcome ANSI /an-see/ The American National


0 0 0 Standards Institute, the organization that
0 1 0 determines US industrial standards, includ-
1 0 0 ing some used in computing, and ensures
1 1 1 that these correspond to those set by the In-
ternational Organization for Standardiza-
tion, ISO.
Truth table for AND gate and AND operation
AOL (America Online) A large commer-
cial Internet service provider.
nd 1 (true). The operation can be written in
several ways, including API (application programming interface)
A AND B A & B A.B A tightly defined set of FUNCTIONS and PRO-
A and B are known as the OPERANDS and CEDURES that an application program or
the symbol between them (AND, &, .) is a the operating system makes available for
LOGIC OPERATOR for the AND operation. utilization by other application programs.
In a computer the AND operation is
used in HIGH-LEVEL LANGUAGES to combine APL A high-level PROGRAMMING LAN-
two logical expressions according to the GUAGE whose name is derived from the
rules stated above. It is used in both high- words a programming language. It was de-
and LOW-LEVEL LANGUAGES to combine two veloped by Kenneth Iverson in the early
BYTES or WORDS, producing a result by per- 1960s for interactive computing, which
forming the AND operation on each corre- was a new concept at the time. Its main fea-
sponding pair of bits in turn. If 8-bit words ture is its unusual SYNTAX, in which single
are used, then for example with operands character operators perform complex
01010001 tasks. Unfortunately the APL CHARACTER
11110000 SET is quite different to other programming
the outcome of the AND operation is languages.
01010000
See also AND gate. Apple Trademark A manufacturer of
microcomputers and other computer-re-
animation The creation of moving pic- lated products founded in 1976 by Steve
tures. The technique is to display a succes- Jobs and Steve Wozniak. It is noted for its
sion of static pictures, each slightly MACINTOSH range of personal computers.
different. Software also exists for automat-
ically producing intermediate images be- applet /ap-let/ A small program usually
tween a starting image and a finishing written in JAVA that can be downloaded
image. Sophisticated computer animation onto a user’s computer along with a Web
is now an established technique in the film page and run by the browser. Applets are
industry. commonly used to add interest to Web
pages, for example, animation.
annotation Explanation added to a pro-
gram to assist the reader, usually in the AppleTalk /ap-’l-tawk/ A set of net-
form of COMMENTS included in the pro- work PROTOCOLS designed by APPLE and in-
gram text. corporated in MACINTOSH computers. It has
now been superseded by TCP/IP but is still
anonymous FTP (anonymous file trans- supported for BACKWARD COMPATIBILITY.
fer protocol) A system that allows a user See also LocalTalk.
to access an FTP site on a network and
download files without having an account application A computer program that
by using the special user ‘anonymous’. This has a specific use; for example, a word-pro-
gives only limited privileges on the site (e.g. cessing program, a graphics program, or a
access only to certain directories). database.

8
arithmetic operator

application package (software package) logic OPERANDS have to be placed in a spe-


A set of programs directed at some appli- cial register called the ACCUMULATOR, while
cation in general, such as COMPUTER in other processors any register may be
GRAPHICS, WORD PROCESSING, CAD (com- used. The result of the operation is subse-
puter-aided design), or statistics. quently transferred back to the main store.
The movement of data between main store
application programming inter- and ALU is under the direction of the CON-
face See API. TROL UNIT. The arithmetic or logic opera-
tions to be performed in the ALU are
applications-orientated language See specified in the operation part of MACHINE
high-level language. INSTRUCTIONS. The control unit interprets
each instruction as it is fetched from main
Archie /ar-chee/ A utility for searching store and directs the ALU as to which op-
for files in FTP sites on the Internet. eration (if any) is required.

architecture The description of a com- arithmetic instruction A machine in-


puter system at a somewhat general level, struction specifying an ARITHMETIC OPERA-
including details of the instruction set and TION and the OPERAND or operands on
user interface, input/output operation and which the arithmetic operation is to be per-
control, the organization of memory and formed. An example, expressed in ASSEM-
the available addressing modes, and the in- BLY LANGUAGE, might be
terconnection of the major units. A partic- ADDI 3 4
ular architecture may be implemented by a
This is an instruction to add 4 to contents
computer manufacturer in the form of sev-
of register 3, placing the result in register 3
eral different machines with different per-
and setting the carry bit if the result is too
formance and cost.
big to fit.
See also logic instruction.
archive See file archive.

argument (actual parameter) A value or arithmetic/logic unit See arithmetic and


logic unit.
address that is passed to a PROCEDURE, SUB-
ROUTINE, or FUNCTION at the time it is
called. For example, in the Basic statement arithmetic operation An operation that
Y = SQR(X) follows the rules of arithmetic, the most
X is the argument of the SQR (square root) commonly occurring examples being addi-
function. See also parameter. tion, subtraction, multiplication, and divi-
sion. In computing, arithmetic operations
arithmetic and logic unit /ă-rith-mĕ-tik/ may be carried out on signed or unsigned
(ALU; arithmetic unit) The part of the INTEGERS or REAL NUMBERS. They are nor-

processing unit of a computer in which mally performed in the ARITHMETIC AND


ARITHMETIC OPERATIONS, LOGIC OPERA- LOGIC UNIT of a computer. See also arith-
TIONS, and related operations are per- metic operator; operand.
formed. The ALU is thus able, for example,
to add or subtract two numbers, negate a arithmetic operator A symbol repre-
number, compare two numbers, or do senting a simple arithmetic operation (e.g.
AND, OR, or NOT operations. The choice addition or multiplication) that is to be
of operations that can be carried out by an performed on numerical data, quantities,
ALU depends on the type (and cost) of the etc. The operators used in a particular pro-
computer. The ALU is wholly electronic. gramming language may differ from those
The operations are performed on items in general use, as shown in the table. The
of data transferred from main store into operations
registers – temporary stores – within the 7 multiplied by 2
ALU. In some processors all arithmetic and 6 divided by 3

9
arithmetic shift

ARITHMETIC OPERATORS

Operators
Operation
In general use In Basic
addition + +
subtraction – –
multiplication × or . *
division ÷ or / /
exponentiation 52 5↑2

would thus be written as 7*2 and 6/3 in array refers to the set of storage LOCATIONS
most high-level languages. Some languages in which the data items are placed, keeping
have separate operators for integer division their original arrangement.
and remaindering (see integer arithmetic). The set of locations forming an array is
Some languages do not have an operator referenced by a single IDENTIFIER, chosen by
for EXPONENTIATION. the programmer. Each element in an array
An example of how arithmetic opera- (i.e. a location or its contents) can be spec-
tors are used, in Basic, is as follows: ified by combining one or more subscript
D = SQR((X(1) – X(0)) ↑ 2 + X(2)*3) values with the identifier. Subscripts are
This is equivalent to usually integers and are generally placed in
D = √((X1 – X0)2 + 3X2) brackets after the identifier. The number of
subscripts required to specify an element
arithmetic shift See shift. gives the dimension of the array.
The simplest array is a single sequence
arithmetic unit See arithmetic and logic of elements. This is a one-dimensional
unit. array, only one subscript being necessary
to select a particular element. For example,
ARP See address resolution protocol. a list of people’s ages could form an array
named AGE; if the subscript of the first el-
ARPANET /ar-pă-net/ (Advanced Re- ement is 1, the age of the eighth person in
search Project Agency Network) A net- the list is found by specifying AGE(8). The
work introduced in 1969 connecting a subscript may be a VARIABLE or an EXPRES-
small number of research institutions, SION. A one-dimensional array is also
funded by the US Department of Defense. known as a vector.
ARPANET used PACKET SWITCHING and pi- In a two-dimensional array (also called
oneered many of the protocols used in net- a matrix), the elements are arranged in the
work operation. It was the forerunner of form of a table with a fixed number of
the INTERNET. rows and a fixed number of columns. Each
element is distinguished by a pair of sub-
array One form in which a collection of scripts; the first subscript gives the row
related data items can be stored in com- number, the second gives the column num-
puter memory. The data items in an array ber. For example, A(3,7) refers to the el-
are arranged in a particular order or pat- ement in row three and column seven of
tern and are all of the same type, for exam- the array A. Again, the subscripts may be
ple all integers or all real numbers. This variables or expressions.
collection of data items is referred to as an The values of a subscript range from a
array. More usually, however, the word lower limit (usually 1 or 0 unless otherwise

10
assembler

specified) to an upper limit. These limits organisms. Computer simulations are used
specify the total number of elements in an to show how self-replicating organisms
array, and are called bounds. The bounds might behave.
of an array can be declared in various
ways, depending on the programming lan- ascending order The arrangement of a
guage. In Basic, for example, a DIMEN- set of data in order starting with the lowest
SION statement is used: character value, as in A to Z or 1 to 50.
DIM X(4,10)
This is a declaration of a two-dimensional ASCII /as-kee/ American National Stan-
array, X, with 5 rows and 11 columns, dard Code for Information Interchange, a
since the default lower bound in Basic is standard code for the interchange of infor-
zero. mation between computer systems, data
communication systems, and associated
arrow keys Four keys on a KEYBOARD equipment. Since it is a standard code
that are labeled with up, down, left, and (rather than one developed by a particular
right arrow symbols. The arrow keys can manufacturer), it allows equipment of dif-
be used for control of the CURSOR on a dis- ferent manufacturers to exchange informa-
play screen. tion. It is thus widely used. ASCII encoding
produces coded characters of 7 bits, and
artificial intelligence (AI) The branch hence provides 27, i.e. 128, distinct bit
of computer science concerned with pro- patterns. These 128 characters make up
grams that carry out tasks requiring intelli- the ASCII CHARACTER SET: they consist of
gence when done by humans. Many of ALPHANUMERIC CHARACTERS, the SPACE
these tasks involve a lot more computation CHARACTER, SPECIAL CHARACTERS, and
than is immediately apparent because CONTROL CHARACTERS. The character set
much of the computation is unconscious in and the control characters are explained
humans, making it hard to simulate. Pro- in the table overleaf. The binary encodings
grams now exist that play chess and other shown in the table are for the character
games at the highest level, take decisions b7b6b5b4b3b2b1
based on available evidence, prove theo- Thus the encoding for G is 1000111 and
rems in certain branches of mathematics, the encoding for g is 1100111. ASCII be-
recognize connected speech using a limited came the de facto standard character set
vocabulary, and use television cameras to for most computers and has been incorpo-
recognize objects. Although these exam- rated in such larger character sets as UNI-
ples sound impressive, the programs have CODE. The coding from values 129 to 256
limited ability, no creativity, and each can is sometimes called extended ASCII. See
only carry out a limited range of tasks. also ISO-7.
There is still a lot more research to be done
before the ultimate goal of artificial intelli- ASP (Active Server Pages) A SCRIPTING
gence is achieved, which is to understand LANGUAGE developed by Microsoft for
intelligence well enough to make comput- SERVER-SIDE SCRIPTING. ASP was first re-
ers more intelligent than people. In fact leased in 1996 and the latest version,
there is considerable controversy about the ASP.NET, is part of the .NET software-de-
whole subject, with many people arguing velopment platform.
that the human thought process is different
in kind to the computational operation of aspect ratio The ratio of width to height
computer processes and so cannot be re- for a rectangular shape, such as an illustra-
produced using computers. See also expert tion or window.
system; robot.
assembler A program that takes as
artificial life A branch of ARTIFICIAL-IN- input a program written in ASSEMBLY LAN-
TELLIGENCE research concerned with inves- GUAGE and translates it into MACHINE CODE.
tigations into the behavior of living Each instruction in assembly language is

11
ASCII CHARACTER SET

b7 0 0 0 0 1 1 1 1
b6 0 0 1 1 0 0 1 1
b5 0 1 0 1 0 1 0 1

b4 b3 b2 b1
0 0 0 0 NUL DLE space 0 @ P ` p
0 0 0 1 SOH DC1 ! 1 A Q a q
0 0 1 0 STX DC2 ″ 2 B R b r
0 0 1 1 ETX DC3 # 3 C S c s
0 1 0 0 EOT DC4 $ 4 D T d t
0 1 0 1 ENQ NAK % 5 E U e u
0 1 1 0 ACK SYN & 6 F V f v
0 1 1 1 BEL ETB ′ 7 G W g w
1 0 0 0 BS CAN ( 8 H X h x
1 0 0 1 HT EM ) 9 I Y i y
1 0 1 0 LF SUB * : J Z j z
1 0 1 1 VT ESC + ; K [ k {
1 1 0 0 FF FS , < L \ l |
1 1 0 1 CR GS – = M ] m }
1 1 1 0 SO RS . > N ^ n ~
1 1 1 1 SI US / ? O — o DEL

ASCII CONTROL CHARACTERS

NUL null character DLE data link escape


SOH start of header DC1 device control 1
STX start of text DC2 device control 2
ETX end of text DC3 device control 3
EOT end of transmission DC4 device control 4
ENQ enquiry NAK negative acknowledge
ACK acknowledge SYN synchronous idle
BEL bell ETB end of transmission block
BS backspace CAN cancel
HT horizontal tabulation EM end of medium
LF line feed SUB substitute
VT vertical tabulation ESC escape
FF form feed FS file separator
CR carriage return GS group separator
SO shift out RS record separator
SI shift in US unit separator
DEL delete

12
asynchronous transmission

usually converted into one machine in- will thus cause a new value to be placed at
struction. The input to the assembler is the appropriate storage location(s). The as-
called the source program; the output is signment statement is fundamental to most
called an OBJECT MODULE. The translation programming languages. It is indicated by
process is known as assembly and the pro- a special symbol, such as = or :=. This is
gram that is translated is said to have been called the assignment operator. The sym-
assembled. The entire program must be as- bol used depends on the language.
sembled before it can be executed. See also The expression on the right of the as-
compiler; interpreter. signment operator is given to the variable
whose name appears on the left. If, say, the
assembly language A type of PRO- value of a variable C is to be increased by
GRAMMING LANGUAGE that is a readable one, this is expressed in Basic, Fortran, C,
and convenient notation (in human terms) and Java as
for representing programs in MACHINE C=C+1
CODE. Assembly language was originally and in Pascal and Algol as
devised to alleviate the tedious and time- C := C + 1;
consuming task of writing programs actu- and is read as C becomes C + 1. In a pro-
ally in machine code. It may be used gram FLOWCHART the symbol → is often
nowadays, in preference to a HIGH-LEVEL used to indicate an assignment, as in
LANGUAGE, for reasons of speed or com- C→C+1
pactness.
Assembly language is the most com- associative store (content-addressable
monly used LOW-LEVEL LANGUAGE. Differ- store) A storage device in which a LOCA-
ent forms are developed for different TION is identified by what is in it rather
computers, usually by the computer manu- than by its position. The location contains
facturers. The features of a particular as- a particular item of data – a search word –
sembly language thus reflect the facilities for which a search can be conducted by the
of the machine on which it is employed. storage device. This can be achieved in var-
Each MACHINE INSTRUCTION has a corre- ious ways. The desired data in the location
sponding assembly language instruction. is in close association or proximity to the
The programmer can use alphabetic OPER- search word. Associative stores are used,
ATION CODES with mnemonic significance for example, as part of a VIRTUAL STORAGE
(e.g. LDA is commonly used for ‘load ac- facility.
cumulator’), and can use symbolic names,
personally chosen, for ADDRESSES of storage asymmetric digital subscriber line /ay-
locations or registers (see symbolic ad- să-met-rik/ See ADSL.
dressing). Addressing modes can also be
expressed in a convenient way. In addition asynchronous /ay-sink-rŏ-nŭs/ Involv-
assembly language allows the use of vari- ing or requiring a form of timing control in
ous number systems (e.g. DECIMAL, OCTAL, which a specific operation is begun on re-
HEXADECIMAL NOTATION) for numerical ceipt of a signal to indicate that the preced-
constants, and allows the programmer to ing operation has been completed.
attach LABELS to lines of the program. Operations do not therefore occur at regu-
A program known as an ASSEMBLER lar or predictable times. Compare synchro-
translates the assembly language program nous.
into machine code. It can then be executed
by the computer. asynchronous transmission A form of
transmission in which data is sent as it be-
assignment statement A program comes available. The time at which the
STATEMENT that assigns a new value to a start of transmission occurs is arbitrary, al-
VARIABLE. Each variable is associated with though the rate at which the bits compris-
a particular LOCATION or group of loca- ing the data are subsequently transmitted is
tions in memory. An assignment statement fixed.

13
ATA

ATA (Advanced Technology Attach- trail may detect attempts at violating the
ment) A standard INTERFACE used to con- security of the system by, say, unautho-
nect disk drives and other storage devices rized reading or writing of data in a file.
to a computer. Although in use from the
mid-1980s the first standard, ATA-1, was availability The actual AVAILABLE TIME
only approved in 1994; the latest version is expressed as a percentage of planned avail-
ATA-7. Early versions of ATA were more able time. Any shortfall will be the result of
widely known as IDE or EIDE. ATA is also faults or breakdowns. In a modern com-
known as Parallel ATA (PATA) to distin- puter system an availability that is not in
guish it from SERIAL ATA, which has super-
the high nineties (say less than 98%) is
seded it in most new machines.
cause for concern.
Atlas See second generation computers.
available time The amount of time in a
ATM See Adobe Type Manager. given period that a computer system can be
used by its normal users. During this pe-
attachment See e-mail. riod the system must be functioning cor-
rectly, have power supplied to it, and not
audit trail A record showing the occur- be undergoing repair or maintenance.
rence of specified events in a computer sys-
tem. For example, an entry might be made AVI (audio video interleave) A Win-
in an audit trail whenever a user logs on or dows standard format for audio and video.
accesses a file. Examination of the audit Files of this type have the avi file extension.

14
B

back end 1. A program that is used to The time taken to retrieve a particular
convert output from a general-purpose item from backing store and transfer it di-
program into a specific form. For example, rectly into main store must be brief. RAN-
a graphics program might produce picture DOM ACCESS to these items is thus necessary
information in a quite general form, which rather than SERIAL ACCESS. MAGNETIC DISKS,
is then processed by a back end specific to CDS, and DVDS provide random access and
the sort of output device required. There are extensively used for on-line backing
would be a different back end for each de- storage. MAGNETIC TAPES are serial-access
vice – plotter, VDU, graphics printer, etc. devices and are used as off-line backing
2. See engine. store. Programs and data can be trans-
ferred from tape to disk for processing, or
background printing The printing of a can be copied from disks to tape.
document at the same time as other
processes are being carried out. backslash The \ character on a key-
board. In MS-DOS and Windows systems
background processing The process- the backslash is used to represent the root
ing of computer programs with a low pri- directory and also to separate directory
ority in a way that does not allow names and filenames in a pathname.
interaction with the user through the key-
board. Programs run in this way are called backup A file, device, or system that can
background programs and are processed at be used as a substitute in the event of a loss
times when programs with a higher prior- of data, development of a fault, etc. A
ity are not using the computer. See also backup file, for example, is a copy of a file
foreground processing. that is taken in case the original is uninten-
tionally altered or destroyed and the data
backing store (backing storage; sec- lost. It is not stored ON-LINE. When a copy
ondary store) Storage devices in which is made it is said to back up the original
programs and data are kept when not re- version. Such a backup is a type of DUMP.
quired by the PROCESSOR (or processors) of
a computer. Programs can only be exe- Backus-Naur form /bak-ŭs nor/ See
cuted, however, when they are in the com- BNF.
puter’s MAIN STORE. A program plus
associated data is therefore copied from backward compatibility (downward
backing store into main store when re- compatibility) Compatibility with earlier
quired. The storage CAPACITY of main store versions or models of the same product. A
is much smaller than the capacity available program is backward compatible if the
as backing store. Only the programs that files and data created by previous versions
are currently being executed are (or need to of the program can be used; an operating
be) in main store. The use of backing store system is backward compatible if existing
means that a computer has access to a large application programs continue to operate
repertoire of programs and to large correctly. A computer is backward com-
amounts of data, and can call on these as patible if it can run the same applications
and when it needs them. and operating systems as the previous

15
bad sector

model. Sometimes, as new technology or other digits give the manufacturer code
techniques are developed, backward com- and identify the product.
patibility cannot be totally maintained,
software and hardware both become obso- barrel printer (drum printer) See line
lete, and the user has to upgrade the sys- printer.
tem. See also upward compatibility.
base (radix) The number of distinct dig-
bad sector A SECTOR on a MAGNETIC its (and possibly letters) used in a particu-
DISK that has become unusable for holding lar NUMBER SYSTEM. DECIMAL NOTATION has
data. This can be for a variety of reasons, base 10, BINARY NOTATION has base 2,
usually some form of hardware fault. The OCTAL NOTATION has base 8; the digits used
management of such sectors is one of the in these three systems are 0–9, 0 and 1, and
functions of a computer’s operating sys- 0–7 respectively. HEXADECIMAL NOTATION
tem, which can find and mark bad sectors has base 16 and uses the digits 0–9 and the
on a disk so that they can be ignored. six letters A–F. The base of a number can
be indicated by means of a subscript as in
bak A file extension commonly used to 10110, i.e. 101 in decimal notation
indicate that the file is a backup. In many 1012, i.e. 101 in binary notation, i.e. 510
applications a backup file is often pro-
duced automatically when files are saved; base address, base address register
it is usually the previous version of the file. See relative address.
band printer See line printer. Basic /bay-sik/ A group of similar high-
level PROGRAMMING LANGUAGES whose
bandwidth /band-witth/ The amount of name is derived from the words beginners
data that can be transmitted in a fixed time
all-purpose symbolic instruction code. The
period. In digital transmissions it is meas-
original Basic was developed in the mid-
ured in bits (or bytes) per second and in
1960s for INTERACTIVE computing, which
analog transmissions as cycles per second,
was a new concept at the time. Many com-
or hertz.
puter manufacturers and software houses
subsequently developed their own dialects,
banner A small advertising region on a
and the emergence of the microcomputer
Web page that contains a link to the adver-
tiser’s own Web site. It generally spans the increased the diversification to the point
width of the page but is not usually more where Basic was often extremely difficult
than an inch tall. to move from one computer to another.
Both ANSI and ISO standards have been
bar code A pattern of parallel lines of defined for Basic.
variable width and spacing that provides Basic is a simple language, is easy to
coded information about the item on learn, and is of particular importance to
which it appears. The codes are read by rel- beginners. It allows easy modification of
atively simple equipment, known as bar- programs since the program text is kept in
code readers, using optical or magnetic main store during execution. Basic is nor-
sensing techniques. Bar-code readers com- mally interpreted although it may also be
monly use a laser beam that scans back- compiled (see interpreter; compiler).
ward and forward, with a photoelectric All dialects of Basic should include the
cell to detect the signal reflected from the following components:
code. Bar codes are found, for example, on REM introduces a COMMENT line;
goods sold in supermarkets, where they are INPUT performs input from the keyboard
used to identify the product and its cost at or a file;
the checkout point and to update stock and READ performs input from a DATA state-
sales records. The first digit indicates the ment elsewhere in the program;
country of origin (0 = USA, 5 = UK), and DATA introduces a line of data values;

16
bcc

PRINT performs output to the screen or a count the estimated time to run the job and
file; its demands on resources such as main
IF introduces an IF THEN ELSE STATEMENT; store or tape drives. If a job is particularly
FOR introduces a LOOP; large it may not be run until the middle of
NEXT terminates a LOOP; the night. Batch processing was formerly
LET introduces an ASSIGNMENT STATEMENT the usual method of working, when com-
– may usually be omitted; puter time was a very expensive commod-
DIM declares ARRAYS; ity and had to be used efficiently. Such
GOSUB calls a SUBROUTINE; considerations no longer apply and mod-
RETURN returns from a SUBROUTINE to the ern computer systems, in particular micro-
statement after the GOSUB; computers, do not rely on the use of batch
STOP interrupts execution of the program; processing. The term has come to be used
END terminates the program; more informally, to describe the BACK-
SQR square root function; GROUND PROCESSING of one or more jobs
INT function truncating real numbers to under the control of a job control language
integers – the fraction is discarded: or batch file, possibly at a set time rather
ABS function returning the absolute value than immediately the job is submitted.
of a number, i.e. without a sign;
SGN function returning –1 for negative baud /bawd/ A unit for measuring the
numbers and 1 for positive numbers. speed at which SIGNALS travel in a com-
Apart from these components there are puter or in a communication system such
many statements and commands that as a telephone link. One baud is normally
occur in some dialects and not in others, assumed to be equal to one BIT per second,
and some that mean entirely different the signal being a sequence of the binary
things in different dialects. See also Q digits 0 and 1. One baud may however be
Basic; Visual Basic. equal to one symbol per second or one digit
per second. In general the baud is equal to
bat The file extension of an MS-DOS the number of times per second that the
BATCH FILE. signaling system changes state. Signaling
speeds generally vary from a few tens of
batch file A text file used to contain a thousands of baud (for, say, data transmis-
list of MS-DOS commands, which may sion by MODEM) up to tens or hundreds of
also need parameters. If this file has the millions of baud (for, say, data transmis-
bat extension then, when the filename and sion by satellite). The unit is named for the
values for the parameters (if necessary) French engineer J. M. E. Baudot (1845–
are typed at the command prompt, the 1903), who first developed the teleprinter.
instructions are processed in order.
AUTOEXEC.BAT on a Windows system is bboard /bee-bord, -bohrd/ See bulletin
an example of a batch file. Windows NT, board.
2000, and XP also support an enhanced
type of batch file that uses the extension BBS Bulletin-board system. See bulletin
cmd. board.

batch processing A method of organiz- bcc (blind carbon copy; blind courtesy
ing work for a computer in which items of copy) A directive in an e-mail program
work are queued up, and the OPERATING specifying where to send additional copies
SYSTEM takes one job at a time from the of the e-mail without the knowledge of the
queue and processes it. Each job must be main recipient. Copies are usually sent to
entirely self-contained – it must not require bcc addressees for information purposes
any intervention from the person who sub- only and the recipients are not necessarily
mitted it. This is because the order in which expected to take any further action. The
the jobs are run is at the discretion of the mail header does not contain bcc ad-
operating system, which will take into ac- dressees (compare cc).

17
BCD
E E
C C

C C

E E

E E
C C

C
C

E E

Formation of a Bezier curve

BCD See binary coded decimal. Bezier curve /bez-ee-ay, bay-zee-/ A type
of curve used in computer graphics. A sim-
benchmark A way in which the perfor- ple Bezier curve is defined by four points.
mance of computer systems – hardware Two of these are the end points of the
and software – can be compared. It is nor- curve. The other two are control points
mally in the form of a specially designed and lie off the curve. A way of producing
test or problem. For example, a system the curve is to first join the four points by
may be subjected to a known workload three straight lines. If the midpoints of
and the time taken to complete it is meas- these three lines are taken, together with
ured; this time can then be compared with the original two end points, a better ap-
the times achieved by other systems. The proximation is to draw four straight lines
systems are said to have been bench- joining these points. The midpoints of
marked. A multi-user system may be
these lines can then be used to get an even
benchmarked by another computer simu-
better approximation, and so on. The
lating the action of tens or hundreds of
Bezier curve is the limit of this recursive
individual users all going through a pre-
process. Bezier curves can be defined math-
determined sequence of actions.
When using a benchmark to evaluate ematically by cubic polynomials. A similar
two or more computer systems, it is impor- type of curve obtained by using control
tant that a prospective purchaser uses a points is known as a B-spline.
benchmark that reflects the sort of use to
which the system will be put. bidirectional printer /bÿ-dă-rek-shŏ-
năl/ See character printer.
beta /bay-tă, bee-/ Describing new soft-
ware or hardware that is in its final stages binary /bÿ-nă-ree, -nair-ee/ Composed
of development, containing most if not all of or relating to two components. In com-
of its intended functionality. It may not be puting the term refers to the base 2 num-
totally reliable but is ready for testing in bering system, in which values are
controlled situations by a few customers or expressed as combinations of the digits 0
individuals to iron out any unidentified and 1. Thus, 2 in decimal is written as 10
problems before general release. in binary. See binary code.

18
binary fractions
decimal digit 0 1 2 3 4 5 6 7 8 9
BCD code 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001

Binary coded decimal

binary code A rule for transforming binary data Any data that uses BINARY
data, program instructions, or other infor- NOTATION. All computer data is stored in
mation into a symbolic form in which only this way. The term is also commonly used
the two binary digits 0 and 1 are used. to denote data that is stored using all the
Once encoded there is no way of distin- bits available: for example, a series of the
guishing an instruction from a piece of numbers 0 to 255 decimal in a system with
data. The process of transforming letters, 8-bit words. It is distinguished from data
digits, and other characters into sequences that uses only the numbers 32 to 126 deci-
of binary digits is called binary encoding, mal, which is generally represented by ap-
and the representation used or produced is propriate ASCII characters.
called a binary encoding. The BINARY NO-
TATION used to represent numbers in a binary digit Either of the two digits 0
computer is a binary encoding. The repre- and 1. See bit.
sentation of characters using, for example,
the ASCII scheme is another example. See binary encoding See binary code.
also code.
binary file A file made up from a se-
binary coded decimal (BCD) A CODE quence of 8-bit data or executable code.
by which each decimal digit, 0, 1, 2, …, 9 Such files differ from text files, which can
is transformed into a particular group of 4 be read by eye, in that they are usually in a
binary digits (or bits). In the standard form form readable only by a program.
of BCD, each decimal digit is represented
by the group of 4 bits whose value is equiv- binary fractions Fractions expressed in
alent to the decimal digit, as shown in the binary notation. Binary fractions are usu-
table. The decimal number 58.271 would ally handled in FLOATING-POINT NOTATION.
thus be coded They can however be representated in
0101 1000.0010 0111 0001 FIXED-POINT NOTATION, e.g. .0101 or
The form of a decimal number in BCD is 11.101, where the positional value de-
usually different from its representation in creases from left to right by powers of 2:
BINARY NOTATION. the leftmost bit after the point has the value

.6875 .3750 .7500 .5000


2 2 2 2
→ → →
1.3750 0.7500 1.5000 1.0000
↓ ↓ ↓ ↓
leftmost bit rightmost bit

Conversion of decimal fraction .6875 to binary equivalent, .1011

19
binary logic

2–1 (i.e. ½ or 0.5), the next bit to the right Conversion from binary to decimal can
having the value 2–2 (i.e. ¼ or 0.25), and so be achieved by multiplying each bit in the
on. The fraction .011 therefore has the number by the relevant power of 2 (the
value least significant (rightmost) bit having a
(0 × 2–1) + (1 × 2–2) + (1 × 2–3) positional value of 20, i.e. 1), and adding
The decimal conversion is thus them together. The above binary number,
.25 + .125 = .375 10100, is thus equivalent to the decimal
Conversion of a decimal fraction to bi- number 20.
nary is shown in the diagram. It is done by Conversion from decimal to binary is
repeated multiplication by 2, the bit result- achieved by repeated division of the deci-
ing before the point being removed to form mal number by 2. The sequence of remain-
the bits of the binary fraction. The process ders forms the bits of the binary number,
is continued until a zero fraction is ob- the first remainder being the least signifi-
tained or the required accuracy is obtained. cant bit, and so on. Division stops when
See also binary notation. the quotient becomes 0. The steps in such a
conversion are shown in the diagram. See
also binary fractions; floating-point nota-
23 ÷ 2 =11 remainder 1 (rightmost bit) tion.
11 ÷ 2 = 5 remainder 1
5 ÷2 = 2 remainder 1 binary number See binary notation.
2 ÷2 = 1 remainder 0
1 ÷2 = 0 remainder 1 (leftmost bit) binary operator (dyadic operator) See
operator.
Conversion of decimal 23 to binary equivalent,
10111 binary representation (bit representa-
tion) The representation used within a
computer for numbers, CHARACTERS, and
binary logic 1. The electronic compo- MACHINE INSTRUCTIONS, and having the
nents used in a computer system to carry form of distinctive sequences of the two
out LOGIC OPERATIONS on binary variables BITS 0 and 1. See also binary code; binary
(i.e. quantities that can take either of two notation; complement; floating-point nota-
values). The components consist of LOGIC tion; character set.
GATES and LOGIC CIRCUITS.
2. The methods and principles under- binary search See searching.
lying this implementation of logic opera-
tions. binary signal See digital signal.

binary notation (binary system) The binary system Any system involving
number system employed in computing to just two possible values, two alternatives,
represent numbers internally. It uses the or two items. One example is the binary
two digits 0 and 1 and thus has a BASE 2. number system, i.e. BINARY NOTATION, in
These digits are known as binary digits (or which numbers are representated by
BITS), and a binary number is composed of means of the two digits 0 and 1. These two
a sequence of bits, e.g. 1001. Like decimal digits are used in computing not only in bi-
notation the binary system is a positional nary notation but to represent the two pos-
notation: the value of a binary number de- sible values, alternatives, etc., of any
pends not only on the bits it contains but binary system or situation, including the
also on their position in the number. The two possible directions of magnetization of
positional value increases from right to left a spot on a magnetic disk or tape or a low
by powers of 2. For example, the binary or high signal fed to a logic gate. See also
number 10100 has the value bit.
1 × 24 + 0 × 23 + 1 × 22 + 0 × 21 +
0 × 20 binary tree See tree.

20
black box

bind 1. To assign values to the PARAME- sentation of numbers, CHARACTERS, and


TERS used in a procedure, subroutine, or MACHINE INSTRUCTIONS. The bit is the
function at the time that the procedure, smallest unit of information and of storage
subroutine, or function is called; this bind- in any BINARY SYSTEM within a computer.
ing remains in force throughout the CALL. The word is a contraction of ‘binary digit’.
2. To associate the VARIABLES used in a pro- See also binary notation.
gram in a HIGH-LEVEL LANGUAGE, or the 2. A measurement of the capacity of a
symbolic addresses or labels used in a pro- number, register, memory location, etc. in
gram in ASSEMBLY LANGUAGE, with particu- terms of the number of binary digits it con-
lar ADDRESSES in computer memory. tains. For example, an 8-bit number has
eight binary digits and so can represent 256
BinHex /bin-heks/ 1. A method for the (28) different numbers (e.g. 0 to 255, –128
encoding of binary data as ASCII text. to 127), whereas a 16-bit number can rep-
2. An Apple Macintosh program to per- resent 65 536 (216) different numbers (e.g.
form such encoding and also the reverse 0 to 65 535, –32 768 to 32 767). See also
decoding on data files. word.

biometrics /bÿ-ŏ-met-riks/ The study, bit density See density.


measurement, and analysis of human bio-
logical characteristics. In computer secu- bitmap /bit-map/ A data structure in
rity, biometric principles are used in memory that represents information as a
high-level techniques to identify people by collection of individual bits. Simple graph-
recognizing one or more specific attributes, ics files are held in this format. The picture
such as fingerprint, voice, or iris patterns. is made up of a set of dots and spaces,
The ideal biometric will unambiguously which are represented by bits in the file. See
prove the identity of a person and ensure also computer graphics.
no one can impersonate him or her.
bitmapped font A font in which each
BIOS /bÿ-os/ (basic input–output system) character is composed of a pattern of dots
A set of low-level instructions stored in and spaces. A set of patterns must be held
read-only memory (ROM) on the main for each size of the font.
motherboard of a computer, providing
basic control over the keyboard, monitor, bit rate The number of BITS transmitted
mouse, disk drives, and other parts of the or transferred per unit of time. The unit of
computer. When the computer is switched time is usually the second; the bit rate is
on these routines perform basic tests on the then the number of BITS PER SECOND (bps).
hardware and load and execute the operat-
ing system. They are transparent to the bit representation See binary represen-
user but nonetheless are critical to perfor- tation.
mance. Many computer systems use Flash
EPROM chips, which can be repro- bits per second (bps) The number of
grammed with an updated BIOS to fix bugs bits of digital data transferred per second.
or to support new hardware. Modern communication devices, such as
modems, are now so fast that rates are
bipolar technology /bÿ-poh-ler/ See in- often described in multiples of bps, for ex-
tegrated circuit. ample Kbps or Mbps.

B-ISDN See ISDN. bit string A string of bits, e.g. 0111.

bistable /bÿ-stay-băl/ See flip-flop. black box A self-contained unit in, for
example, a computer system or a commu-
bit 1. Either of the two digits 0 and 1 nications system, whose function can be
used in computing for the internal repre- understood without any knowledge or ref-

21
blind carbon copy

erence to its electronic components or cir- whole diagram can represent any level of
cuitry. The notion of a black box is useful description, from an electric circuit to an
to someone with little or no electronics over-all computer system.
training who is trying to find out, say, what
a particular peripheral device does. The blocking factor See block.
term is also used of a software module that
can be used by other programs without blog (weblog) An online journal main-
knowledge of its internal workings. tained on and publicly accessible from the
WORLD WIDE WEB. Blogs began to appear in
blind carbon copy See bcc. the mid-1990s and by the early 2000s had
become so numerous as to form a distinct
blind courtesy copy See bcc. community on the web. A blog primarily
reflects the interests and knowledge of its
BlackBerry Trademark A PDA manufac- author; however, some have become re-
tured by Research In Motion Ltd. First re- spected sources of information or influen-
leased in 1999, it became very popular tial sources of opinion. Special software
because of its wireless E-MAIL facilities. helps to create and maintain blogs, for ex-
ample allowing readers to comment on
blink To flash on and off. Various ob- their content, and blogs often use web
jects, such as the cursor and warning mes- feeds to notify users of new content. The
sages, are made to blink on the computer activity of maintaining a blog is called
screen to catch the eye. blogging, and the totality of all blogs on
the Web is called the blogosphere.
block A group of RECORDS that a com-
puter can treat as a single unit during trans-
Bluetooth Trademark A method for
fers of data to or from BACKING STORE. This
electronic devices, including computers
unit of transfer is sometimes called a phys-
and associated hardware, to exchange data
ical record. The data records in the block
over short distances by radio waves. When
are then called logical records. The number
two Bluetooth-enabled devices come
of data records, i.e. logical records, in a
within range (typically 10 meters) they ex-
block is called the blocking factor. Blocks
have either a fixed length or a variable change information to determine whether
length. they are compatible and can exchange
A stream of data recorded on magnetic data; if so they automatically form an ap-
tape is divided into blocks, and is subse- propriate link, known as a piconet. A lap-
quently read block by block (see tape unit). top and a desktop computer, for example,
Successive blocks are separated by in- will form a small network, and a cordless-
terblock gaps (IBGs), in which nothing is phone handset will begin using a base;
recorded. Recording in blocks is used for however, the laptop will not link to the
convenience in handling the tape and for handset because the two devices will deter-
error management: any errors occurring in mine that they are incompatible. All this
the recording and reading of data are dealt happens automatically, with no user action
with block by block. The equivalent required. The Bluetooth specification is
recording subdivision on a magnetic disk is controlled by the Bluetooth Special Interest
a SECTOR. Group, an association of IT, cellular tele-
phone, and other electronics companies es-
block diagram A diagram that repre- tablished in 1998.
sents graphically the interconnection be-
tween elements of a computer system. The bmp The file extension of a type of
elements may range from electric circuits to RASTER GRAPHICSdata file widely used on
major units of hardware. They are shown Windows systems.
as labeled rectangles or other geometric
figures, and are connected by lines. The BNF (Backus-Naur form) A symbolic

22
bootstrap

notation in which the SYNTAX of a pro- It is also used in the design of the electronic
gramming language can be expressed. circuits – LOGIC GATES and logical circuits –
that control the flow of signals. See also
board See circuit board; printed circuit truth table; Boolean expression.
board.
Boolean expression (logical expression)
boldface A typeface used for emphasis, An expression that is formed according to
in which the characters print darker and the laws of BOOLEAN ALGEBRA. It contains
heavier. In this dictionary the headwords variables that take the values true or false
are printed in boldface type. and that are linked by LOGICAL OPERATORS.
An example is
bomb 1. A program residing on a com- a AND (b OR NOT c)
puter unknown to the user; typically, the a, b, and c are variables or expressions
program will have been planted in order to (such as x > 1) that return the values true or
damage or destroy the system. See virus; false; AND, OR, and NOT are operators.
worm. A Boolean expression can be used to form
2. (bomb out) Of a computer or program, a FUNCTION whose value is either true or
to fail abruptly without warning to the user false depending on the combination of val-
and without giving the user a chance to re- ues assigned to the variables. This function
cover or partially recover such items as is known as a Boolean function or logical
data or files. function. A Boolean function can be repre-
sented in a TRUTH TABLE. It can also be
bookmark 1. A marker placed at a spe- transformed into a LOGIC DIAGRAM of logic
cific place in a document that enables the gates.
user to return quickly to that place at a
later date. Boolean function See Boolean expres-
2. A link set up by the user to a Web page sion.
on the Internet. The URL is stored in a
local file and the bookmark can be clicked Boolean search A search that uses
on to retrieve the Web page automatically. Boolean operators. Boolean searches are
commonly used in database searching and
Boolean algebra /boo-lee-ăn/ An exten- in Internet SEARCH ENGINES.
sion of the principles of algebra into the
field of logic. It was first put forward in boot (boot up) See bootstrap.
1847 by the British mathematician George
Boole and is now of particular importance boot disk A floppy disk or CD-ROM
in computing. Boole applied the methods containing all the necessary files for an op-
of algebra to problems in logic involving erating system to start on a computer. The
statements and conclusions that can be boot disk is inserted into the appropriate
given a truth value – either true or false – drive and the computer switched on. The
and thus have a binary nature. These true files are copied into memory and the boot
or false expressions can be combined by up sequence started. A boot disk can be
the logical operations and and or and used to start up the operating system in the
negated by the operation not to give a con- event of failure of the hard drive.
clusion whose truth or falsity can be deter-
mined from the rules of Boolean algebra. bootstrap In general, a means or tech-
Boolean algebra is basic to many as- nique enabling a system to bring itself into
pects of computing. For example it is used some desired state. The word is used in sev-
in high-level languages in conditional state- eral ways in computing. Most commonly,
ments: a bootstrap is a short program whose func-
IF NOT(a<b) AND (x=0) THEN … tion is to load another longer program into
or logical assignments and expressions: a computer. For example, when a com-
answer := (char = ‘Y’) OR (char = ‘y’) puter is first switched on its MAIN STORE

23
bot

will be empty except for those parts fabri- count involved so that the breakpoint only
cated in ROM (read-only memory). A boot- operates after it has been passed a certain
strap stored in ROM is capable of reading number of times. Breakpoints are normally
from backing store (which is NONVOLATILE) used only in DEBUGGING.
the OPERATING SYSTEM, or some part of it,
without which the computer cannot oper- bridge A device that connects two net-
ate. The computer is then said to be booted works into one large logical network so
up or booted, and a program can then be that information can flow between them.
loaded into the machine. The networks may be using different pro-
tocols, and they are joined together at the
bot A program that performs a repeti- data link layer (OSI layer 2).
tive, monitoring, or time-consuming ac-
tion. It is an abbreviation of ‘robot’. broadband /brawd-band/ 1. (wideband)
Describing communications systems sup-
bounce The return of a piece of e-mail porting a wide range of frequencies, on
because of an error in its delivery. which multiple messages can be carried by
the transmitting medium at the same time.
bounds See array. Such systems are ideal for digital transmis-
sions.
bpi Bits per inch. See density. 2. Denoting a method of INTERNET ACCESS
by telephone line that uses these techniques
bps See bits per second; bit rate. to achieve much greater data transfer rates
than are possible with traditional MODEMS.
branch 1. See jump.
The most popular form of broadband is
2. A set of instructions that are executed
ADSL.
between two BRANCH INSTRUCTIONS.
broadcasting See multicasting.
branch instruction A MACHINE IN-
STRUCTION that controls the selection of
one set of instructions from a number of al-
browse To scan files, documents, or
the Internet for items of particular or gen-
ternative sets during the execution of a pro-
gram. A branch instruction is usually eral interest. In browsing, information
regarded as being the same thing as a jump tends to be checked and gathered but not
instruction. See jump. altered.

breadboard A CIRCUIT BOARD on which browser A program that interprets and


experimental arrangements of electronic displays hypertext (HTML) in a readable
components can be built and tried out. The form on the screen. Such programs are es-
arrangements can be easily modified. pecially useful on the WWW and examples
are Internet Explorer and Mozilla Firefox.
break To halt program execution tem- Web browsers can use HYPERLINKS to jump
porarily at a given spot (usually for debug- from document to document, and can
ging purposes), or to interrupt a program often download and transfer files, provide
by pressing the break key (or its equiva- access to newsgroups, and play audio and
lent). video clips. See Internet Explorer; Mozilla;
Firefox.
breakpoint /brayk-point/ A point in a
program at which execution is halted tem- B-spline /bee-splÿn/ See Bezier curve.
porarily. An examination can then be
made of the values of program VARIABLES at bubble-jet printer A type of nonimpact
that point. Breakpoints may sometimes be printer. Ink is surface boiled in fine tubes to
conditional – execution only pauses if cer- form bubbles that are then shot from noz-
tain conditions are true. There may be a zles to form characters on paper. Bubble-

24
bus network

jet is a trademark of Canon Inc. See also amounts of data can be stored, usually
laser printer; ink-jet printer. with relatively slow access times. Examples
are hard disk, CD, DVD, and magnetic
bubble memory An obsolete type of tape.
memory in which data in binary form is
represented by the presence of absence of bullet A character, such as a large dot or
minute magnetized regions (bubbles) small square, used to introduce the start of
within an oppositely magnetized magnetic a paragraph to add emphasis to the text.
material. Magnetic fields are used to form
the bubbles and to move them along a path bulletin board (bboard) A general facil-
through the surface of the stationary mag- ity on a computer NETWORK allowing any
netic medium. Bubble memory is a form of user of the network to leave messages that
SERIAL-ACCESS memory but the data path is can be read by all the other users. This can
constructed so that the ACCESS TIME to a be contrasted with E-MAIL messages, which
particular data item is very short. It is usu- are read only by the addressees.
ally NONVOLATILE and has high storage ca-
pacity. Bubble memory has had only bundled See unbundling.
limited application and has been super-
seded by other faster devices, such as FLASH bundling See unbundling.
MEMORY.

bureau An independent agency provid-


bubble sort See sorting. ing computer or related services to the pub-
lic. It offers both software and hardware
buffer 1. A temporary store for data in facilities. The user usually simply supplies
transfer, normally used to compensate for
the input data for a specified job, such as
the difference in the rates at which two de-
files to be printed or typeset, and pays for
vices can handle data during a transfer. It
the results.
allows the two devices to operate indepen-
dently, without the faster device being de-
burn To write information to a CD or
layed by the slower device. Buffers
DVD.
generally form part of the MAIN STORE of a
computer, holding data that is awaiting
processing or is awaiting transfer to a mag-
burster A device that separates into
netic disk or an output device such as a sheets CONTINUOUS STATIONERY produced
printer or a VDU. A buffer may also be as output from a PRINTER. The paper is split
built into a peripheral device: many print- at the perforations across its width. With
ers have a buffer to compensate for the rel- multipart stationery a burster frequently
atively slow speed of printing compared also acts as a DECOLLATOR, separating the
with the speed with which the information copies and possibly sorting them into
to be printed is received. stacks.
2. Any device, circuit, etc., that is inserted
between two other devices to compensate bus A set of conducting wires – a path-
for differences in operating speeds, in tim- way – connecting several components of a
ing, in voltage levels, etc. computer and allowing the components to
send SIGNALS.
bug An ERROR in a program or a system.
It is usually a localized error occurring bus network A form of local area net-
when a working version of the program or work (LAN) in which all signals are carried
system is being produced, rather than an over a main bus and are available to all
error introduced during design. See also nodes (computers) on the system. In a bus
debugging. network each node monitors line activity
and only accepts messages addressed to
bulk storage A medium on which large itself.

25
button

button 1. An area (e.g. a small box) in a 2. A movable piece on a mouse that, when
GUI FORM that, when clicked on with the pressed, will activate a particular function.
mouse or entered (if it has the focus) by
pressing the enter key, will implement a byte A unit of data or memory consist-
command. ing of 8 bits.

26
C

C A PROGRAMMING LANGUAGE developed main store into the cache; the next instruc-
in the early 1970s by Dennis Ritchie at Bell tions for execution are then likely to be in
Laboratories in the USA for systems devel- the cache as well as the one currently re-
opment, and in particular for writing the quired. This is a very successful strategy
operating system UNIX in order to make it and significantly increases execution
PORTABLE. C has the CONTROL STRUCTURES speeds. The contents of a cache may be
usually found in HIGH-LEVEL LANGUAGES modified by the program, so it will be nec-
but has features that make it suitable for essary to copy them back into main store
writing SYSTEMS SOFTWARE. Its popularity before refilling the cache with another
increased with the spread of the UNIX op- block. See also L1 cache; L2 cache.
erating system, but it is by no means con- The same principle is used to speed
fined to UNIX machines. See also C++. other data transfers. For example, a disk
cache holds copies of recently accessed disk
C++ /see-dub-’l-pluss/ A PROGRAMMING
sectors in RAM and can save many time-
LANGUAGE developed from C in the 1980s. consuming disk reads.
It retains the syntax of C while adding
comprehensive OBJECT-ORIENTED PRO- CAD /kad/ (computer-aided design) The
GRAMMING features as well as other en-
application of computer technology to the
hancements. It has become an important design of a product. CAD is used especially
language for software development.
in architecture and electronic, electrical,
mechanical, and aeronautical engineering.
C# /see-hash/ A programming language
Designs can be created by computer using
based on C++ and JAVA. It was introduced
information fed in by experts and also ac-
by Microsoft as part of the .NET software-
quired from other sources, for example
development platform and became an ISO
specifications of component sizes or build-
standard in 2003.
ing regulations. During the design process
cable television See CATV. the design itself is displayed on a screen
and can be tested and modified by the tech-
cache memory /cash/ (cache) Extremely nical designer. The computer can analyze
fast SEMICONDUCTOR MEMORY that is used various characteristics of the design, the re-
in computer systems in association with sults being fed back to the designer. The
MAIN STORE. Its ACCESS TIME is much shorter final design is normally drawn by a flatbed
than that of main store and it is therefore PLOTTER, with design specifications, etc.,
used to increase the accessibility to data re- listed on the printout.
quired by the processor. It is a temporary The CAD output, the design of, say, a
store, i.e. a BUFFER, that is continually up- PRINTED CIRCUIT BOARD, may then be
dated so that it contains the most recently passed to other systems for computer-
accessed contents of main store. aided manufacture (CAM) and computer-
When the processor requires an instruc- aided testing (CAT). The combined process
tion not currently in the cache, then a of computer-aided design and manufacture
whole block of memory (the size depends is known as CADCAM. The whole pro-
on the particular system) is copied from cedure – computer-aided design, manufac-

27
CADCAM

ture, and testing – is often referred to as calling sequence includes some means of
CADMAT. passing the necessary data to the program
or program section (see parameter), and of
CADCAM /kad-kam/ See CAD. returning control to the calling program
following execution of the program or pro-
CADMAT /kad-mat/ See CAD. gram section. When a whole program is to
be called this is done by the OPERATING SYS-
CAE (computer-aided engineering) The TEM.
use of computers in engineering design,
testing, and research. callback A network security feature
used to verify users. The user’s name and
CAI (computer-aided (or assisted) instruc- password are checked and then the net-
tion) See CAL. work disconnects and returns the call to a
predefined authorized number.
CAL (computer-assisted learning) Any
use of computers to aid or support educa- calling program See call.
tion and training. CAL can test attainment
at any point, provide faster or slower calling sequence See call.
routes through the material for people of
different aptitudes, and can maintain a capacity (storage capacity) The amount
progress record for the instructor. of information that can be held in a storage
This application is also known as CBL device. It is usually measured in BYTES or in
(computer-based learning), CAI (com- BITS. For example, the capacity of a CD is
puter-aided (or assisted) instruction), and 700 megabytes, while the capacity of a
CMI (computer-managed instruction). hard drive is several tens of gigabytes.

calculator An electronic device that can caps lock A keyboard toggle key that
perform simple arithmetic, and often other when on makes all alphabetic characters
operations, on numbers entered from a typed appear as capitals (upper case).
keyboard. Final solutions and intermediate When off all alphabetic characters are
numbers are generally presented on LCD or lower case. Other characters are unaffected
LED DISPLAYS. Present-day calculators range by the caps-lock key.
from very cheap devices that can add, sub-
tract, multiply, and divide numbers to capture To transfer received data into a
those that can perform complex mathe- file.
matical and statistical operations and may
be programmed. Add-on memory modules carbon copy See cc.
containing specialist programs – for navi-
gation, say – can be used with the more ex- card A PRINTED CIRCUIT BOARD, often of
pensive calculators, as can small printers. a fairly small size.

call An action whereby a program or a card reader A device that reads data
section of a program – a PROCEDURE, SUB- encoded on cards and converts it into bi-
ROUTINE, or FUNCTION – is brought into ef- nary code for processing by a computer.
fect. Control is transferred to the ENTRY The data is represented by magnetic pat-
POINT of this program or program section, terns in, say, a MAGNETIC STRIPE on a plas-
causing the program or program section to tic card.
be immediately executed by the computer.
The program or program section is said to caret /ka-rĕt/ The symbol ˆ on the key-
have been called. The program that issued board obtained by pressing the shift+6
the call is the calling program. keys. This symbol is used to represent ex-
A piece of code, known as the calling se- ponentiation in some programming lan-
quence, is required to perform a call. The guages, as in 3ˆ4 meaning 34, or to

28
CBL

represent the control key in some computer case expression of


documentation, as in ˆS meaning ctrl-S. selector 1: choice 1
selector 2: choice 2
carriage return (CR) The ASCII control selector 3: choice 3
character, with the decimal value 13, that …end
is used to affect the format of printed or If the expression evaluates to one of the se-
displayed output by aligning the print head lector values, then that choice is executed.
or pointer at the beginning of the current Standard Pascal does not define what hap-
line. pens if the expression matches no selector,
but nonstandard extensions and other lan-
cartridge A removable module contain- guages offer a special selector to handle
ing a magnetic disk, magnetic tape, inte- this eventuality.
grated circuitry, printer ink, or some other The case statement is a more general
computer-related device. It is usually de- structure than the IF THEN ELSE STATEMENT,
signed so that the contents remain perma- which allows a choice between only two al-
nently inside the cartridge (or attached ternatives. It can in fact be written in the
to it) and are not handled by the opera- form of a NESTED if:
tor. The modular form thus protects and if … then …
facilitates the use of the contents. See also else if … then …
tape cartridge; disk cartridge; ROM car- else if … then … (and so on)
tridge. A case statement could be used in selecting,
say, a month in the year or one age group
cascading style sheets (CSS) A specifi- out of six age groups. It is often employed
cation used with HTML and XML docu- in programming MENUS. A similar control
ments. HTML and XML documents can structure appears in some other languages
have style sheets that define, amongst other as a SWITCH STATEMENT.
things, information on font style, weight,
and size. The style sheet may be a separate cassette /ka-set, kă-/ A container hold-
file or may be embedded in the document. ing MAGNETIC TAPE and from which the
tape is not normally removed. The casing
case The status of an alphabetic charac- protects the tape and makes it easier to
ter, denoting whether it is capitalized handle. The tape is wound between two
(upper case) or not (lower case). small reels. See also tape cartridge.

case-insensitive See case-sensitive. CAT /see-ay-tee, kat/ (computer-aided


testing) A method used by engineers to
case-sensitive Depending on the case of assess and test designs, especially those
a character. A case-sensitive action will dif- produced by CAD systems. CAT is also used
ferentiate between upper- and lower-case to automate software regression testing.
letters, so that the word ‘Mat’ is totally dif-
ferent from ‘mat’ or ‘MAT’ and so on. A cathode-ray tube (CRT) See display.
case-insensitive action will treat such
upper- and lower-case forms as equivalent. CATV (community access television)
Passwords, for example, may be case-sensi- More commonly known as cable televi-
tive in some systems and case-insensitive in sion, the use of a broadband signal sent
others. over fiber-optic or coaxial cables to dis-
tribute multichannel television program
case statement A conditional CONTROL broadcasting. It is also an increasingly pop-
STRUCTURE that appears in many program- ular way to access the WWW and other
ming languages and allows a selection to be forms of multimedia information and en-
made between several choices; the choice is tertainment services.
dependent on the value of some expres-
sion. For example, Pascal has CBL (computer-based learning) See CAL.

29
cc

cc (carbon copy; courtesy copy) The di- power laser. The depressions (known as
rective in an e-mail program specifying ‘pits’) have a lower reflectivity than the flat
where to send additional copies of the text. areas (known as ‘lands’). The pattern of
Copies are usually sent to cc addressees for pits and lands correspond to 0 and 1 values
information purposes only and the recipi- of bits. CDs of this type are produced on a
ents are not expected to take any further blank disk using a high-powered laser op-
action. The mail header contains a list of erating in short bursts to ‘burn’ the pits.
all cc addressees. Copies can be produced by taking impres-
sions from a master. Such CDs are also
CCD See charge-coupled device. used as a method of distributing data for
use on computers (e.g. software). In addi-
CD (compact disk) A metal (aluminum) tion the disks can be used as extra storage
disk 120 mm in diameter on which digital available to the processor. This is known as
data is recorded by mechanical means (as CD-ROM (compact disk read-only mem-
opposed to magnetic recording). The stan- ory). CD readers on personal computers
dard type of CD is the well-known audio are generally designated as 36-speed, 52-
disk used for sound recording. The disk has speed, etc., referring to the access time in
a spiral track containing a pattern of comparison to that of a standard audio
minute depressions. It is read by a low- compact disk. CD-ROM is widely used for

label acrylic stamped aluminium

1.2 mm
polycarbonate plastic

stamped CD

additional
scratch resistant protective silver, silver
polymer with lacquer alloy, or gold
label on top coating dye (recording layer)

1.2 mm
polycarbonate plastic

CD-R

additional thin metal


scratch resistant protective reflective
polymer with lacquer layer dielectric layers
label on top coating phase change alloy
(recording layer)

1.2 mm
polycarbonate plastic
polycarbonate plastic

CD-RW

CD types

30
central processor

computer games and multimedia publica- CD-I (compact disk interactive) A stan-
tions. It is also one of the safest methods of dard for combining audio, video, and text
storing electronic information. Because the on a compact disk using optical-disk tech-
data is encoded as depressions in a metal nology. A CD-I player needs no external
surface it is less susceptible to external in- computer. It plugs directly into a TV and
fluences than data stored magnetically and stereo system and comes with a remote
is less likely to change with time. The data control to allow the user to interact with
on a standard CD is regarded as permanent software programs sold on disk, thus pro-
and cannot be changed or overwritten. A viding a games-playing capability. Many
CD can store about 700 megabytes of data. features are included such as music, special
Producing an original standard CD re- audio effects, graphics, text, animation,
quires specialized equipment using a high- and video.
power laser and is usually done by
commercial companies. Different forms of CD-R See CD.
compact disk have been introduced that
can be produced using low-power lasers CD-ROM See CD.
and relatively cheap equipment. CD-R
(compact disk recordable) is a form of CD CD-RW See CD.
in which the metal disk has a thin gold
layer covered with a photosensitive dye Celeron /sel-ĕ-ron/ See Pentium.
coating and a protective lacquer layer. The
CD writer (which usually doubles as a CD cell 1. A LOCATION in memory or a REG-
reader) contains a laser that acts in short ISTER. It is usually capable of holding a sin-
bursts to change the dye layer, reducing the gle item of information in binary form such
reflectivity of the underlying gold. These
as an integer or instruction, but may hold
regions correspond to the pits in a standard
only a single bit.
CD; the unchanged regions correspond to
2. A box on the screen in a spreadsheet
the lands. Once the data has been recorded
program or in a spreadsheet-like grid when
it cannot be changed; i.e. CD-R is an ex-
used in any other type of program, which
ample of a WORM device (write once,
contains a number, a formula, or a string
read many times). It is, however, possible
of text.
to add extra data to a CD-R later. This is
known as multisession recording. CD-R is
a cheap and reliable method of archiving cell address 1. The reference number of
data. a particular memory location that stores
CD-RW (compact disk rewritable) is a one byte of information.
further development in which the data on a 2. (cell reference) The row and column
CD can be erased and overwritten (i.e. the identifiers used to specify a cell in a spread-
CD is reusable in a similar way to a mag- sheet or in a spreadsheet-like grid.
netic disk). This type of CD has a reflective
layer consisting of a silver-based alloy. The center To align text around a horizontal
laser writing the data causes localized heat- midpoint on a line or vertical midpoint on
ing of small areas, which changes the struc- a page or other defined area in text for-
ture from a crystalline to an amorphous matting.
form. These amorphous regions have
lower reflectivity and correspond to the central processor (central processing
pits in a standard CD. The data can be unit; CPU) The principal operating part
erased by heating to a higher temperature of a computer. It consists of the ARITH-
to restore the crystalline form. This type of METIC AND LOGIC UNIT and the CONTROL
CD was formerly called CD-E (compact UNIT, i.e. the units in which program in-
disk erasable). structions are interpreted and executed.
Sometimes MAIN STORE is considered a
CD-E (compact disk erasable) See CD. component of the central processor.

31
Centronics interface

Over the years, the functions in the sequence. The entries can then be dispersed
larger or more complex computers have randomly within a storage device. One
become distributed among various units, particular entry may belong to more than
each able to handle one or more tasks quite one sequence.
independently. In these systems the term 2. A technique whereby the final action of
central processor (or central processing a program is to load its successor into main
unit) is inappropriate, and the word store. For example, a suite of demonstra-
PROCESSOR (or processing unit) is used. tion programs could be chained together
with the last one chaining to the first, thus
Centronics interface /sen-tron-iks/ An providing a continuous demonstration.
old but still widely used interface standard
designed for parallel data exchange be- chain printer See line printer.
tween computers and peripherals. Origi-
nated by Centronics Corporation for dot channel 1. A route along which infor-
matrix printers, it provides for the ability mation can be sent. It may for instance be
to send 8 bits of data (usually one charac- a telephone link between two computers or
ter) simultaneously together with control a cable connecting a terminal to a com-
and status information. puter. It may also be the route followed by
data between a user’s program and a file on
CGA (color graphics adapter) One of backing store. 2. See web feed.
the early graphics adapters introduced by
IBM in 1981 and capable of several char- character A symbol used in representing
acter and graphics modes. The quality was data and in organizing and possibly con-
quite poor with a resolution of, for exam- trolling data. A character may be one of the
ple, 320 × 200 pixels with four colors or 26 letters of the Roman alphabet, a letter
640 × 200 pixels with two colors. See also combined with a diacritical mark, one of
EGA; VGA. the digits 0–9, a punctuation mark,
bracket, plus sign, etc. Note that A and a
CGI 1. (common gateway interface) A are different characters, and that a com-
set of rules defining how a Web server puter distinguishes between the capital let-
communicates with a Web client. CGI pro- ter O and zero, 0, and between the lower
grams are usually small and perform tasks case letter l and one, 1. Modern computers
such as counting the number of hits for a are increasingly able to handle the large
Web page, accepting and filtering data number of symbols needed to represent all
from a form, or reading an image map. All the world’s writing systems. See also char-
the processing takes place on the Web acter set; byte.
server, not on the computer doing the
browsing. CGI scripts are often written in character encoding 1. The process of
Perl. transforming letters, digits, and other char-
2. See computer graphics interface. acters into an encoded form. See code.
2. The symbolic representation used for the
chad /chad/ The piece of paper, plastic, characters in a given CHARACTER SET when
etc., that is removed when a hole is encoding them. The symbols are usually
punched in a data medium. For example, the two binary digits 0 and 1. ASCII and UNI-
the punching of sprocket holes along the CODE are two widely used character encod-
edges of continuous stationery produces ing schemes.
chads.
character generator A ROM-based cir-
chaining 1. An arrangement whereby cuit or a program that converts codes for
one item in a sequence contains the means display on a screen. A valid ASCII code is
for locating the next item. For example, a converted into a set of numbers that will
FILE may be organized such that each entry cause a VDU to illuminate the correct pat-
contains the ADDRESS of the next entry in a tern of dots to display the character. This is

32
check
, ; : . ? !
much faster than the process of drawing
the character by a series of graphics com- ( ) [ ] { }
mands, and formerly made text-based ⬙ ⬘ # % & | \
VDUs the preferred systems for most tasks. + – * / > < =
However, the number of characters that
could be generated was very limited. Such
Typical special characters used in a character
speed considerations are not relevant to to- set
day’s faster computers, whose GUI operat-
ing systems use graphics commands to
generate a wide range of characters in a va- special characters are known as graphic or
riety of typefaces, styles, sizes, etc. Never- printable characters, i.e. they are symbols
theless, all computers still have a character that can be produced by printing, writing,
generator so they can communicate with a etc. In contrast the control characters each
user when the GUI is not loaded or is not produce a particular effect, such as a new
working properly. line or backspace.
Within a computer all these characters
character printer A PRINTER that pro- must be represented in binary form. There
duces a single character at a time, printing are two widely used encoding schemes for
them in the order in which they appear in a characters; these are ASCII and UNICODE.
line. The printing mechanism – known as The 128 different bit patterns used in
the print head – prints as it moves from left ASCII and the many thousand used in Uni-
to right or right to left along each line. Such code are themselves character sets. See also
printers have now largely been superseded EBCDIC.
by LASER PRINTERS and INK-JET PRINTERS. See
also daisywheel printer; thermal printer. character string See string.

character recognition See OCR; MICR. charge-coupled device (CCD) A de-


See also OMR; document reader. vice made from a connected array of semi-
conductor components in which the charge
character set A collection of different at the output of one component provides
CHARACTERS that can be used for some pur- input to the next and so on. CCDs are sen-
pose. A very simple example is the letters of sitive to light, with both monochrome and
the Roman alphabet. The characters that color arrays being available, and are used
are valid within a given programming lan- extensively in scanners and digital and
guage also form a set. Yet another example video cameras.
is the collection of characters that a com-
puter can handle. This latter set would chat A real-time conversation with an-
have to include the characters of the one or other person or persons through a com-
more programming languages used on the puter network, often the Internet. Once
computer. participants are logged in, text can be
The character set handled by a particu- typed and entered by one user to appear on
lar computer nearly always includes the the screens of other users enabling a text
ALPHANUMERIC CHARACTERS (letters and ‘conversation’ to take place. Chats can be
digits), together with the SPACE CHARACTER, private or open. Such exchanges take place
SPECIAL CHARACTERS, and CONTROL CHAR- in a chat room.
ACTERS. Typical special characters are
shown in the table; they include punctua- check A process for validating the accu-
tion marks, brackets, and the symbols used racy of an item of information, which may
in ARITHMETIC and LOGIC OPERATIONS. be a piece of data or part of a program. It
Modern character sets also include many is thus a means of detecting ERRORS. A
accented letters, symbols from non-Roman check is performed, for example, following
alphabets, Chinese and Japanese ideo- the transfer of the item to or from a mag-
grams, etc. The alphanumeric, space, and netic disk, following its transmission

33
check box

across a computer network, or following particular CPU and its supporting cir-
its computation. cuitry.
A single check digit may be used in per-
forming the check. This digit is added to chip socket A device to allow easy re-
one end of the item of information when it placement of chips (INTEGRATED CIRCUITS)
is encoded, and is derived arithmetically on a PRINTED CIRCUIT BOARD. The chip
from the digits making up the item. It can socket is soldered to the circuit board and
be used subsequently to determine whether the chip is pushed into the socket, which
the item contains an error (or errors). In has a small hole for each of the chip’s legs.
some cases a group of characters may be With larger chips care is needed to avoid
used to perform a check rather than a sin- bending the legs of the chip on insertion.
gle digit. See also parity check; modulo-n
check. CIM 1. (computer-integrated manufac-
turing) The use of computers in manufac-
check box A small, usually square, se- turing. Such topics as advanced control
lection box used for interactive control in techniques including robotics, manufactur-
graphical user interfaces. The check box ing systems design and control, systems
will contain a check or cross if it has been modeling, and analysis and management
selected and clicking on the box will re- accounting are all included.
verse the selection. There may be several 2. (common information model) A frame-
check boxes in a form for the selection of work for describing and sharing manage-
several different features at the same time. ment information that is both system and
application independent.
check digit See check; modulo-n check.
cipher, ciphertext /sÿ-fer/ See cryptog-
checkpoint A point in some processing raphy.
activity, or a place in a program, at which
a DUMP – a copy – is taken of data associ- CIR (current instruction register) See in-
ated with the active program. It is hence struction register.
the point or place from which the program
can subsequently be restarted. The use of circuit board A rigid board of insulat-
checkpoints guards against system failure ing material on which an electric circuit has
during very long program executions: if been or can be built. The term is commonly
anything goes wrong, the execution can be used to refer to a PRINTED CIRCUIT BOARD.
continued from the last checkpoint once Circuit boards come in a variety of sizes,
repairs have been made. The frequency of some of which are standardized.
checkpoints depends on the reliability of
the system. circular shift See shift.

checksum /chek-sum/ See modulo-n CISC /sisk/ (complex instruction set com-
check. puter) A CPU designed with a full set of
assembly calls. Systems based on this phi-
chip 1. A small section of a single crystal losophy can make software simpler and
of semiconductor, usually silicon, that thus smaller, but are generally slower in the
forms the substrate (i.e. base) on which an execution of each instruction.
INTEGRATED CIRCUIT is fabricated.
2. Informal name for integrated circuit. class A fundamental structure in OBJECT-
ORIENTED PROGRAMMING. A class contains
chipset /chip-set/ A group of MICROCHIPS all the methods (i.e. FUNCTIONS and PROCE-
performing one or more related functions DURES) and data necessary to represent
and designed to work as a single unit. some object. A games program, for exam-
Often a chipset will fit on a single chip. The ple, might contain a class called ‘Auto’ that
term commonly refers to a set containing a models the characteristics of an automo-

34
client-server

bile, with such methods as ‘accelerate’, click trail The record of a Web surfer’s
‘brake’, ‘turn’, etc. The accelerate method route through the Web sites visited. Web
might use data items in the class, called browsers generally maintain such a record
PROPERTIES, that define such characteristics as a convenience to the user. However, the
as maximum speed and maximum rate of possibility of this data being analyzed by
acceleration to determine how long it takes third parties has raised privacy concerns,
the automobile to reach a given speed. Be- especially if it is obtained illicitly through
cause multiple instances of the Auto class MALWARE.
can be declared, each automobile can be
given its own characteristics by assigning client 1. A desktop computer or work-
different values to this data. The rest of the station attached to a network and relying
program interacts with a class entirely on one or more SERVERS for resources such
through its public methods and properties; as files, devices, and other services.
the internal workings of the class, which 2. A computer system or process that re-
might include private methods and proper- quests a service of another computer sys-
ties, are a BLACK BOX. The use of classes can tem or process. In client–server computing,
considerably simplify complex program- the ‘front-end’ client program that the user
ming tasks. runs contacts and obtains data from a
server software program on another com-
clear 1. To set the contents of a register, puter, often at long distances. Each client
counter, or storage location to zero. program is designed to work with one or
more specific kinds of server programs and
2. To erase all the characters from a VDU
each server requires a specific kind of
screen, leaving it blank.
client. For example, a workstation request-
ing the contents of a file from a file server
CLI See command line interface.
is a client of the file server.
click To press and release a mouse but-
client-server (client/server) Describing
ton with the CURSOR pointing at an ICON or
a program whose operation is divided be-
other object on the screen. In general click-
tween two computers on a network. These
ing selects the object, but in some cases,
are the CLIENT, which interacts with the
such as BUTTONS and hyperlinks on Web user by receiving commands and present-
pages, an action is initiated. Compare dou- ing results; and the SERVER, which manages
ble click. the application’s data and does most of the
computation or data processing in re-
clickstream In Web advertising, the se- sponse to requests from the client. Often
quence of ‘clicks’ or pages requested as a the server is a dedicated machine that
visitor explores a Web site. serves multiple clients or even multiple
client-server programs of a similar type. A
click through (click-through; click- single server running a DATABASE MANAGE-
through) The action of directing a Web MENT SYSTEM, for example, can handle
browser to a particular Web site by click- multiple clients running a range of pro-
ing the mouse on a link from another site grams that utilize its databases. The princi-
or in an e-mail. When the link is an adver- pal advantages of client-server applications
tisement, it is usually paid for at a fixed are: reduced cost, because the computa-
rate per click through: i.e. the payment de- tional workload is concentrated in the
pends directly on how successful the adver- server and so the clients need not be pow-
tisement is at attracting people to the site. erful and expensive machines; increased se-
In E-MAIL MARKETING the click-through curity and robustness, because the server
ratio measures the success of a marketing manages all access to shared data; and re-
e-mail by dividing the number of click duced network traffic, because the clients
throughs it produces by the total number send requests to the server rather than ma-
of copies sent out. nipulating the data directly.

35
clip art

clip art Simple artwork in digital form by a different company, usually with
designed for use in publications or Web cheaper components.
pages. The use of clip art can save time and
make art available for nonartists. Clip art closed source See open source.
includes both subject-related illustrations
and visual elements such as lines, bullets, cluster 1. A group of terminals, mag-
and text separators. It can be purchased netic disks, processors, whole computers,
and is also available free for personal use etc., that are configured to work together
from many Web sites. and which perform as a single unit in inter-
actions with the rest of the computer or
clipboard A temporary storage area in- network. Clustering improves both system
side a computer. It is used to copy or move speed and fault tolerance.
data from one area of a document to an- 2. The base unit of disk-space allocation in
other, or from one application to another. a FILE SYSTEM. A cluster consists of one or
See cut; paste. more SECTORS.

clock An electronic device (normally a cmd The file extension of a type of


quartz oscillator) that provides a series of BATCH FILE used in Windows NT, 2000,
pulses at extremely regular intervals of and XP.
time. The interval between successive
pulses, i.e. their rate of repetition, is known CMI (computer-managed instruction)
as the CLOCK SPEED. In computers the clock See CAL.
speed is measured in megahertz or, if ap-
propriate, gigahertz: i.e. there are at least CMOS /see-mos/ (complementary metal
one million, or one billion, pulses per sec- oxide semiconductors) Any of a family
ond. of LOGIC CIRCUITS that are all fabricated
Because of its constant rate, the signal with a similar structure by the same INTE-
from a clock is used to synchronize related GRATED-CIRCUIT techniques. They are a
pieces of computer equipment. Their oper- type of MOS technology and are charac-
ations can therefore be controlled so that terized by very low power requirements.
events take place in sequence at fixed Compared with TTL and ECL they have high
times. For example, clock pulses can be fed PACKING DENSITIES but low SWITCHING
to all the FLIP-FLOPS in a computer, causing SPEEDS.
them to change state at the beginning (or
the end) of each clock pulse. The primary CMYK system A scheme for specifying
clock rate controls the fastest parts of the colors in terms of four primary colors. C
computer, while slower components are stands for cyan (aqua), M stands for ma-
timed by numerous submultiples of this genta (pink), Y stands for yellow, and K
rate. stands for black. A given color is specified
by a combination of fractions of these com-
clock speed In a computer, the number ponents. The CMYK color model is usu-
of pulses per second generated by an oscil- ally used in commercial color printing of
lator setting the tempo for the processor. books, magazines, etc. See also RGB sys-
Clock speed is usually measured in MHz tem.
(megahertz: millions of pulses a second), or
GHz (gigahertz: billions of pulses a sec- coaxial cable /koh-aks-ee-ăl/ (coax) An
ond). A clock speed of up to 3 GHz can electric cable having two or more conduct-
now be obtained and is determined by a ing paths, one conducting path being sur-
quartz-crystal circuit, similar to those used rounded by but insulated from another
in radio communications equipment. conducting path, which may in turn be sur-
rounded by and insulated from a third con-
clone A computer based on a well ductor (and so on). The outermost cable is
known and corresponding PC, but made often earthed. Coaxial cable provides a

36
com

continuous path along which electrical sig- 5. To represent data or a program in a sym-
nals (usually of high frequency) can be con- bolic form.
veyed from one point to another in a
system. codec /koh-dek/ 1. (coder–decoder) An
integrated circuit or chip that performs
Cobol /koh-bol/ A high-level PROGRAM- analog-to-digital conversion and vice
MING LANGUAGE whose name is derived versa. The most common use for such a de-
from the words common business oriented vice is in a modem.
language. It was developed specifically for 2. (compression–decompression) An algo-
administrative and financial use in the late rithm or specialized computer program or
1950s and early 1960s. It was adopted by hardware that reduces the size of large
the US Department of Defense, and is still files.
the most widely used commercial data-pro- 3. A combination of these functions, par-
cessing language. There have been several ticularly used for creating and compressing
international standards as the language has digital data for video or audio signals from
developed. analog data being received in real time and
subsequently expanding it for playback.
code 1. A rule for transforming data or MPEG is a popular codec for computer
other information from one symbolic form video.
into another. In the codes employed within
a computer, the symbols used are generally cold start See restart.
restricted to the two BITS 0 and 1. The
process of transformation is called encod- collating sequence An ordering of
characters in a character set used within a
ing, and the symbolic representation used
computer. It is employed, for example, in
or achieved is known as an encoding. The
sorting into alphabetic or alphanumeric
process of reconverting the coded informa-
order.
tion into its original form is called decod-
ing. Like encoding the decoding process
collision In an Ethernet network, the re-
follows a strict rule. Both processes are
sult of two devices on the same network at-
thus algorithmic in nature. They are car-
tempting to transmit data at exactly the
ried out by an encoder or a decoder. These
same time. The network should detect the
may be in the form of a piece of hardware collision and discard both pieces of data.
or a piece of software.
Different kinds of codes are used in color graphics adapter See CGA.
computing for different purposes. For ex-
ample, when characters – letters, numbers, color monitor A monitor that displays
etc. – are fed into a computer they are colors. The highest resolution can be ob-
transformed into a CHARACTER ENCODING, tained using a monitor in which dots of
such as UNICODE, so that they can be ma- three different phosphors, one each for red,
nipulated by the computer equipment. blue, and green, coating the inside of the
Again, ERROR-DETECTING and ERROR-COR- screen are caused to glow by electronic sig-
RECTING CODES are used to improve the re- nals representing different intensities of the
liability of data when it is transferred to or three colors. By this method the three basic
from disk or when it is transmitted. colors can be blended into millions of dif-
2. Any piece of program text written in a ferent colors. A monitor using this tech-
programming language. nique is known as an RGB monitor.
3. The particular language or type of lan-
guage in which a piece of program text is com /kom/ 1. In MS-DOS, the file exten-
written, e.g. machine code, C++ code, sion of a command program file. This is a
source code, etc. type of executable binary file limited to one
4. The encrypted form of a message. See 64-kilobyte segment and is now seldom
cryptography. used except to provide backward compati-

37
COM

bility. COMMAND.COM is the main pro- truth table (as is done in the diagram at
gram of commands for the MS-DOS oper- logic circuit). The output of the circuit at a
ating system. particular time can thus be determined by
2. A top-level Internet domain name, gen- the combination of inputs.
erally describing addresses operating in a
commercial environment. combo box A type of CONTROL on a
GUI FORM. It combines the functions of a
COM /kom/ 1. (communication port) A LIST BOX and a TEXT BOX: the user can either
port on the central unit for a cable connec- select its content from a list of options or
tion to a serial device such as a modem. type it in if something not on the list is re-
2. (component object model) A Microsoft quired.
standard designed to allow implementa-
tion of shared software components across command See command language.
diverse programs running on Microsoft
Windows platforms by specifying the sys- command language A kind of pro-
tem their INTERFACES must use. ActiveX gramming language by means of which a
controls and DirectX are examples of user can communicate with the OPERATING
COM objects. SYSTEM of a computer. Statements in such a
3. (computer output on microfilm) Com- language are called commands. They are
puter output recorded in miniaturized requests from someone using a terminal or
form on microfilm, either on a reel of film a microcomputer for the performance of
or on card-sized sheets of film known as some operation or the execution of some
microfiche (or fiche). The term COM also program, examples being ‘list’, ‘sort’,
applies to the techniques used to produce ‘delete’, ‘load’, ‘run’. JOB CONTROL LAN-
this form of output. The information is GUAGES are a type of command language; in
considerably reduced in size before the turn, command languages are a type of
recording process, enabling a large amount SCRIPTING LANGUAGE.
of information to be stored. Special optical
viewers must be used to enlarge the infor- command line interface (CLI) A user
mation on the microfilm so that people can interface to an operating system or appli-
read it. New film or fiche must be pro- cation program in which the user responds
duced if additions or corrections are re- to a visual prompt by typing in a command
quired. on a line, receives a response back from the
COM has been extensively used since system, and then enters another command,
the 1960s, for example, in libraries to cat- and so on. The Command Prompt in a
alog books by author and subject. Micro- Windows operating system is an example
film and microfiche also have applications of a command line interface. Today most
in areas that do not require a computer, users operate with a GRAPHICAL USER INTER-
e.g. in the recording of books, newspapers, FACE (GUI) such as those offered by Win-
and other documents. dows, Apple Macintosh, and others.

combinational circuit See combina- comment Part of the text of a program


tional logic. that is included for the benefit of the
human reader and is ignored by the COM-
combinational logic A simplified form PILER. The way in which a comment is con-
of BOOLEAN ALGEBRA that is used in the structed depends on the programming
design of LOGIC CIRCUITS. The circuits in language. It might be contained in brackets
combinational logic are known as combi- of some sort, for example
national circuits. They contain only LOGIC {…} in Pascal
GATES such as AND, OR, and NOT gates. /* … */ in C and C++
The behaviors of these components are de- Some languages prefer end-of-line com-
scribed by TRUTH TABLES. It is then possible ments, which are introduced by a specified
to describe the whole circuit by drawing a character or characters (such as // ; — or !)

38
compilation error

and are automatically terminated at the DEM), handshaking (e.g. XON/XOFF),


end of a line. Other languages, including and network transmissions (e.g. CSMA/
Fortran and some varieties of Basic, restrict CD).
comments to be whole lines starting with a 2. A set of standards designed to enable
special LABEL, such as C (Fortran) or REM computers to communicate and exchange
(Basic). data with one another. The common stan-
dard is the 7-layer set of hardware and
common gateway interface See CGI. software guidelines known as the OSI
(Open Systems Interconnection) model.
common information model See
CIM. communication system Any system by
which information can be conveyed from
common LISP A standardized version one point – the source – to another point –
of LISP, a programming language that was the destination – with due regard to effi-
designed for easy manipulation of data ciency and reliability. There may be more
strings, developed in 1959 by John Mc- than one source and/or more than one des-
Carthy. It is commonly used for artificial tination, in which case the system is called
intelligence (AI) programming and is one a communication network. The informa-
of the oldest high-level languages still in tion is sent from source to destination via a
relatively wide use. COMMUNICATION CHANNEL. In general the
channel will distort the information (due to
communication card (communication NOISE) and will produce ERRORS in it. In
board) See expansion card. order to reduce the effect of noise, the in-
formation is converted into an encoded
communication channel (transmission form before transmission through the
channel) A CHANNEL, i.e. an information channel and is subsequently decoded at its
route, for data transfer. See also communi- destination. See also network.
cation system.
community access television See CATV.
communication line (transmission
line) Any physical medium used to carry compact disk See CD.
information between different locations. It
may, for example, be a telephone line, an compatibility 1. The ability of a com-
electric cable, an optical fiber, a radio puter to execute program code originally
beam, or a laser beam. Compare data link. produced for another computer. This gen-
erally occurs for successive computers in a
communication network See commu- family of machines. Since later computers
nication system; network. are almost always more capable (have a
larger instruction set and/or more mem-
communications See communication ory), a computer that is able to run a pro-
system. gram of a less capable earlier machine is
said to be backward compatible.
communications program A software 2. The ability of a piece of hardware (e.g. a
program that enables a computer to con- storage device or a terminal) to be used in
nect with another computer and to ex- place of the equipment originally specified
change information. or selected. If the equipment substituted
fits into the computer without any modifi-
communications protocol 1. The col- cations and works straight away, it is said
lection of settings required for serial com- to be plug compatible.
munications with a remote system. There
are a multitude of standards applicable to compilation See compiler.
different areas of communication, such as
file transfer (e.g. XMODEM and ZMO- compilation error An error, generally a

39
compilation time

SYNTAX ERROR, detected when a program is translated into MACHINE CODE, so that the
compiled. See error. program can subsequently be executed by
a computer. It is at compile time that in-
compilation time The time taken to formation about the program, such as a
perform the compilation of a program. See compiler listing or a SYMBOL TABLE, may be
compiler; compile time. produced to aid later DEBUGGING. See also
compiler; run time.
compiler A program that takes as input
a program written in a HIGH-LEVEL LAN- complement The outcome of a NOT OP-
GUAGE, such as C++ or Fortran, and trans- ERATION on a digit, integer, truth value,
lates it into MACHINE CODE, or occasionally proposition, or formula. The complement
another form of object code. Each STATE- of the binary digit 0 is 1 while the comple-
MENT in the high-level language is con- ment of the binary digit 1 is 0. The com-
verted into many MACHINE INSTRUCTIONS, plement of the truth value true is false and
sometimes hundreds. The input to the vice versa. The complement of the proposi-
compiler is called the source program and tion ‘this object is spherical’ is ‘this object
the output is called an OBJECT MODULE. The is not spherical’.
object module is usually stored on mag- In general, the complement of a digit, d,
netic disk separately from the source pro- can be found from the formula
gram. The translation process is known as (B – 1 – d)
compilation, and the program that has where B is the BASE of the number system
been translated is said to have been com- (equal to 10 in decimal notation, 2 in bi-
piled. The entire program must be com- nary notation). The complement of the
piled before it can be executed. Complex decimal digit 6 is thus 3.
programs are usually written in several The complement of a whole number,
modules, each of which is compiled sepa- i.e. an integer, is obtained by replacing
rately. The object modules are then com- each digit in the integer by its complement.
bined by a LINK EDITOR to produce the In binary notation this gives the one’s com-
OBJECT PROGRAM. plement. (In decimal notation it gives the
A compiler not only translates program nine’s complement.) The one’s comple-
statements but includes LINKS for PROCE- ment of 0110 is thus 1001. In binary nota-
DURES and FUNCTIONS from the system li- tion the two’s complement is formed by the
brary and allocates areas in main store. addition of 1 to the one’s complement. The
The object program can subsequently be two’s complement of 0110 is thus
loaded into and run by a computer. The 1001 + 1, i.e. 1010. To determine the orig-
compiler can also produce a LISTING of the inal integer from its one’s or two’s comple-
source program, if required, and reports ment, the same process is repeated: the
the errors (mainly SYNTAX ERRORS) found complement is taken (for the one’s comple-
in the source program during compilation; ment) or the complement is taken and 1 is
it normally indicates the position and na- added (for the two’s complement).
ture of these errors. One’s complement and two’s comple-
Each high-level language that can be ment are both used in computing. A one’s
used on a particular computer requires its complement is produced by a NOT opera-
own compiler or INTERPRETER. Program tion on the binary number concerned, con-
run times are much faster when a compiler verting 1s to 0s and 0s to 1s; a two’s
is used rather than an interpreter. Once complement is produced by a further addi-
compiled, the same program can be run tion of 1. Two’s complement arithmetic is
any number of times. In contrast, an inter- simpler than one’s complement arithmetic
preter must be used each time the program and is used both in the representation of
is run. See also assembler. negative numbers and in subtraction. Each
positive number is represented in its usual
compile time The period of time during form in binary notation except that it al-
which a program in a high-level language is ways has at least one leading 0. Each nega-

40
computer

tive number is represented by its two’s CompuServe /kom-pyoo-serv/ An Inter-


complement and always has at least one net Service Provider, now part of AOL.
leading 1. For example, the decimals +34
and –34 are represented in 8-bit two’s com- computed GOTO See GOTO state-
plement notation as ment.
00100010
11011110 computer /kŏm-pyoo-ter/ A device by
respectively. There is no need for a separate which data, represented in an appropriate
plus or minus sign. The leftmost (most sig- form, can be manipulated in such a way as
nificant) bit indicates the sign (0 for +, 1 for to produce a solution to some problem. It
–) and is called the sign bit. The largest pos- is able to perform a substantial amount of
computation with little or no human assis-
itive number in an n-bit word has the form
tance. In general when the word computer
01111… and is equal to +(2n–1 – 1)
is used by itself it refers to a digital com-
The largest negative number has the form
puter. The other basic form of computer is
10000… and is equal to –(2n–1) the ANALOG COMPUTER, which is far less
In the case of subtraction, one number versatile and thus finds fewer but more spe-
can be subtracted from another by adding cialist applications.
its two’s complement. For example, the A digital computer accepts and per-
subtraction 27 – 19 (decimal) is equivalent forms operations on discrete data, i.e. data
in binary to represented in the form of combinations of
11011 – 10011 CHARACTERS. Before being fed into the
and in two’s complement arithmetic is computer the characters consist of digits,
achieved, using an 8-bit word, by the sum letters, punctuation marks, etc. Inside the
00011011 + (11101100 + 1) = computer all these characters are in binary
00001000 form, encoded as combinations of binary
The ‘carry’ drops off the end and is ig- digits, or BITS (see binary representation).
nored. The leading zero indicates that the ARITHMETIC and LOGIC OPERATIONS are per-
result is a positive number. formed on these strings of bits following a
set of instructions. The instructions form
component object model See COM. what is known as a PROGRAM, which is
stored along with the data in the MEMORY
compound document A document of the computer.
that contains one or more embedded files, The main components of a (digital)
such as a graphics image or a spreadsheet. computer are:
The embedded file is physically saved with (a) devices for the INPUT and OUTPUT of data
the document and increases its size. See and programs;
(b) memory (MAIN STORE and BACKING
also OLE.
STORE) in which to store the data and pro-
grams;
compression The process of reducing
(c) a CONTROL UNIT and an ARITHMETIC AND
the space taken up by data. File compres-
LOGIC UNIT (ALU) for processing the data
sion is achieved by using a process that re-
following the sequence of program instruc-
duces file size by eliminating redundancies tions; the control unit and ALU are gener-
in the file, such as repeated characters. A ally combined into a CENTRAL PROCESSOR.
popular method of compression is zipping, The instructions of the stored program
which is implemented by such programs as are executed one after another; a device in
PKZIP. The data in compressed files cannot the control unit (the INSTRUCTION ADDRESS
be used without first decompressing the REGISTER) indicates the LOCATION in mem-
file. However, some operating systems ory from which the next instruction is to be
allow files, directories, or whole disks to be taken. The instructions indicate how items
compressed in a fashion that is invisible to of data, specified by their locations in
the user. memory, are to be used, or what informa-

41
computer-aided design

tion is to be read from the input devices or nipulate the information, for example to
written to the output devices. straighten lines, move or erase specified
Computers range widely in per- areas, expand or contract details. Images
formance, size, and cost. They are often may be two-dimensional, i.e. flat, or may
classified as MICROCOMPUTERS, MINICOM- appear three-dimensional. A series of im-
PUTERS, or MAINFRAMES. All three groups ages can be combined in ANIMATION.
may be used as general-purpose machines, There are many different formats for
capable of solving a wide variety of prob- storing images but they fall into two main
lems. Alternatively they may be designed classes. In raster graphics the picture is
for a special purpose or for a limited range stored as a series of dots (or pixels). The in-
of problems. formation in the computer file is a stream
of data indicating the color of a dot. Im-
computer-aided design See CAD. ages of this type are sometimes known as
bitmaps. This format is used for high-qual-
computer-aided engineering See CAE. ity artwork and for photographs. Dia-
grams are more conveniently stored using
computer-aided testing See CAT. vector graphics, in which the information
is stored as mathematical instructions. For
computer architecture See architec- example, it is possible to specify a circle by
ture. its center, its radius, and the thickness of
the line forming the circumference. More
computer-assisted learning (computer- complicated curves are usually drawn
assisted instruction) See CAL.
using BEZIER CURVES. Vector images are eas-
ier to change and take up less storage space
computer-based learning See CAL.
than raster images.
computer game Any game recorded on
CD or DVD or accessed from such online
computer graphics interface (CGI) A
standard used for software applying to
sources as the Internet that can be used on
a computer. Computer games are played computer graphics devices such as printers
by manipulating a mouse, joystick, or and plotters.
games pad, or by using the keyboard or
other device in response to the graphics on computer instruction See machine in-
the screen. struction.

computer graphics The input, process- computer-integrated


ing, and output of pictorial information manufacturing See CIM.
using a computer. The information may be
a reproduction of a picture or photograph computer literacy The understanding
or a diagram ranging from a simple graph of the principles of using a computer and
to a highly complicated engineering design, associated software. In-depth knowledge is
molecular structure, etc. It may be in one not required, but an ability to understand
or more colors. how computers relate to everyday life is
The output of computer graphics may important.
be displayed on a VDU screen or may be in
the form of a permanent record produced computer modeling The development
by a PRINTER or PLOTTER. Information is using a computer of a description or math-
input to the computer by various means, ematical representation (i.e. a model) of a
such as a SCANNER, DIGITIZING PAD, MOUSE, complicated process or system. This model
or LIGHT PEN. In the case of generated can then be used to study the behavior or
graphs, etc., the computer can draw on control of the process or system by varying
data from other programs such as spread- the conditions in it, again with the aid of a
sheets. The computer can be made to ma- computer.

42
constant

computer network See network. dicate whether it is the only disk in the
computer, or, if not, whether it is the main
computer-orientated language See or a subsidiary disk. A program may need
low-level language. to know the display’s resolution, how
many different colors it supports, what
computer science The study of com- sort of printer is available, how many disks
puters and their application. This is a are available, and so on. Once the program
broad discipline covering the theory and has been configured, the initial settings will
practice of hardware and software design. be stored and used the next time the pro-
gram is run. All kinds of programs, from
computer system (computing system) word processing programs on microcom-
A self-contained set of computing equip-
puters to mainframe operating systems,
ment consisting of a COMPUTER, or possibly
need to be configured. See also reconfigu-
several computers, together with associ-
ration.
ated SOFTWARE. Computer systems are de-
signed to fulfil particular requirements.
connector 1. A device for connecting
computer word See word. electrical components. Most connectors
are available as male (plug) and female
concatenation /kŏn-kat-ĕ-nay-shŏn/ An (socket) versions and can be used to con-
operation by which two STRINGS are joined nect cables together or cables to devices.
together in a specified order. The result is 2. In software, a logical construction, such
itself a string whose length equals the sum as AND or OR, used for example to con-
of the lengths of the two strings. If one nect conditions in a database query.
string, A, is given by ‘com’ and another 3. In flowcharting, a circular symbol used
string, B, by ‘puter’, then the concatenation to indicate a break, as to another section or
of A and B yields ‘computer’. The concate- page.
nation of A and B is denoted by, for exam-
ple, connect time The time a user is con-
A+B A&B A || B nected to a remote system. This time is
depending on the programming language often used to determine user charges.
used.
console /kon-sohl/ A part of a computer
conditional Taken in some but not all used by an operator to communicate with
circumstances. See control structure; jump. the computer and monitor its operation.
Nowadays the console is usually, and for
conditional jump (conditional microcomputers always, a VDU and a KEY-
branch) See jump.
BOARD considered as a single input/output
device, or possibly a TERMINAL. In a system
conferencing /kon-fĕ-rĕn-sing/ See tele-
with many such devices attached, the con-
conferencing.
sole is the one that interacts with the com-
configuration /kŏn-fig-ŭ-ray-shŏn, -fig- puter when it is first switched on, before
yŭ-/ The particular pieces of hardware the operating system has been loaded and
making up a computer system, and the way normal multiuser access enabled. For con-
in which they are interconnected. See also venience and security it is normally situ-
reconfiguration; configure. ated near the computer’s hardware.

configure To select various optional set- constant A value or an item of data that
tings of a hardware device or a software is fixed or that cannot change. It may, for
program so that it will run to best advan- example, be a numerical constant, like π,
tage on a particular computer. A new disk, whose value must be specified, or it may be
for example, might need a switch set to in- a LITERAL.

43
content-addressable store

content-addressable store /kon-tent/ control bus See bus.


See associative store.
control character A member of a CHAR-
content delivery The service of copying ACTER SET whose occurrence in a particular
Web site pages to servers at major Internet context produces a particular effect. It may
access points in different parts of the start, stop, or modify the recording, pro-
world. This speeds up the delivery of pages cessing, transmission, or interpretation of
as page content can be obtained from the data. For example, there are control char-
closest server to the user. ISPs often hire the acters for ‘delete’, ‘carriage return’, ‘hori-
services of a company that provides con- zontal tab’, ‘start of text’, and ‘end of text’.
tent delivery. Compare graphic character.

context-sensitive help A help system in control key See keyboard.


which different help messages are dis-
played according to the particular feature control store See microprogram.
that is being used in an application. See
also help. control structure A structure in a high-
level programming language used to ex-
contiguous /kŏn-tig-yuˆ-ŭs/ Touching press the flow of control in a program, i.e.
or immediately adjacent to, with no inter- the order in which instructions are exe-
vening gaps. For example, contiguous sec- cuted. There are three basic ways in which
tors on a disk are sectors that come one control can flow. Instructions can be exe-
after the other. cuted in strict order, giving a sequential
flow; this is the normal flow of control and
continuous stationery Paper that is requires no special control structure. Use
perforated at regular intervals across its of a conditional control structure permits
width enabling it to be fan-folded into a the execution of one of a specific number
stack of ‘pages’. It has a row of regularly of possible instruction sequences; this is
spaced holes – known as sprocket holes or commonly achieved by an IF THEN ELSE
tractor holes – down each side so that it STATEMENT or by the more general CASE or
can be fed automatically through a PRINTER SWITCH STATEMENT. Use of an iterative con-
by means of TRACTOR FEED. Before print- trol structure allows a sequence of instruc-
ing, the paper may be blank or may be tions to be executed repeatedly; this is
preprinted forms. It may be multipart sta- generally achieved by some form of LOOP.
tionery, consisting of two or more lots of For each of these three types of flow con-
paper treated to produce multiple copies trol there is one entry point and one exit
and folded into a single stack. point.

control An area of a GUI FORM used to control total A number produced by


receive data or commands from and pre- adding together corresponding fields in all
sent data to the user. From the program- the RECORDS in a file. It is used for checking
mer’s point of view, a control is an OBJECT purposes (see check). A control total may
that adds functionality to the form. The or may not have a sensible meaning in the
basic types of control include TEXT BOXES, outside world. A hash total is a meaning-
LIST BOXES, COMBO BOXES, BUTTONS, and less control total. It is used solely for veri-
RADIO BUTTONS. More specialized types in- fying the records in the file, and hence for
clude calendars, clocks, and invisible con- checking the reliability of the associated
trols that perform such functions as program and computer.
connecting the form to a database. Each
type of control has many options that can control unit The part of a computer
be set by the programmer to govern the that supervises the execution of a PRO-
size, appearance, behavior, etc., of each in- GRAM. It is a component of the processing
stance. unit and is wholly electronic. Before a pro-

44
CORBA

gram can be executed it must be translated Web site so that it can remember some-
into a sequence of MACHINE INSTRUCTIONS. thing about the user at a later date. Ac-
The control unit receives the machine in- cording to the browser being used cookies
structions in the order in which they are to can be refused or can be stored for a short
be executed. It interprets each instruction or long time. In general, cookies help Web
and causes it to be executed by sending sites to serve users better, but their poten-
command signals to the ARITHMETIC AND tial and actual misuse is a current cause for
LOGIC UNIT (ALU) and other appropriate concern.
parts of the computer. The data required
for the execution is moved between MAIN cooperative multitasking See multi-
STORE, ALU, and other portions of the ma- tasking.
chine in accordance with the sequence of
instructions and under the direction of the coprocessor /koh-pros-ess-er/ A micro-
control unit. processing element designed to extend the
The control unit contains REGISTERS, capabilities of the main MICROPROCESSOR in
COUNTERS, and other elements enabling it a microcomputer. For example, it may
to perform its functions. In its simplest have better mathematical processing capa-
form it has an INSTRUCTION ADDRESS REGIS- bilities, including high-speed floating-point
TER, an INSTRUCTION REGISTER, and a regis-
arithmetic and calculation of trigonometric
ter to decode the operation part of the functions. Another design could provide
instruction. It can then operate in a two- superior graphics display capabilities (see
step fetch-execute cycle. In the fetch step graphics accelerator). A coprocessor ex-
the instruction is obtained from main store
tends the set of instructions available to the
and loaded in the instruction register; the
programmer. When the main processor re-
decoder can then determine the nature of
ceives an instruction that it does not sup-
the instruction. In the execute step the in-
port, it can transfer control to a
dicated operation, or operations, are car-
coprocessor that does. More than one co-
ried out, including the necessary references
processor can be used in a system if the
to main store to obtain or store data. In
main processor has been suitably designed.
some cases no reference to memory is re-
quired, as when a JUMP INSTRUCTION oc-
curs. In other cases an additional step is copy To READ data from a source, leav-
required, as in INDIRECT ADDRESSING when ing the source data unchanged, and to
WRITE the same data elsewhere. The physi-
two (or more) memory references are
needed. cal form of the data in this destination may
Control units nowadays can be very differ from that in the source, as occurs
much more complex than this, containing when data is copied from magnetic disk to
additional registers and other functional main store.
units that can, for instance, prepare the
next instruction for execution before the copy protection Methods used by soft-
current one is complete (see pipeline pro- ware companies to prevent unauthorized
cessing). At present the functions of most duplication of their programs and so pre-
control units are accomplished by means of vent software piracy.
MICROPROGRAMS.
CORBA /kor-bă/ (common object request
conversational mode See interactive. broker architecture) A system that al-
lows for the sharing of objects, such as
cookie A small file of information, usu- files, applications, and pieces of programs,
ally containing personalized details, sent over the Internet, regardless of what pro-
by a Web server to a Web browser and sent gramming language they are written in or
back to the server whenever the browser what operating system they are running
makes further requests. In simple terms in- on. CORBA was developed by an industry
formation is put on a user’s hard disk by a consortium known as the Object Manage-

45
core store

ment Group (OMG). See also DCOM; in- the 16-bit microprocessor chips in the Intel
terface. 8086 family was called CP/M-86, but it
was never widely used due to the popular-
core store A form of magnetic storage ity of MS-DOS. It is now obsolete.
widely used for MAIN STORE in computers
built between the mid-1950s and mid- cps /see-pee-ess/ (characters per second)
1970s. It has been displaced in present-day A measure of the rate of output of, say, a
machines by SEMICONDUCTOR MEMORY – character printer, or sometimes a measure
RAM and ROM. Core store consisted essen- of the rate at which data is processed or
tially of tiny rings of ferrite (the brown ma- transferred.
terial used to coat magnetic tapes), which
could be magnetized in either of two ways CPU (central processing unit) See cen-
and were thus each capable of storing one tral processor.
BIT of information.
CR See carriage return.
corrective maintenance MAINTENANCE
that is performed after a fault has been cracker See hacker.
found – in hardware or software – in order
to correct that fault. Compare preventative crash 1. (system crash) A system failure
maintenance. that requires at least operator intervention
and often some maintenance before system
corrupt To alter data stored in a com- running can resume. The system is said to
puter system, usually accidentally, and have crashed.
hence introduce errors. The process is 2. (program crash) A failure in an individ-
known as data corruption. It results in a
ual program that causes it to exit prema-
loss of data INTEGRITY.
turely, to be aborted by the operating
system, or to HANG so that the user must
counter An electronic device whose
abort it. In all cases any changes to data
‘state’ represents a number, and that on re-
files that have not been saved will be lost.
ceipt of an appropriate signal causes the
3. See head crash.
number represented to be increased (or de-
creased) by unity. Only a fixed group of
numbers can be represented. Once all these crawler (spider) A program that visits
numbers have occurred, one after the Web sites, particularly ones that are new or
other, the sequence starts again. The updated, and collects information from
counter is usually able to bring the number pages to enter in the index of a search en-
represented to a specified value, such as gine.
zero. In a computer system a counter can
be used as a timer if the signal received is a CRC (cyclic redundancy check) An al-
clock pulse (see clock), the counter nor- gorithm used to derive a check number
mally counting down from a selected value from data being transmitted. The CRC
and raising an INTERRUPT when it has fin- number is transmitted with the data. By re-
ished. calculating it at the receiving end and com-
paring it to the original, errors in
courtesy copy See cc. transmission can be detected. CRC meth-
ods are also used in other circumstances,
CP/M /see-pee-em/ Trademark An OPER- for example in the production of CDs so
ATING SYSTEM produced by Digital Re- that they are virtually error free.
search in the late 1970s. It was intended for
use on microcomputers with floppy disks crop 1. To insert marks on a document
and the 8-bit Intel 8080 microprocessor, or to be printed showing where the paper can
either of the later Intel 8085 or Zilog Z80 be trimmed to produce the correct page
8-bit chips. A version of CP/M for use with size.

46
cybernetics

2. To reduce the size of an image by cutting current instruction register (CIR) See
off one or more margins. Most graphics instruction register.
applications allow images to be cropped.
cursor A symbol on a VDU screen that
cross assembler An ASSEMBLER that indicates the ‘active’ position, for example
runs on one computer, producing an object the position at which the next character to
module to run on a different computer. It is be entered will appear. The cursor’s shape
usually used to generate software for EM- usually varies with the content: for exam-
BEDDED COMPUTER SYSTEMS.
ple, the active position in a word-process-
ing document is often indicated by a thin
cross compiler A COMPILER that runs on flashing vertical line, whereas a WINDOW
one computer, producing an object module displaying the contents of a directory as
ICONS might use an arrow.
to run on a different computer. It is usually
used to generate software for EMBEDDED
cursor keys Keys on a KEYBOARD that
COMPUTER SYSTEMS.
can be used to move the CURSOR to a new
position on a display screen. They include
cross-post To copy a message from one the ARROW KEYS.
communications channel, such as a news-
group or e-mail system, to another. cut To delete selected text from a docu-
ment displayed on a screen. The text is re-
CRT (cathode-ray tube) See display. tained on the CLIPBOARD until another piece
of text is cut or the computer is closed
cryptography The protection of a mes- down. It can then be pasted – i.e. inserted
sage so as to make it unintelligible to any- into the document at a different place or in-
body not authorized to receive it. The serted into another document.
sender of a message renders it into an un-
intelligible form by processing it. This pro- cut sheet feed A technique for feeding
cessing is known as encryption. Many paper into a printer, the mechanism used
techniques are known for the conversion of being called a cut sheet feeder. The feeder
the original message, known as plain text, picks up a single sheet from a pile of sheets
into its encrypted form, known as cipher in a hopper and feeds it into the printer. In
(or cypher), ciphertext, or code. Comput- more sophisticated feeders there may be a
ers usually accomplish this by applying an number of hoppers, for example one for
encryption algorithm to the plain text to headed top sheets, one for plain second
produce a pseudorandom cipher, the en- sheets, and one for envelopes. A multipage
coding being governed by a user-specified letter complete with envelope may thus be
printed. See also tractor feed; friction feed.
KEY. The original message is recovered by
processing the encrypted message. When
cybercafe /sÿ-ber-ka-fay/ 1. A place,
this is done by an authorized recipient
usually a coffee shop or restaurant, where
holding the secret key to the encryption, Internet access is made available to the gen-
the processing is known as decryption. Re- eral public for a charge.
covery of the message is expected to be im- 2. A virtual cafe on the Internet where
possible without prior knowledge of the chats can take place and messages can be
key. posted using BBSs.

CSLIP /see-slip/ (compressed serial line In- cybercash /sÿ-ber-kash/ See e-money.
ternet protocol) A version of SLIP in
which the Internet address information is cybernetics /sÿ-ber-net-iks/ The study of
compressed making transmission quicker. thought processes and control systems,
which draws an analogy between brains
CSS See cascading style sheets. and electronic circuits. It is based on theo-

47
cyberspace

ries of communication and control and the a storage device and the fetch-execute cycle
extent to which they can be comparatively of a CONTROL UNIT.
applied to living and nonliving systems. 2. (cycle time) The minimum period of time
required to complete such a sequence of
cyberspace /sÿ-ber-spayss/ A term origi- events, i.e. the time between the start of
nated by the author William Gibson in his one sequence and the start of the next. The
novel Neuromancer and now used to de-
term is often used specifically to mean
scribe the whole gamut of information re-
STORAGE CYCLE, i.e. the minimum time re-
sources obtainable through the Internet.
Cyberspace is a shared virtual universe quired between successive accesses to a
whose inhabitants, contents, and spaces storage device.
comprise data that is seen, heard, and felt
and through which a virtual-reality user cycle time See cycle.
can move. See also virtual reality.
cyclic redundancy check See CRC.
cycle 1. A sequence of events that is re-
peated regularly and in the same order. A cylinder See disk pack.
piece of hardware may operate in such a
way, examples being the STORAGE CYCLE of cypher /sÿ-fer/ See cryptography.

48
D

DAC /dak/ See D/A converter. daisywheel printer /day-zee-hweel, -weel/


An obsolete type of impact character
D/A converter (digital to analog con- printer, i.e. a PRINTER that prints a charac-
verter; DAC) A device for converting a ter at a time by mechanical impact. The
DIGITAL SIGNAL into an equivalent ANALOG printing mechanism involved a rimless
SIGNAL, i.e. for converting the output from ‘wheel’ consisting of spokes that extended
a computer (in the form of a series of bi- radially from a central hub; solid charac-
nary values) into a continuous representa- ters were embossed on the ends of the
tion. See also A/D converter. spokes. This print wheel was rotated until
the required character was opposite the
daemon /dee-mŏn, day-/ A dormant printing position, and a hammer then
program or process that is part of a larger struck it against the inked ribbon and
program or process and that becomes ac- paper. The print wheel was interchange-
tive when certain conditions occur. able, enabling different character sets to be

paper
hammer

ribbon

print wheel
U

movement of
printing mechanism
q
t y

embossed characters
on spoke ends

Daisywheel printer

49
DASD

used. The quality of the print was high, and order. The organization of the records in a
daisywheel printers were used for printing database, and the methods used to access
letters, documents, etc. the data, are more sophisticated than those
of a data file with no associated DBMS.
DASD (direct access storage device) A Databases are usually more complex
storage device from which data can be ac- than data files, and are often collections of
cessed in any order rather than sequen- data previously held in many separate files.
tially. Magnetic disk drives, CDs, and They are not necessarily large and complex
DVDs are examples of DASDs, whereas however: DBMS software is available on
tape units are not. small as well as large computers. Storing
data as conventional files can limit the
DAT /dat, dee-ay-tee/ See digital audio data’s use to one particular application. A
tape. database provides data that is available to
all users of the system, and may be shared
data /day-tă, dat-ă, dah-tă/ In comput- by a number of different applications.
ing, the basic facts – numbers, digits, Often, a dedicated computer called a data-
words, characters – that are fed into a com- base server provides database services to
puter system (in the required form) to be all users on a network.
stored and processed for some purpose. In A database together with its DBMS and
this case data is regarded as the INPUT to a hardware is often referred to as a database
computer system as opposed to the OUTPUT system. A data item in a database is typi-
of the system, i.e. the results obtained from cally associated with many other items,
processing. It is possible, however, for the
some of which may be in the same record.
results of one process to serve as the data –
Data is usually retrieved by giving values of
the input – to another process.
specified items in order that the database
The word ‘data’ is also used as distinct
system should respond with the values of
from program instructions. In this case
specified associated items. For example, a
data refers to all the OPERANDS that a pro-
system might retrieve the registration num-
gram handles, i.e. the numbers or quanti-
bers of all cars of a given color, make, and
ties upon which ARITHMETIC and LOGIC
OPERATIONS are performed.
year of registration. See also database lan-
guage.
DATA See Basic.
database language Any of a group of
databank /day-tă-bank, dat-ă-, dah-tă-/ languages used for setting up and commu-
A system that offers facilities to a commu- nicating with DATABASES. The instructions
nity of users for the deposit and with- given in a database language are executed
drawal of data on a particular topic, such by the DATABASE MANAGEMENT SYSTEM.
as trade statistics or share prices. The user Each language consists of at least one data
community is usually widespread and the description language (DDL) and at least
databank itself may be a public facility. Ac- one data manipulation language (DML).
cess to a databank may, for instance, be by The DDL is used to define the structure of
some form of NETWORK, such as the Inter- the RECORDS within the database files and
net. The data to be accessed may be orga- the relationships between them. It can be
nized as a DATABASE or as one or more FILES. used to specify what type of information is
to be stored – numbers, characters, dates,
database /day-tă-bayss, dat-ă-, dah-tă-/ etc. – as well as which values are to be used
A set of DATA FILES – i.e. an organized col- for indexing. The DML is then used to
lection of related data – that is defined, ac- copy the data into the database files and
cessed, and managed by a set of programs manipulate and retrieve it in various ways.
known as a DATABASE MANAGEMENT SYSTEM That part of the DML used for retrieving
(DBMS). The RECORDS in a database are the data may be called the query language.
addressable and can be accessed in any An important database language is SQL.

50
data integrity

database management system (DBMS; of data via a keyboard, etc. This reduces
database system) A collection of pro- the work involved and the chance of error.
grams that handle and control all accesses For example, the letters Y and N can be
to a DATABASE and that maintain the in- used for ‘yes’ and ‘no’.
tegrity of the database, i.e. the correctness
of the stored data. It achieves this by carry- data collection The process by which
ing out instructions couched in a DATABASE data from several locations is collected to-
LANGUAGE while checking that their effects gether before it is fed into a computer.
do not violate the integrity rules; any that
do are aborted. A DBMS thus has features data corruption See corrupt.
in common with OPERATING SYSTEMS and
COMPILERS. The DBMS allows simultane- data description language (DDL) See
ous access to the database by a number of database language.
users. A good DBMS is characterized by
the ease and speed with which complex data dictionary A set of descriptions of
searches and retrievals are carried out and the data components of some computer-
the flexibility and power of the way data- based system. It is normally held in the
bases are specified. A single DBMS is often form of a FILE or DATABASE. It gives infor-
capable of managing more than one data- mation about the nature of the data –
base. meaning, relationships with other data,
format, etc. – and its use. A database, for
database system 1. See database man- example, will have a data dictionary. A
agement system. data dictionary is an important tool in the
2. A DATABASE MANAGEMENT SYSTEM to- effective planning of a computer-based sys-
gether with its associated hardware (stor- tem, and in the overall control, storage,
age devices, dedicated computers, etc.) and and use of data in the operational system.
the database or databases that it manages.
data element (data item) An individual
data bus See bus. unit of data.

data capture A process by which data data encryption standard (DES) An


can be extracted during some operation or algorithm used for the encryption of data.
activity and can then be fed into a com- It was developed in the 1970s, but the in-
puter. The equipment involved may be creased processing power of modern com-
connected directly to a computer, allowing puters has made it insecure and it is no
the incoming data to be monitored auto- longer an official standard. However, it is
matically. For instance, the use of point-of- still in widespread use.
sale terminals in a supermarket involves
data capture: although the prime objective data entry The process by which an op-
of the operation is the sale to the customer, erator feeds data into a computer by means
the type of product sold can be recorded of an input device. See also direct data
and hence stock control can be improved. entry.

data cleaning (data vetting) The process data file A FILE containing data, i.e. the
of checking RAW DATA for completeness, numbers, text, etc., upon which operations
consistency, and validity. Any bad charac- are performed by a computer. A data file is
ters, out-of-range values, and inconsisten- often organized as a set of RECORDS. Com-
cies are either removed or brought to the pare program file; database.
attention of someone for a decision.
data flowchart (system flowchart) See
data coding The use of standard abbre- flowchart.
viations or simplified representations in the
recording of data on documents, the input data integrity See integrity.

51
data link

data link The physical medium – tele- conducted mainly in business, industrial,
phone line, optical fiber cable, etc. – by and government organizations whereby
which two locations are connected for the data is collected, stored, and processed on
purpose of transmitting and receiving data, a routine basis in order to produce infor-
together with the agreed procedures (i.e. mation, regularly or on request. The oper-
the PROTOCOL) by which the data is to be ations almost always (but not necessarily)
exchanged and any associated devices or involve computers. A DP system usually
programs. handles large quantities of data organized
in a complex way. Typical applications in-
data logging 1. The recording of all clude production of payslips, accounting,
data passing through a particular point in market research and sales forecasting,
a computer system. The point chosen can, stock control, and the handling of orders.
for example, be in a pathway to or from a
VDU. The record – or log – that is pro- data protection The protection of data
duced can be used to reconstruct a situa- handled in a computer. The term is usually
tion when, say, a fault occurs in the system applied to confidential personal data, i.e.
or an unexpected result is obtained. data concerning a living person who can be
2. The regular sampling of a number of identified from that information, and pos-
quantities, such as temperature, flow rate, sibly including some opinion expressed
and pressure, by a device known as a data about that person. Credit ratings produced
logger. The information is stored within by banks, donations received by charities,
the logger and periodically transmitted to a transactions by mail-order firms, and per-
computer for analysis.
sonal records kept by government agencies
and the police all involve data concerning
data manipulation language (DML)
the individual; for ease of access, ease of
See database language.
updating, saving of space, and other rea-
sons, this kind of information is now usu-
data mining The analysis of large quan-
ally stored in computers.
tities of data to discover previously un-
Legislation exists in many countries to
known patterns. The data may be held in a
database or a DATA WAREHOUSE, and many protect personal data when it is stored in
database management systems provide computers. The aim is to control the po-
such facilities as OLAP that assist data min- tential for misuse of such information. Per-
ing. The use of store loyalty cards, for ex- sonal data could, for example, be extracted
ample, means that a record of each from one stored record and correlated with
customer’s purchases can be built up over data concerning the same person from an-
a period of time; data mining can then other file. The combination of information
identify any patterns, such as favored that could result is considered an infringe-
brands, amount usually spent on each visit ment of privacy.
to the store, etc., which can be used to gen-
erate marketing literature and even special data retrieval The process by which
offers tailored to each customer. data is selected and extracted from a FILE, a
group of files, a DATABASE, or some other
data preparation The conversion of area of memory. See also information re-
data into a coded form that can be read by trieval.
a machine and hence fed into a computer.
The necessity for data preparation has data structure Any of several forms in
been largely removed with the advent of which a collection of related data items can
DIRECT DATA ENTRY. The operation of a be organized and held in a computer. Ex-
keypunch to encode data on punched cards amples include ARRAYS, RECORDS, FILES,
was an example. STRINGS, and TREES. Various operations can
be performed on the data structure as a
data processing (DP) The operations whole and on its individual elements, the

52
debugging

choice depending on the type of data struc- oped by Ashton Tate. The first version was
ture and the programming language. dBase II, which in the early 1980s became
the first widely used DBMS on microcom-
data tablet See digitizing pad. puters. It lost its market dominance in the
1990s and is no longer widely used.
data transfer The movement of data
from one point to another. These points DBMS See database management system.
may, for instance, be storage locations
within a computer system or at either end DCE (data communication equipment)
of a long-distance TRANSMISSION LINE. An intermediary device that enables data
terminal equipment (DTE) to access a com-
data transfer rate The rate at which munications line, as defined in RS232 and
data can be moved between two points, for X25 specifications. One example is a
example from a magnetic disk to main modem, which represents the provider side
store or from one location on a NETWORK of a data communication interface.
to another.
DCOM (distributed component object
data transmission See transmission. model) A version of Microsoft’s compo-
nent object model (COM) specification. It
data type Any one of the kinds of data deals with the communication of compo-
(e.g. integers, real numbers, strings) that nents over Windows-based networks when
can be identified by a VARIABLE, an ARRAY, different parts of an application are split
or some other more complex data object in and run across different machines on the
a programming language. The choice of network.
data type defines the set of values that the
variable, etc., is allowed to take and the op- DDE 1. (dynamic data exchange) A
erations that can be performed on it. technique used by Windows and some
other operating systems that enables two
data vetting See data cleaning. or more applications running simultane-
ously to link data and commands together.
data warehouse A sophisticated data- If data is changed in one application, then
base system holding a large amount of data the same data will automatically be up-
that can, in fact, be made up of several dated in the other application. DDE has
databases spread over several computers at been superseded on Windows systems by
different sites. Fast data searching and fil- OLE and COM.
tering techniques are used to supply infor- 2. (direct data entry) The input of data and
mation to the user, who is unaware of the updating of files directly in an on-line sys-
complexity of the system. In general data tem, usually by typing the data at a key-
warehouses hold a historical record of an board or sometimes by using a data-
organization’s data, which is augmented capture device.
periodically with copies of the current state
of the ‘live’ data. They are optimized for DDR SDRAM See SDRAM.
OLAP rather than OLTP operations.
DDS (digital data storage) See digital
daughterboard /daw-ter-bord, -bohrd/ audio tape.
A circuit board that can be plugged into
another board, thus increasing its function- debugger See debug tool.
ality.
debugging The identification and re-
dB See decibel. moval of BUGS – i.e. localized errors – from
a program or system. The bugs in a pro-
dBase /dee-bayss/ Trademark A rela- gram may, for example, be SYNTAX ERRORS
tional database management system devel- uncovered by the compiler, RUN-TIME ER-

53
debug tool

RORS detected during execution of the pro- rain N N Y – – –


gram, or logical ERRORS, which are more snow N N N Y – –
difficult to identify. There are various diag- fog N N N N Y Y
nostic aids that can be used in debugging a temp. (°C) >8 <8 – – >0 <0
program, including TRACE programs or a
DEBUG TOOL. Again, a DIAGNOSTIC ROUTINE take bike ×
may be entered as a result of some error take car × ×
condition having been detected – in either take train × ×
software or hardware. See also error-de- stay home ×
tecting code; error-correcting code.
Decision table for traveling to work
debug tool (debugger) A special pro-
gram – a SOFTWARE TOOL – that assists in A decision table usually has four parts
the DEBUGGING of programs by allowing (see diagram). One part (top left) lists the
the internal behavior of the programs to be possible conditions, while another part
investigated. Typically a debug tool allows (bottom left) lists the possible actions. The
the user to follow a program’s execution in remaining parts show the conditions under
the source code, either by stepping through which each action is selected. The top right
the source code line by line or by inserting section specifies the conditions by means of
BREAKPOINTS to stop execution at selected a Y (yes), N (no), – (don’t care), or a
points. While execution is halted the values BOOLEAN EXPRESSION that resolves to Y or
of program VARIABLES can be examined and N; the bottom right indicates, by means of
perhaps modified. a cross, the particular action to be taken
for each set of circumstances.
decibel /dess-ă-bel/ (dB) A unit of com-
parison against a known reference for cur- decision tree A binary tree in which
rents, voltages, or power levels and also the every nonterminal node represents a deci-
strength of sound, equal to one tenth of a sion. Control will be passed either to the
bel. A bel is equal to the logarithm to the left or right subtree (yes or no) of the node
base ten of the ratio of the measured quan- according to the decision taken. A leaf
tity to the known reference. node represents the final outcome of all the
decisions taken.
decimal notation /dess-ă-m˘l/ (decimal
system; denary notation; denary system) declaration A statement in a computer
The familiar number system, using the 10 program that introduces an entity for part
digits 0–9. It thus has a BASE 10. The value of the program, gives it a NAME, and estab-
of a number is determined not only by the lishes its properties. The entities that can be
digits it contains but also by their position named include VARIABLES, ARRAYS, PROCE-
in the number. The positional value in- DURES, and FILES. The declaration is funda-
creases from right to left by powers of 10. mental to most programming languages,
For example, in the decimal number 473, 3 the form it takes depending on the lan-
is in the units place, 7 is in the tens place, guage.
and 4 is in the hundreds place.
decoder, decoding See code.
decision table A table that indicates all
the conditions that could arise in the de- decollator /dee-kŏ-lay-ter/ A device that
scription of a problem, together with the separates the copies of multipart CONTINU-
actions to be taken for each set of condi- OUS STATIONERY produced as output from a
tions. It thus shows precisely what action is PRINTER. See also burster.
to be taken under a particular set of cir-
cumstances. Decision tables can be used in decompression /dee-kŏm-presh-ŏn/ The
specifying what a program is to do (but not expansion to its original form of data that
how it is to achieve this). has been stored in a compressed form.

54
descending order

decryption See cryptography. can be a security risk. Special programs


exist to ensure that data is overwritten
dedicated Committed entirely to a sin- when its file is deleted.
gle purpose or application. For example, a
computer can be dedicated to controlling a delimiter /di-lim-i-ter/ A character or
machine tool, running a DBMS and storing group of characters used to mark the be-
its associated databases, or synthesizing ginning and end of a program STATEMENT,
musical sounds. CONTROL STRUCTURE, or some other item of
data. Different characters may be used for
default option A predetermined action the beginning delimiter and the end delim-
to be performed, or a value to be used, if no iter. Many languages use begin and end to
specific action or value has been indicated. delimit complex statements. Most lan-
For instance, a printer might assume a page guages use single or double quotation
length of 11 inches or a C++ compiler marks to delimit character STRINGS. See
might assume that the user did not want a also separator; terminator.
compiler listing. Both these defaults could
be overridden by specific instructions to demodulation, demodulator /dee-moj-
the contrary. ŭ-lay-shŏn, dee-moj-ŭ-lay-ter/ See modu-
lation.
defragmentation /dee-frag-men-tay-shŏn/
The rearrangement of data on a disk drive demonstration software 1. A scaled-
so that each file’s data occupies contiguous down version of a program used for mar-
SECTORS. Following defragmentation, an keting purposes.
entire file can be read with the minimum 2. A prototype that shows some of the ex-
number of physical movements of the pected functionality, the on-screen look,
disk’s read–write heads. See also fragmen- and the data-handling capabilities of soft-
tation. ware under development.

degradation /deg-ră-day-shŏn/ 1. The demountable disk /dee-mown-tă-băl/


spreading out of the shape of a pulse of an See exchangeable disk store.
electrical signal. It usually occurs when
data is transmitted but can also take place denary notation /dee-nă-ree/ (denary sys-
if too many peripherals are attached to an tem) See decimal notation.
output terminal. The consequence is that
data interpretation may be difficult be- density 1. A measure of the amount of
cause pulses become hard to count. data that can be stored per unit length or
2. A decrease in performance or service of per unit area of a storage medium. It may
a computer system. be quoted in terms of bit density, i.e. the
number of BITS per unit length or per unit
deletion /di-lee-shŏn/ Removal or oblit- area. The density of a MAGNETIC DISK can
eration of an item of data or of a collection be quoted as the maximum number of bits
of data. Data that has been fed into a sys- per SECTOR, the number of sectors per
tem by KEYBOARD and displayed on a track, and the number of tracks per disk or
screen can be deleted by operating a func- per inch.
tion key, such as the backspace or delete 2. See packing density.
keys. With magnetic disk, deletion of data
is achieved by overwriting with new data deposit To place a value in a LOCATION
or null characters. However, in some cases, in memory or in a REGISTER in a processor,
especially the deletion of whole files, the i.e. to store a value.
data is noted as no longer needed but not
actually overwritten until that part of the DES See data encryption standard.
disk is needed for another file. This in-
creases the computer’s performance but descending order The arrangement of a

55
desktop

set of data in order starting with the largest DFS See distributed file system.
character value, as in Z to A or 50 to 1.
DHCP (Dynamic Host Configuration
desktop The general screen background Protocol) A protocol that allows a com-
on which windows appear and icons can be puter on a network to obtain various con-
placed by the user in Apple Macintosh and figuration parameters from a server. This
Windows systems. server (a DHCP server) can ensure that
these parameters allow the computer to
desktop computer A compact micro- operate properly in the particular network
computer in which the main components, environment and that it does not interfere
such as the CPU, keyboard, and monitor, with other machines on the network. The
can be placed on top of a desk but are too most important use of DHCP is to allocate
large to be portable. IP ADDRESSES dynamically from an organi-
zation’s available pool. The alternative is
desktop publishing (DTP) The use of a to configure each machine manually to use
computer system to produce professional- a specific IP address, which is not only less
standard page layout, including the choice efficient (more IP addresses are required)
of fonts and type size and the inclusion of but is also prone to such errors as giving
pictures. Illustrations can be created in two machines the same address.
graphics software programs and artist’s
images, photographs, and other pictures DHTML See dynamic HTML.
can be scanned, converted to a suitable for-
mat, then displayed, scaled, and cropped.
diagnostic routine Part of a program,
DTP software usually produces its output
or a sequence of instructions called by a
in a suitable form for printing, such as
program, that is entered as a result of the
PostScript files.
detection of some condition causing an
ERROR. A diagnostic routine may analyze
desktop video The use of a personal
the cause of the error, or provide informa-
computer to display video images from a
tion that can be used for this purpose. It
video tape, a DVD, a file stored on the
computer or downloaded from the Inter- might attempt to isolate the cause of the
net, or directly from a video camera. error to a particular piece of hardware or
software.
destination The drive, folder, or direc-
tory to which a file is being sent, or the dialog box A small box that is displayed
memory address or location in a document on the screen and is an essential part of
or program to which data is being sent. GUI programming. It contains a message
that needs a reply from the user. This may
developer A company or individual that be as simple as clicking with the mouse on
produces software. This involves the analy- a Yes/No selection, or entering a few char-
sis of requirements, defining the applica- acters of data as required.
tion structure, programming, testing,
modification, documentation, implemen- dial-up A temporary connection be-
tation, and issue. tween machines, established over a stan-
dard telephone line.
device A peripheral or other active part
of the electronics of a computer system. dictionary See data dictionary.

device driver A short program that pro- Difference Engine A mechanical com-
vides the interface between a computer and puting device designed by Charles Babbage
a device such as a printer, disk drive, or in 1823 to produce mathematical tables
mouse and controls the detailed operation but never completed. Some of the ideas
of the device. See also plug-and-play. used in the Difference Engine were incor-

56
digital versatile disk

porated by Babbage in the design of his ables. Usually only binary variables are in-
ANALYTICAL ENGINE. volved (i.e. quantities that can take either
of two values), and the term binary logic
digit /dij-it/ Any of the numerals (or pos- can then be used. The components consist
sibly letters) used in a particular NUMBER of LOGIC GATES and LOGIC CIRCUITS.
SYSTEM. Decimal notation uses 10 numer- 2. The methods and principles underlying
als: this implementation of logic operations.
0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Binary notation uses the numerals 0 and 1. digital recording The storage of infor-
Octal notation uses the numerals 0 to 7. mation such as text, graphics, video, or
Hexadecimal notation uses 16 digits: 10 sound in binary coded form (a string of 1s
numerals (0–9) and 6 letters (A–F). and 0s) that can be physically represented
on a particular medium. The term is used
digital audio tape (DAT) A magnetic especially for such recordings of video and
audio-tape storage medium for recording sound, to contrast them with recordings
digitally coded audio information. The se- that use analog technologies.
ries of DDS (digital data storage) formats
(DDS, DDS2, DDS3, DDS4, and DDS5) digital signal An electrical SIGNAL whose
builds on DAT and adapts it for computer voltage at any particular time will be at any
storage. Tapes using the DDS standards one of a group of discrete (distinct) levels.
are used for backing up computer systems. The voltage therefore does not vary contin-
They are 4 mm wide and varying lengths uously (unlike an ANALOG SIGNAL). In gen-
from 90 m upwards offer different capaci-
eral there are just two discrete levels: the
ties, with each standard providing a greater
voltage jumps back and forth between the
recording density than its predecessor.
two levels over a period of time; such a sig-
nal is often called a binary signal. (A digi-
digital computer A computer that ac-
tal signal is therefore usually but not
cepts and performs operations on discrete
necessarily a binary signal.) The LOGIC
data, i.e. data represented in the form of
GATES and LOGIC CIRCUITS used in comput-
combinations of digits, letters, or other
CHARACTERS. Compared with an ANALOG
ers handle two levels of voltage, and thus
COMPUTER, a digital computer is much
their inputs and outputs are binary signals;
more versatile and hence much more the high level of voltage is usually used to
widely used. It is thus generally referred to represent binary 1, with the low level rep-
simply as a computer. See computer. resenting binary 0.

digital data transmission A method of digital signature 1. A security measure


transmitting digital data in which the data used especially on the Internet. Two keys,
is represented by discrete discontinuous one private and one public, are utilized re-
signals. These signals can be sent using ei- spectively to encrypt and decrypt messages.
ther DC or AC transmission systems. DC The consequence is that, if recipients of a
transmissions are fast and have a low error message are able to decrypt it using the ap-
rate. Different voltages (or currents) are propriate public key, they can be sure that
used to represent the values (usually 0 or 1) the message did indeed originate from the
and signals from many sources can be mul- claimed sender.
tiplexed using digital techniques. AC trans- 2. A binary number used as an identifica-
missions use analog signals and a tion code for devices such as ROMs, print-
modulator is used to convert from the dig- ers, and graphics cards.
ital signal to an analog signal.
digital to analog converter See D/A
digital logic 1. The electronic compo- converter.
nents used in a computer system to carry
out LOGIC OPERATIONS on discrete vari- digital versatile disk See DVD.

57
digital video disk

digital video disk See DVD. erated. The digitizing process is activated
by one or more switches or buttons on the
digital video interface (DVI) A hard- pen. The thickness, color, and/or opacity
ware-based technique for compressing and of lines is governed by the pressure applied.
decompressing full-motion video, audio,
and computer data on a CD. The technique DIL switch /dil/ (dual in-line switch) A
is also referred to as digital video interac- device similar in form to a DIP, but instead
tive. DVI is a hardware-only CODEC. of an integrated circuit the package con-
tains a row of small switches making or
digitize /dij-i-tÿz/ To transcribe any con- breaking the circuit between opposite pairs
tinuously varying (analog) source of data, of legs. DIL switches are used for setting
such as sound, into a digital (binary coded) the default state of some printers, termi-
form so that it can be directly processed by nals, etc.
a computer. The term is also applied to the
scanning of images or OCR of text. DIM /dim/ See Basic.
digitized signal The representation of a dimension See array.
continuously varying signal in a digital
form. The digitized signal has values that DIMM /dim/ (dual in-line memory mod-
are identical to those of the continuously ule) A memory board on which memory
varying (i.e. analog) signal but only at dis- chips are mounted and separate connector
crete (separate) instants of time. As a re- pins are on both sides of the circuit board.
sult, the voltage or current changes in steps
This increases the amount of memory that
between discrete (distinct) values. For ex-
can be plugged into a single connector and
ample, if the voltage of an analog signal is
also increases the size of the data path for
measured at discrete intervals, then the se-
faster data transfers. See also SIMM.
quence of measured values is a digitized
signal; the analog signal is said to have
dingbat /ding-bat/ 1. A small graphical
been sampled so as to produce the digitized
element used for decorative purposes.
signal.
2. A font that is composed of a set of sym-
digitizer A device to change information bols rather than alphanumeric characters.
into a digital form.
DIP /dip/ (dual in-line package) An INTE-
GRATED CIRCUIT contained in a rectangular
digitizing pad (digitizing tablet; data
tablet; graphics tablet) A flat surface that plastic or ceramic package with a row of
can be placed on a desk and is used to- metal legs down each of the long sides (see
gether with a penlike device for the input of diagram). The legs can either be soldered
data to a computer graphics system. into holes in a PRINTED CIRCUIT BOARD or in-
(Larger surfaces are also available and are serted into a CHIP SOCKET. A SIP has only
known as digitizing tables or boards.) The one row of pins. See illustration overleaf.
position of the pen on the digitizing pad
can be accurately and rapidly located by direct access RANDOM ACCESS to a stor-
any of a variety of methods; it is measured age device, such as a magnetic disk or CD.
in terms of the x and y coordinates of the
point of contact, i.e. the horizontal and direct-access file See file.
vertical distances of the pen from one cor-
ner of the digitizing pad. The position is direct addressing (absolute addressing)
thus in a digital form that can be fed into An ADDRESSING MODE in which the address
the computer. When the pen is moved by specified in a MACHINE INSTRUCTION is the
hand over the surface, closely spaced posi- actual address to be used, i.e. the MACHINE
tions can be measured. A DIGITIZED SIGNAL ADDRESS of the location to be accessed is
representing the path of the pen is thus gen- given explicitly. The address specified is

58
disk

package containing
integrated circuit

rows of metal legs

DIP (dual in-line package)

then called a direct address. See also ad- ries, and there are one or more shared di-
dress. rectories. Units of removable media (CDs,
DVDs, floppy disks, etc.) each have their
direct data entry See DDE. own directory. Directories are used by the
operating system to locate files when given
direct memory access (DMA) A their names, and by computer users to keep
method of transferring data between main track of what files are available. See also
store and other storage devices without in- folder.
volving the CENTRAL PROCESSOR. Without
DMA, every byte or word of data has to be DirectX /dă-rekt-eks/ A Windows appli-
individually transferred from main store to cation program interface (API) for creating
the central processor, and then written to and manipulating graphic images and mul-
the destination device (or vice versa). With timedia effects. It is used in games and in
DMA, the central processor initiates the active Web pages. Games specifications
transfer by informing an I/O processor of will often require a certain level of DirectX
the source and destination of the data and to be implemented before the game can be
the total number of bytes or words to be played.
transferred. The I/O processor then per-
forms the transfer, and informs the central disable To switch off a device or prevent
processor (probably by means of an INTER- the operation of a particular function of a
RUPT) when the transfer is complete. The device or a particular feature of a program.
central processor can continue to operate Compare enable.
during the DMA.
disassembler A program that attempts
directory A FILE in a computer system to translate machine code back into ASSEM-
containing a list of filenames, their loca- BLY LANGUAGE, i.e. it performs the reverse
tions on BACKING STORE, and their size, as function of an ASSEMBLER. It is used as an
well as other information such as creation aid to DEBUGGING. It is only the one-to-one
date, author, date of last access, and FILE relationship between machine instructions
PROTECTION code. A computer system may and assembly language instructions that
have many directories, usually organized in makes this process possible. It does not
a HIERARCHICAL FILE SYSTEM where directo- work with high-level languages.
ries can contain other directories (subdirec-
tories) as well as data files. On a discrete data See computer.
MULTIACCESS SYSTEM each user normally
has a directory, and possibly subdirecto- disk See magnetic disk; optical disk.

59
disk array

disk array A hardware device consisting vice. In such a controlled environment pre-
of several HARD DISKS controlled by a disk cision engineering is possible that gives fast
array controller, which handles all interac- access times and very high recording densi-
tion with the rest of the computer system. ties. A single disk 3.5 inches in diameter
The array is thus a BLACK BOX and the log- can now hold many gigabytes of data.
ical structure it presents to the computer However, hard disks are fragile and must
need not match its physical structure; for be protected from physical damage.
example it can appear to be one large disk. In floppy disk drives the disks are re-
An important use of disk arrays is RAID, a movable and do not require such careful
service that is usually implemented by the protection. Disk plus protective envelope is
disk array controller. fed into the disk drive by hand through a
slot, and is automatically mounted on the
disk cache See cache. rotation mechanism. Rotation speeds are
considerably lower than for hard disk dri-
disk cartridge An obsolete type of HARD ves. The read/write head or heads operate
DISK consisting of a single disk permanently through slots in the envelope. Floppy disks
housed inside a protective plastic cover. A were formerly used extensively on micro-
disk cartridge was used in a specially de- computers but have now largely been su-
signed DISK DRIVE, from which it could be perseded by recordable CDs and DVDs.
removed and replaced by another car- In a disk drive there is usually one
tridge. It was thus an EXCHANGEABLE DISK read/write head per recording surface, ei-
STORE. ther touching it (in the case of a floppy
disk) or very close to it (in the case of a
disk controller A printed circuit board hard disk). The head is normally mounted
containing the electronics to control the on an arm that moves radially (i.e. towards
detailed operation of magnetic disks and and away from the disk center). To read or
carry out requests from the OPERATING SYS- write data, the head is accurately posi-
TEM to read or write data. A single disk tioned by the disk drive over the required
controller can control one or more disks. track, and then waits until the right sector
rotates into place underneath it. When the
disk crash See head crash. head is to write data, it receives an electri-
cal signal coded with the data and converts
disk drive (disk unit) A peripheral de- it into magnetized patterns along the spec-
vice that has a mechanism for rotating one ified sector of a specified track. (The head
or more MAGNETIC DISKS at constant high is an electromagnetic device.) The data is
speed, and devices known as read/write encoded in one of the appropriate disk
heads (plus associated electronics) for writ- FORMATS. For reading data, the head senses
ing and reading data on the spinning the magnetized patterns in the specified
disk(s). Data is recorded on both sides of a sector and produces a corresponding elec-
disk, along concentric tracks in the mag- trical signal.
netic coating. Items of data are stored and A large disk will probably be used to
retrieved by the process of RANDOM ACCESS. store many FILES. The allocation of storage
Two basic types of disk drive are avail- space on the disk for each file is handled
able. One type uses HARD DISKS and is de- automatically by the operating system.
signed for high performance and large
storage CAPACITIES. The other type is de- diskette /diss-ket/ See floppy disk.
signed for low purchase price and uses in-
expensive storage media in the form of disk format See format; magnetic disk.
FLOPPY DISKS.
In disk drives using hard disks, the disks disk pack An obsolete form of disk stor-
are fixed in position and, with the age used in a specially designed DISK DRIVE,
read/write heads and supporting machin- from which it could be removed and re-
ery, are hermetically sealed inside the de- placed by another pack of the same type. It

60
distributed processing
protective disk spindle read/write
mechanism

recording
surface
of disks

read/write
protective disk heads

Disk pack with six disks

was thus an EXCHANGEABLE DISK STORE. It while the term disk drive is restricted to the
was an assembly of identical MAGNETIC rotational mechanism.
DISKS permanently mounted on a single
spindle. The disks were usually 14 inch display 1. To make information visible
(350 mm) hard disks. Their number varied on a screen.
from 5 to 12 per pack. A similar-sized disk 2. The device that enables information –
used for protective rather than recording textual or pictorial – to be seen but not per-
purposes was fitted to the top and bottom manently recorded. The most widely used
of the assembly; in a 6-disk pack there were technology involves a cathode-ray tube
thus 10 recording surfaces. When not (CRT): in most cases the image is formed
mounted on a disk drive the assembly was and changed as a beam of electrons contin-
kept in plastic covers to protect it from ually traces a pattern of horizontal lines (a
damage and dust. The bottom cover was raster) on the screen, as occurs in a domes-
removed just before mounting the pack; tic TV; in some CRT devices the image is
the top cover could only be removed when formed by ‘drawing’ individual lines on the
the pack was mounted. Once the pack was screen, of any length and at any angle.
mounted, the read/write mechanism The CRT display is rapidly being dis-
moved automatically into position and the placed by the flat panel display, a thin
pack was set into rotation. A read/write panel with a FLAT SCREEN that is both more
head was provided for each recording sur- compact and more rugged. Many of these
face. The heads were carried on a single devices use ACTIVE MATRIX DISPLAYS; an-
comblike mechanism that was moved radi- other popular technology is the plasma
ally between the disks. The heads thus all panel (or gas panel) display, where electri-
moved together, and could be positioned cal discharges through a gas form the
over the same track number on each of the image on the panel. See also LCD; LED dis-
recording surfaces. This set of tracks could play.
therefore be written to and read without
moving the heads; the tracks formed and distributed file system A file manage-
were referred to as a cylinder. The ACCESS ment system in which files may be kept on
TIME to related records could thus be mini- several computers connected by a LAN or
mized by writing them in a cylinder. WAN and a number of users may have
shared access to these files.
disk unit A disk drive. The term disk
unit is sometimes used to mean the rota- distributed processing The processing
tional mechanism plus read/write heads of data in a system in which a number of
and associated electronics as a whole, independent but interconnected computers

61
distributed system

can cooperate. The system itself is known DNS See domain name system.
as a distributed system, an example of
which is a LOCAL AREA NETWORK. The doc /dok/ The file extension that identi-
processors involved may be situated at dif- fies a word processing document. It is used
ferent places and are connected by commu- as the default by Microsoft Word for doc-
nication lines. They normally have their ument files.
own peripherals – console, disks, printers –
so that ‘local’ data can be processed and docking station A set of equipment
‘local’ decisions made. Data with a wider consisting of a monitor, a keyboard, and a
application can be exchanged over the power supply into which a laptop can be
communication lines. slid, effectively combining to form a desk-
top computer.
distributed system See distributed pro-
cessing. document Any piece of data created by
a program and saved as a file. The term is
dithering A technique for mixing the used especially of text formatted in some
pixels of available colors to simulate miss- way. Sometimes document information
ing colors in a picture. For example, it is such as the author, date of last change,
used to simulate shades of gray in mono- number of words, etc., is included.
chrome (black and white) pictures. There
are several ways of dithering. The tech- documentation The written informa-
nique is also used in anti-aliasing in order tion describing the operation, structure,
and use of hardware or software. It may be
to make jagged lines appear smoother on
in the form of printed manuals. Alterna-
the screen.
tively it may be held on BACKING STORE and
be accessible from a computer CONSOLE or
DLL (dynamic linked library) A Mi-
TERMINAL; this is called on-line documenta-
crosoft Windows standard for sharing
tion. Software documentation normally in-
code between programs. A DLL file (usu-
cludes a tutorial guide to new users, a
ally given the extension dll) consists of a
reference section, an explanation of error
collection of PROCEDURES and FUNCTIONS.
messages, an installation guide, and per-
Rather than copies of these being incorpo- haps a small detachable summary card.
rated in every program that uses them, a Hardware documentation is similar but in-
single copy is shared between all programs cludes a technical specification and a trou-
and only loaded into MAIN STORE when re- ble-shooting and maintenance-engineers’
quired during execution. manual. Good documentation is crucial to
the success of any computer system.
DLT (Digital Linear Tape) Trademark
A type of TAPE CARTRIDGE that was the tape document object model See DOM.
backup medium of choice for microcom-
puter networks from the mid-1990s. A sin- document reader An INPUT DEVICE that
gle DLT cartridge can hold up to 40 Gb of reads data directly from a paper document
uncompressed data; usually data compres- and feeds it, in coded form, into a com-
sion allows up to 80 Gb to be stored. Its puter. The document reader has to recog-
successor, SDLT (Super DLT), can store nize characters on the document, or to
up to 300 Gb (600 Gb compressed) with sense marks on it. It operates by OCR (opti-
future capacity increases planned. The cal character recognition), MICR (magnetic
DLT format was developed in the 1980s by ink character recognition), or OMR (optical
Digital Equipment Corporation and is now mark reading). The documents can gener-
owned by Quantum Corporation. See also ally be read not only by the input device
LTO. but also by people, and may involve more
than one reading process, for instance
DMA See direct memory access. OCR and OMR.

62
double click

do loop See loop. EPROM in a D-25 connector shell. Pro-


grams that require it will run only while it
DOM /dee-oh-em, dom/ (document object is plugged into the printer port of the com-
model) The specification of the logical puter.
structure of a Web page or other HTML or
XML document in terms that programs do-nothing operation See no-op in-
can use to extract information from it or to struction.
change it. Web pages, etc., are held to con-
sist of various kinds of objects, for example DOS /doss/ (disk operating system) 1. The
text, images, and links. The DOM defines official name for MS-DOS as licensed to
the attributes of each kind of object, how IBM in the 1980s for use on its PCs. DOS
they and the objects themselves can be ma- is now often used as a synonym for MS-
nipulated, and how to describe the objects’ DOS.
relationships to each other. Dynamic 2. Any disk operating system, i.e. an oper-
HTML relies on DOM to change the ap- ating system that supports using disks to
pearance of Web pages dynamically after store data.
they have been downloaded by a user’s
BROWSER. DOS box See MS-DOS.

domain name The human-oriented ver- dot matrix printer A PRINTER that cre-
sion of the address of a network connec- ates each character as an array or matrix of
tion on a TCP/IP network, particularly the dots. The dots are usually formed by trans-
Internet. Domain names are hierarchical ferring ink by mechanical impact. The de-
with parts separated by dots. For example, vice is almost always a CHARACTER
www.nasa.gov is the domain name of the PRINTER, i.e. it prints a character at a time.
US space agency. The highest subdivision It typically has a print head containing 9,
of the domain name is called the domain. 18, or 24 thin rods, known as needles. The
This may identify the type of organization needles are selectively operated as the head
(e.g. .gov for government, .com for com- moves along the line, thus building up each
mercial companies, .edu for educational es- character as required. In many printers the
tablishments, or .org for noncommercial number of characters per inch (cpi) can be
organizations). It may also identify the varied. Generally between 100–1000 char-
country in which the organization is lo- acters per second can be printed, with
cated (e.g. .uk for United Kingdom or .fr slower speeds giving better quality output.
for France). Each domain name has an as- Dot matrix printers can print a large se-
sociated unique IP ADDRESS, to which it is lection of shapes and styles of letters and
translated by DNS. digits, and may also print Arabic charac-
ters or the idiograms of oriental languages.
domain name system (DNS) A cooper- In addition to characters it is possible to
ative Internet service that provides a data- produce diagrams, graphs, etc.
base of host and domain names. DNS is
used to match domain names to their asso- dot pitch The measure in millimeters
ciated IP ADDRESSES. When a request is (the smaller the number the better) of the
made to a particular Web site it is sent to sharpness of a monitor display. Most CRT
the nearest DNS server, which, if it cannot monitors will have a dot pitch of between
translate the name, will ask another DNS .25 and .28. The difference between a dot
server, and so on. On finding a match the (as in dot pitch) and a pixel is that a pixel
IP address is returned to the browser, is mapped to dots on the screen. When a
which then tries to connect to that IP num- monitor is set to lower resolutions, one
ber. pixel encompasses many dots.

dongle /dong-găl/ An anti-piracy device double click To press and release a


for commercial software consisting of an mouse button twice in quick succession

63
double-length word

with the CURSOR pointing at an ICON or draft quality A printing mode available
other object on the screen. In general dou- on most printers where quality of output is
ble-clicking initiates the default action for sacrificed for increased printing speed.
that object: programs are executed, data
files are opened in their associated applica- drag To hold the mouse button and move
tion, etc. Compare click. the mouse pointer to a new position. This
can be used to highlight text in a document.
double-length word See precision.
drag and drop To move or copy an ob-
double precision See precision. ject using the mouse by pointing at the ob-
ject, holding down the mouse button,
downlink The transmission link from a moving the mouse pointer (and the object)
communications satellite to a ground sta- to the new location, and then letting go of
tion. Compare uplink. the mouse button.

download /down-lohd, n. down-lohd, vb./ DRAM /dee-ram/ See dynamic RAM.


To send programs or data from a central or
controlling computer to a remote terminal, driver A software program that acts as a
client computer, or other device, such as a translator between an application and
printer. A common example is to down- some piece of hardware. It contains infor-
load files from the Internet onto a user’s mation needed to recognize and control the
PC. Compare upload. device that the computer and the programs
using it do not already have. In Windows-
downloadable font A SOFT FONT that is based computers a driver is often packaged
stored on a disk and can be downloaded as a dynamic link library (DLL) file. In Mac-
(sent) to a printer’s memory. Download- intosh computers most hardware devices
able fonts are often used with laser print- do not need drivers.
ers.
drum plotter See plotter.
downtime /down-tÿm/ The time, or the
percentage of time, during which a com- dry run Execution of a program for pur-
puter is not available for use. If the com- poses of checking that the program is be-
puter has been taken out of service for having correctly rather than for producing
regular PREVENTATIVE MAINTENANCE, then useful results. The results of execution are
this is scheduled downtime. If the com- compared with the expected results. Any
puter breaks down and has to be taken out discrepancies indicate an error of some
of service for repairs, then this is unsched- sort, which must be removed before the
uled downtime. program is put into productive use.

downward compatibility See back- DSL (digital subscriber line) A method


ward compatibility. for moving data over private telephone
lines. A DSL uses copper wires similar to
DP See data processing. those used by regular telephone lines but is
much faster than a standard telephone con-
dpi (dots per inch) A measurement of the nection. A DSL circuit must be configured
resolution of a RASTER GRAPHICS image or to connect two specific locations in a simi-
the maximum number of dots per inch a lar way to a leased line. See also ADSL.
printer can print, a monitor display, or a
scanner resolve. A 600 dpi printer can print DSP See digital signal processor.
600 × 600 or 360 000 dots on one square
inch of paper. Higher dpi ratings give bet- DTD (document type definition) In
ter quality but lead to larger files and SGML and XML, a part of a document that
longer printing times. defines its structure, or a separate file that

64
dump

defines the structure of a set of similar doc- dual in-line memory module See
uments. It uses a special syntax to detail DIMM.
such matters as which ELEMENTS are al-
lowed in the document, in what order they dual in-line package See DIP.
must appear, and how many of each type
can be used together. HTML, for example, is dumb terminal See terminal.
defined in SGML by a DTD detailing the
structure of Web pages. Documents that dump To copy or make a copy of some
are correctly structured are said to con- or all of the contents of a storage device at
form to their DTD, and DTDs can be used a particular instant in order to safeguard
to process or display any conforming doc- against loss of data, to check for errors in a
ument using appropriate software. In program, or for some other purpose. The
XML, DTDs are being superseded by data copied is called a dump. For example,
SCHEMAS. The abbreviation DTD is some- in a system handling large numbers of
times used for ‘document type declaration’ users’ files stored on magnetic disks, the
– a statement at the start of the document contents of the disks may be dumped peri-
assigning the document type definition. odically on magnetic tape. This provides a
reference copy of the data in the event of,
DTP See desktop publishing. say, accidental overwriting or damage of
the disks. Such a dump, which can be used
DTV See desktop video. to restore the data automatically, acts as a
BACKUP. Again, when a system CRASH oc-
dual-core processor A CHIP that con- curs, a human-readable version of the con-
tains two MICROPROCESSORS. A computer tents of main store and possibly backing
equipped with a dual-core processor can store might be produced. This can be stud-
perform MULTIPROCESSING. Functionally ied to try and determine the immediate
equivalent to two single-core chips, a dual- cause of the crash. Dumping can also be
core processor is faster, uses less power, performed at some selected point in the ex-
and takes up less space. Dual-core proces- ecution of a computer program, usually
sors began to appear in mainstream PCs in during TESTING or DEBUGGING of the pro-
2005 and are expected to be the forerun- gram, or may occur when a program
ners of multi-core processors. crashes or is aborted.

DSL TYPES

Type Description Maximum Maximum Maximum Lines Phone


send speed receive distance needed support
speed at same
time
ADSL Asymmetric DSL 800 Kbps 8 Mbps 5500 m 1 yes

SDSL Symmetric DSL 2.3 Mbps 2.3 Mbps 6700 m 1 no

HDSL High bit-rate 1.54 Mbps 1.54 Mbps 3650 m 2 no

ISDL Integrated Services 144 Kbps 144 Kbps 10 700 m 1 no


Digital Network
DSL

MSDSL Multirate 2 Mbps 2 Mbps 8800 m 1 no


Symmetric DSL

RADSL Rate Adaptive DSL 1 Mbps 7 Mbps 5500 m 1 yes

65
duplex transmission

DVD STORAGE COMPARISONS

Number Number of Capacity Movie time (approximate)


of sides layers

1 1 4.7 Gb 2 hours
1 2 8.5 Gb 4 hours
2 1 9.4 Gb 4.5 hours
2 2 17.0 Gb more than 8 hours

duplex transmission /dew-pleks/ (full-du- or a program is running. For example, a


plex transmission, FDX) Transmission dynamic allocation of a resource can be
of data between two endpoints, the data made while the system is running, and dy-
being able to travel in both directions si- namic RAM is a type of semiconductor
multaneously. Duplex transmission is used memory that requires its contents to be re-
over telephone networks and terminal freshed periodically since they degrade
communication lines, and any other situa- with time.
tion in which it is desirable that both ends 2. Taking place during the execution of
be allowed to transmit at once. Compare a program, as happens with a dynamic
half-duplex transmission; simplex trans- dump.
mission. Compare static.
DVD The successor of the CD, with a dynamic data exchange See DDE.
far greater storage capacity. The disks can
have 4 layers, 2 on each side, with capaci- dynamic HTML (dynamic hypertext
ties ranging from 4.7 Gb for a single-layer
mark-up language; DHTML) An ex-
single-sided disk to 17 Gb for a double-
tended version of HTML designed to add
layer double-sided disk. Audio, video, and
additional animation features and more
computer data can be recorded. Disks of
user interactivity to Web pages. It involves
this type have enough capacity to hold full-
scripts in JavaScript or VBScript run on the
length feature films. DVDs can be read-
only, recordable, and rewritable in the user’s computer to change elements on the
same fashion as CDs. Originally ‘DVD’ screen and respond to user input.
was an abbreviation for digital video disk,
but later also for digital versatile disk. Be- dynamic link library See DLL.
cause no consensus was reached DVD is
now the official name of the format and dynamic RAM (DRAM) For years the
not an abbreviation for anything. most common type of relatively inexpen-
sive main RAM. Dynamic refers to the
DVI See digital video interface. memory’s method of storage, basically
storing the charge on the capacitor, which
dyadic operator (binary operator) See leaks the charge over time and must be re-
operator. freshed about every thousandth of a sec-
ond. It is slower than SRAM.
dynamic 1. Changing or capable of
being changed over a period of time, usu- dynamic Web page See server-side
ally while a system or device is in operation scripting.

66
E

Easter egg An unexpected message, pic- are bipolar in nature and are all character-
ture, extra function, etc., hidden in a pro- ized by very high SWITCHING SPEEDS, but
gram and designed to appear when a have high power requirements and a low
combination of circumstances occur, for PACKING DENSITY compared with CMOS. See
example pressing a particular set of keys. also TTL.
Easter eggs are sometimes put in applica-
tion programs for amusement by program- e-commerce (e-business) Business activ-
mers. ities such as advertising, buying and sell-
ing, and the servicing of customers
EBCDIC /eb-see-dik/ (extended binary conducted through the Internet.
coded decimal interchange code) A CODE
developed by IBM and used for the inter- edge connector Part of a PRINTED CIR-
change of data between equipment manu- CUIT BOARD (PCB) where a number of the
factured by or associated with IBM. metallic conducting tracks meet the edge of
EBCDIC encoding produces coded charac- the board, at right angles, to form the male
ters of 8 bits, and hence provides 28, i.e. half of a plug and socket. The tracks are
256, different bit patterns. These 256 char- broadened, thickened, and usually gold-
acters form a CHARACTER SET, consisting of
plated to provide a good electrical contact;
letters, digits, special characters such as
the PCB itself provides the necessary
punctuation marks, and control charac-
strength and rigidity. A single edge connec-
ters.
tor may have a hundred or more individual
connections, half on each side of the board.
echo To reflect transmitted data back to
The female half of the connector, the
its point of origin. (As in ordinary speech
the word is also used as a noun.) For ex- socket, consists of a number of sprung
ample, characters typed on a keyboard will metal contacts, embedded in plastic, which
not appear on the display unless they are make contact with the corresponding
echoed. See also echo check. tracks on the PCB when the two are
pressed together.
echo check A way of establishing the
accuracy achieved during the transfer of EDI (electronic data exchange) A stan-
data between, say, devices in a computer dard format for exchanging business data
system or computers in a NETWORK. When using computer systems; for example, sales
the data is received it is stored and is also information, orders, and invoices.
sent back – echoed – to its point of origin.
The returned data is compared with the edit To create or change text, graphics,
original data and errors can then be de- etc., in a file by deleting, moving, copying,
tected. See also check. adding, formatting, etc. See also word pro-
cessing.
ECL (emitter-coupled logic) A family of
LOGIC CIRCUITS that are all fabricated with editor See text editor; link editor.
a similar structure by the same INTE-
GRATED-CIRCUIT techniques. The circuits EDO RAM (extended data out dynamic

67
EDP

random access memory) A type of fast EIDE is preferred to SCSI in many areas.
DYNAMIC RAM used in the 1990s. Today virtually all PCs have two EIDE
controllers built into the motherboard and
EDP Electronic data processing. See so can support up to four EIDE devices.
data processing.
EISA /ee-să/ (extended industry standard
EDSAC /ed-sak/ Electronic Delay Stor- architecture) A 32-bit data path com-
age Automatic Calculator. See first genera- puter expansion bus. This maintained ISA
tion computers. standards but gave additional features. It is
now obsolete.
EDVAC /ed-vak/ Electronic Discrete
Variable Automatic Computer. See first electric cable See coaxial cable; twisted
generation computers. pair; ribbon cable.

EEPROM /ee-ee-prom/ (electrically electronic commerce See e-commerce.


erasable programmable read-only
memory) A type of rewritable read-only electronic data interchange See EDI.
memory in which the chips can be erased
with electrical signals, rather than ultravio- electronic filing A computer-based sys-
let light as in the case of EPROMs. EEP- tem for the storage, cataloging, and re-
ROMs do not have to be removed from the trieval of documents. It plays a major role
computer to be erased but do have to be in an ELECTRONIC OFFICE. The ‘objects’ in
changed in their entirety. They have a lim- an electronic filing system are usually
ited life. A FLASH MEMORY is a special form stored on magnetic disk and can be orga-
of EEPROM. See also EPROM. nized using a variety of methods. They may
be letters, complex reports, charts, graphs,
EFTPOS /eft-pos/ (electronic funds trans- pictures, etc., which are created, manipu-
fer at point of sale) A system that debits lated, or deleted as required.
buyers’ and credits sellers’ bank accounts
instantly. Point-of-sale terminals are con- electronic funds transfer The use of
nected to the host computers of credit-card computers to bring about payments be-
companies or banks. When a transaction is tween individuals and/or organizations
needed calls are initiated automatically to such as banks or companies.
the host computer for verification and au-
thorization and responses are sent back to electronic mail See e-mail.
the terminal.
electronic money See e-money.
EGA (enhanced graphics adapter) A
video standard for IBM PC compatible Electronic Numbering See ENUM.
computers introduced in 1984. It retained
compatibility with the old CGA but with electronic office A computer-based sys-
more graphics modes, having a resolution tem designed for office tasks. This may in-
of up to 640 × 350 pixels with 16 colors. It volve the use of ELECTRONIC FILING, WORD
was superseded by the VGA standard. PROCESSING, DATABASES, COMPUTER GRAPH-
ICS, E-MAIL, and TELECONFERENCING.
EIDE (extended IDE) The popular name
for ATA (Advanced Technology Attach- electronic publishing The publication
ment), a series of hard-disk interfacing of information by means of electronic
standards for PCs. Features include logical media such as CD-ROM, DVD, or com-
block addressing, native support for CD- munications networks, such as the Inter-
ROM, tape, and floppy drives, fast transfer net.
rates, support for hard drive sizes, and
plug-and-play. Because of its lower cost, electronic shopping Buying and paying

68
emulation

for goods and services through the Inter- embedded Describing a command, code,
net. See also e-commerce. file, etc., that is inserted into another piece
of data while remaining distinct from it in
element In an SGML or XML document, a some way. For example, when a spread-
‘tagged’ section that indicates a specific sheet is embedded in a word-processing
type of content. In this book, for example, document, it is printed as if it were part of
the headword of each entry is contained in the word-processing document but is still
an ‘hw’ element, which for this entry is edited using a spreadsheet rather than a
keyed <hw>element</hw>. Elements can word-processing application.
contain text, other elements, or both.
embedded computer system Any sys-
elevator The small movable box in a tem that uses a computer as a component
scroll bar that, when dragged with the dedicated to a particular task. Examples
mouse, alters the part of the text or image are programmable washing machines, ar-
that is displayed on the screen. cade video games, and satellite navigation
systems. It is not possible for the operator
e-mail (electronic mail) Messages sent of a washing machine to reprogram it to
between users of computer systems, the play games, whereas a general-purpose
computer systems being used to transport computer system can perform a series of
and hold the messages. Sender and recipi- unrelated tasks under the control of the op-
ent(s) need not be on the same computer to erator.
communicate, or be ON-LINE at the same
time. The mail-handling program will have e-money (electronic money; cybercash)
Money exchanged through the Internet.
facilities for typing in messages, selecting
one or more recipients, and checking for
incoming mail. It will also be able to reply
emoticon /i-moh-ti-kon/ A sequence of
text-based characters often used in e-mails
to messages, forward copies of incoming
and online chat. When viewed sideways
messages to other people, and store copies
they are supposed to represent facial ex-
of sent and received messages for future
pressions to give the reader a sense of how
reference or action. A single message may
a writer is feeling. For example :-) (known
possibly combine text, graphics, and other
as a smiley) is used to show the writer is
forms of information and can contain one happy or has just written something in-
or more data files as attachments. It is also tended to be humorous, while :-( shows
possible to send e-mail using certain types that the writer is sad.
of cellular telephone. See illustration over-
leaf. empty string (null string) A STRING with
no characters. Not all programming lan-
e-mail marketing The use of E-MAILS as guages cater for empty strings, and the con-
a direct-marketing tool. Its main advantage cept, although useful, should be treated
is that is it very cheap since a single e-mail with care.
can be sent to thousands of recipients. Each
e-mail therefore does not have to attract emulation The imitation of all or part
much extra business to justify its cost. It is of one computer system by another com-
easy to analyze an e-mail’s effectiveness by puter system such that the imitating system
measuring such responses as CLICK executes the same programs, accepting
THROUGHS. However, many recipients find identical data and producing identical re-
such e-mails highly irritating, especially sults (but not necessarily in the same way),
when they are unsolicited (see spam), and as the system imitated. A device or pro-
software has been developed to filter them gram used in producing an emulation is
out. The use of e-mail marketing tech- called an emulator. A particular emulation
niques for PHISHING and other types of could be used as a replacement for all or
fraud has given it a bad reputation. part of the system being emulated, and fur-

69
user creates
a message
which may contact ISP
have various
attachments

acknowledge
CLIENT EM AIL SOFTWARE

I have message
to send

SM TP SERVER at ISP
send it now
or
too busy, send it later

send message
please confirm
receipt

confirmation

DOMAIN send message


NAME
looks up domain SERVER
name to find the recipient’s
email server and works out
router
the best path for the mesage
various routers
and gateways on
the Internet

router
other gateway
recipient’s
CLIENT EM AIL SOFTWARE

DNS’s
SMTP router
SERVER

recipient
logs onto
POP the POP
SERVER server and
asks for
any mail

E-mail flowchart

70
entry point

thermore could be an improved version. contrasted with the FRONT END, which in-
For example, a new computer may emulate teracts with the user. For example, a data-
an obsolete one so that programs written base engine is the part of a database
for the old one will run without modifica- application that manages the database it-
tion. self; it might be used with a variety of front
In contrast with a SIMULATION, an emu- ends, each tailored to the needs of a specific
lation is usually a realistic imitation; a sim- application. (Often, the engine is a DBMS
ulation may be no more than an abstract running on a server, while each client com-
model. puter runs its own front end.) Similarly,
Web search engines communicate with
enable To switch on a device or to select users directly via an HTML front end but
and activate a particular function of a de- can also be used to provide the search fa-
vice or a particular feature of a program. cility for other Web sites.
Compare disable.
enhanced IDE See EIDE.
encapsulated PostScript See EPS.
ENIAC /en-ee-ak/ Electronic Numerical
encapsulation 1. In object oriented pro- Integrator and Calculator. See first genera-
gramming, the inclusion within a program tion computers.
object of all the resources needed for the
object to function and interact with the rest enter key See return key.
of the program, which treats the object as
a BLACK BOX. entity In an SGML or XML document, a
2. In telecommunication, the inclusion of means of representing of an object that is
one data structure within another so that not simple text. Entities have the form
the first data structure is hidden for the &entity; and are often used to represent
time being. For example, in layered proto- non-ASCII characters; for example, the en-
cols each layer adds header information to tity &alpha; often represents a Greek
the protocol data from the previous layer. alpha. Entities thus allow SGML and XML
documents to use only ASCII characters,
encoder A means by which data is con- which makes them extremely portable. In
verted into a coded form. It may be a hard- the above example the correct character
ware device, such as a KEYBOARD, or a piece for a Greek alpha would only have to be
of software. See also code. substituted for the entity when the docu-
ment was typeset or displayed on screen in
encoding See code. a WYSIWYG form. Entities also have
other uses: for example they can be simple
encryption /in-krip-shŏn/ See cryptog- shortcuts that expand into lengthy se-
raphy. quences of text (e.g. &sgml; could be a
keyboarding shortcut for ‘Standard Gener-
END /ee-en-dee/ See Basic. alized Markup Language’), or they can
represent other files that SGML- or XML-
end user The person for whom a hard- aware software will insert into the docu-
ware or software product is designed as op- ment in place of the entity.
posed to the developer, installer, and
servicer of the product. entry point (entry) The point to which
control is passed when a program or a sec-
Energy Star A symbol attached to sys- tion of a program – a PROCEDURE, SUBROU-
tems and components with low power con- TINE, or FUNCTION – is called. The entry
sumption. point is the first instruction in the program
or program section to be executed (or more
engine (back end) The part of an appli- specifically is the ADDRESS or LABEL of this
cation that manages and controls data, instruction). There may be more than one

71
ENUM

entry point in a program or program sec- tion of the size of the output (the bounding
tion. box). This extra information allows EPS
files to be treated as graphics files by DTP
ENUM (Electronic Numbering) A pro- software. Their content is incorporated in
tocol, defined in RFC 2916 (2000), that al- a normal PostScript file for printing, type-
lows telephone numbers to be mapped to setting, etc.
Internet URLS. It is used in VOIP.
EQ gate See equivalence gate.
environment 1. The combination of
hardware and software in a computer. equivalence A LOGIC OPERATION com-
2. A collection of system- and user-speci- bining two statements or formulae, A and
fied settings that can be used to define the B, in such a way that the outcome is false
context in which a program operates. Each when either A or B is true but not both;
setting is held in a separate named environ- otherwise the outcome is true. The TRUTH
ment variable, whose value can be exam- TABLE is shown in the diagram, where the
ined by the program. For example, the two truth values are represented by 0
current USERNAME might be held in an envi- (false) and 1 (true). The operation can be
ronment variable called ‘USERNAME’, al- written as A ≡ B.
lowing the program to run differently
depending on who is using it.

EPOS /ee-pos/ (electronic point of sale) A B output/outcome


A system that updates stock and cash
records electronically direct from data ac- 0 0 1
quired by the till operation. 0 1 0
1 0 0
EPROM /ee-prom/ (erasable programma- 1 1 1
ble read-only memory) A type of SEMI-
Truth table for equivalence gate and
CONDUCTOR MEMORY that is fabricated in a equivalence
similar way to ROM. The contents, how-
ever, are added after rather than during
manufacture and then if necessary can be equivalence gate (EQ gate) A LOGIC
erased and rewritten, possibly several GATE whose output is low only when one of
times. In the nonprogrammed state the its (two or more) inputs is high and the rest
contents are all usually set at binary 1. The are low; otherwise the output is high. It
desired contents are obtained electronically thus performs the operation of EQUIVA-
by a device known as a PROM program- LENCE on its inputs and has the same TRUTH
mer, which sets selected elements to bi- TABLE. The truth table for a gate with two
nary 0. The contents are erased (i.e. reset to inputs (A, B) is shown, where 0 represents
binary 1) normally by exposure to ultravi- a low signal level and 1 a high level. See
olet radiation, and can then be repro- also nonequivalence gate.
grammed. It is only outside a computer
that an EPROM can be programmed. erasable PROM See EPROM.
Within a computer the contents cannot be
changed; they can only be read. See also erase To delete data permanently from a
PROM; EEPROM. storage medium in such a way that it can-
not be recovered.
EPS (encapsulated PostScript) An exten-
sion to the PostScript page-description lan- ergonomics /er-gŏ-nom-iks/ The science
guage to handle embedded material, of how natural and easy things are to use.
usually images. An encapsulated PostScript An ergonomically designed mouse or key-
file is similar to a normal PostScript file ex- board will cause less strain and stress to the
cept that the EPS file contains a specifica- user.

72
error message

error A discrepancy between the value structed by an encoder using a specific rule.
or condition that is calculated, observed, A decoder at the other end of the channel
or measured and the value or condition detects any departure from this construc-
that is known to be accurate or correct, or tion, i.e. any errors, and automatically cor-
that has been specified as being accurate or rects them – with a high probability of
correct, or that was simply expected. In success. It is possible for errors to be cor-
computing, errors can be caused by some rected by an ERROR-DETECTING CODE, by a
failure in the hardware of the system or by request for the retransmission of the af-
some condition occurring in the software. fected data. Error-correcting codes are
Errors may arise, for example, as data is more complex and hence more costly to
being transferred to or from magnetic disk, implement than error-detecting codes but
i.e. as data is being written or read. They reduce the necessity for retransmission.
may also arise during the transfer of data
between two computers over a network. error-detecting code Any of a variety
Errors may be caused by a flaw in the stor- of CODES used to check data for certain
age medium, by a fault in a device, or by kinds of ERRORS that may have occurred,
NOISE in a communication channel. A bi- say, during transfer of the data or due to a
nary 1 may then be incorrectly written, writing or reading process. The informa-
read, or transmitted as a binary 0, or a bi- tion is encoded in such a way that a de-
nary 0 as a binary 1, producing an error coder can subsequently detect – with a high
in the data. The detection, handling, and probability of success – whether an error
possible correction of such errors is an im- has arisen. A fixed number of bits, k, is
portant aspect of computing. See also error- normally taken into the encoder at a time,
detecting code; error-correcting code. and then output as a codeword consisting
In programming, errors may arise be- of a greater number of bits, n. Each code-
cause the program fails to obey the SYNTAX word in a particular code is constructed
of the programming language, i.e. the pro- following a specific rule. The decoder will
gram breaks one of the rules defining how subsequently take in n bits at a time and
characters and sequences of characters can output k bits. On each codeword the de-
be combined. These are known as SYNTAX coder performs a CHECK for errors. If an
ERRORS and are normally detected when error is detected then generally the sending
the program is compiled. Other program- device is requested to retransmit the af-
ming errors may not become apparent fected set of bits. See also acknowledg-
until the program is executed. These are ment; error-correcting code.
called RUN-TIME (or execution) errors, and
may arise from, say, attempted division by error diagnostics Information that is
zero or from OVERFLOW. Logical errors are presented following the detection of some
another type, occurring because the logic condition causing an ERROR, for example
or design of the program is incorrect; a after an attempt to execute instructions in
JUMP to the wrong instruction is an exam- a program that are invalid or that operate
ple. Logical errors can arise if the problem on illegal data. The information is mainly
that the program is designed to solve is not to assist in identifying the cause of the
fully understood, so that the wrong ALGO- error. Error diagnostics can be produced,
RITHM is selected or written. Yet again, er- for instance, by the COMPILER, and the in-
rors may arise from the ROUNDING or formation would then generally concern
TRUNCATION of numbers, producing round- SYNTAX ERRORS. Other kinds of errors are
ing or truncation errors. detected at run time. In this case the error
diagnostics may be produced by a RUN-
error-correcting code Any of a variety TIME SYSTEM. See also debugging.
of CODES used to correct ERRORS that occur,
for example, during the transfer of data. error message A message that reports
The data is sent along a channel as a coded the occurrence of an ERROR. There may be
signal, with each element of the code con- some attempt to diagnose the cause of the

73
error rate

error. The message appears on a VDU sions are Excel 2003 (Windows) and Excel
screen or is stored in an error file. 2004 (Macintosh). Excel’s early success
was important in establishing Microsoft as
error rate A measure of the proportion an applications developer and it is now the
of ERRORS occurring in data transfers to or most widely used spreadsheet application.
from a magnetic disk or magnetic tape or Excel forms part of Microsoft OFFICE.
in data transmissions along a communica-
tion line. The error rate of, say, a magnetic exchangeable disk store (demountable
tape system is usually given as the number disk) An obsolete disk storage medium –
of bits or bytes of data transferred per either a DISK PACK or a DISK CARTRIDGE –
error, e.g. 1 error in 1014 bits (often ex- that could be removed from a DISK DRIVE
pressed as an error rate of 10–14). The error and replaced by another of the same type.
rate of a communication line may be ex- The store could be mounted on other disk
pressed as the number of bits transmitted drives of appropriate design.
per error, e.g. 1 error per 105 bits. Since er-
rors tend to come in bursts during trans- exclusive-OR gate (XOR gate) See
mission, the error rate is sometimes given nonequivalence gate.
as the percentage of error-free seconds.
execute To carry out a MACHINE IN-
escape key A keyboard key that when STRUCTION or a computer PROGRAM. The
depressed sends the escape character to the process is described as execution. A pro-
computer. This is often used in applica- gram executes from the time that it is
tions to negate the previously initiated ac- started until either it completes its task and
tion, to go back one level in the menu returns control to the OPERATING SYSTEM, it
structure, or to exit the program. encounters an error whose severity pre-
vents it from continuing, or it is aborted by
e-text (electronic text) A text-based the user. See also fetch-execute cycle; con-
work, such as a journal or book, that is trol unit.
available for reading on-line or that can be
downloaded and read off-line. execution See execute.

Ethernet /ee-th’er-net/ A type of local execution error See run-time error.


area network (LAN) using a bus topology,
developed by Xerox in 1976, then refined executive See supervisor.
by Dec and Intel to form the standard IEEE
802.3. Data to be transmitted is split into exit An instruction in a program or PRO-
packets. Standard Ethernet runs at 10 GRAM UNIT whose execution by a computer
Mbps (10 million bits per second), fast Eth- causes control to be transferred away from
ernet at 100 Mbps, and Gigabit Ethernet at that program or program unit. It follows
1000 Mbps. 10 Gigabit Ethernet, which that to exit from a program or program
runs at 10 000 Mbps, is now coming into unit is to transfer control away from that
use. program or program unit. A return in-
struction is an exit that returns control to a
ETX/ACK /ee-tee-eks ak/ See flow con- specified instruction in the program that
trol. originally called the program or program
unit.
even parity See parity check.
expansion card (expansion board; add-in
Excel (Microsoft Excel) Trademark A card) A PRINTED CIRCUIT BOARD that can
SPREADSHEET application developed by Mi- be plugged into an existing printed circuit
crosoft. First released for the Macintosh in board within a microcomputer in order to
1985 and for Windows in 1987, it has been improve the performance and capability of
upgraded several times and the current ver- the computer. An expansion card is in-

74
extranet

serted into a special expansion slot; several 4


** (used for example in Fortran). 2 can
slots are usually provided. The cards are thus be written as 2  4 or 2**4. In ORDER
made either by the computer manufacturer OF PRECEDENCE, exponentiation is per-
or by specialist manufacturers, and may formed before multiplication, division, ad-
supply a particular need or offer a range of dition, and subtraction. Thus
functions. 3  2 + 5 = 32 + 5 = 14
Memory cards provide additional mem- To indicate 32+5, it would be necessary to
ory (up to the maximum a computer can use brackets, i.e.
handle). Graphics cards give a faster dis- 3  (2 + 5)
play speed, greater resolution, and more
colors than provided by default. Interface expression A programming construct
cards are used for communications involv- where the values of one or more OPERANDS
ing MODEMS, BROADBAND, or LOCAL AREA are altered or combined by OPERATORS or
NETWORKS. A multifunction card provides FUNCTIONS to yield (or return) a single
a range of functions on one circuit board. value. This value is then generally used in
some way, being output, assigned to a
expert system A computer program or VARIABLE, or forming a PARAMETER of a
system based on knowledge acquired from function or PROCEDURE. The order in which
experts and used, for example, to assist in operators are applied in an expression is
medical diagnosis, mineral prospecting,
determined by the way the expression is
and fault finding. The programs are pro-
constructed and by the rules of the pro-
duced by means of techniques developed in
gramming language being used.
the field of ARTIFICIAL INTELLIGENCE for
problem solving, etc.
extended ASCII See ASCII.
exponent See exponentiation; floating-
point notation.
extended precision See precision.

exponentiation /eks-pŏ-nen-shee-ay- extension The file format identification


shŏn/ The operation of raising a number characters at the end of a filename. For ex-
or algebraic expression to a power, i.e. of ample, the name file.txt has the extension
multiplying that number or expression by ‘txt’ indicating a text file. A number of
itself a given number of times. The com- standard extensions are in use. MS-DOS
mon arithmetic notation for exponentia- limited extensions to 3 characters, but
tion is An, where the superscript n indicates modern operating systems (including Win-
the number of times A is multiplied by it- dows) generally allow more.
self. The symbol n is the exponent of A,
and A is said to be raised to the power n. external modem A MODEM housed in
For example, its own casing and connected to its com-
24 = 2 × 2 × 2 × 2 = 16 puter by a cable, usually via an RS232C or
The value of 21 is 2; the value of 20 is taken USB interface. Compare internal modem.
to be 1. Exponents are not restricted to in-
tegers but may be fractional or negative. extranet A private network that uses In-
Exponentiation is supplied in some ternet protocols to share part of a busi-
form in most programming languages. It ness’s information and operations with
is represented by means of an ARITHMETIC customers, suppliers, and so on. An ex-
OPERATOR. The most common representa- tranet can be regarded as an extension of a
tions are  (used for example in Basic) and company’s INTRANET.

75
F

failure Termination of the normal oper- exercise or may involve the construction of
ation of some portion of a computer sys- an experimental or prototype version. It
tem, or of the whole system. A failure is the may concentrate on specific areas or deci-
result of a FAULT. The mean time between sions where the feasibility is questionable
failures (MTBF) is often used as a measure or the potential risk is greatest.
of the RELIABILITY of a computer system.
feed See Web feed.
FAQ /fak/ (frequently asked question) A
list of questions about the basic points of feedback The use of part of a system
some subject, together with answers. FAQs output as an input to the same system,
are often included in hardware and soft- sometimes intentional and at other times
ware documentation, and on the Internet unwanted. This term usually applies to
they are provided in specialized news- analog rather than digital computing. It is
groups to help new subscribers or to give used as a form of correction opposing a
general information on Web pages. change and is then called negative feed-
back. Positive feedback reinforces changes
FAT /eff-ay-tee/ See file allocation table. and can cause instability and other prob-
lems.
father file See master file.
Ferranti Mark I /fĕ-ran-tee/ See first
fault An accidental condition that pre- generation computers.
vents some portion of a computer system
from performing its prescribed function. It fetch To locate and load a MACHINE IN-
usually causes a FAILURE, although it is pos- STRUCTION or item of data from main store.
sible for a system to be FAULT-TOLERANT. See also fetch-execute cycle; control unit.

fault-tolerant system A computer sys- fetch-execute cycle (instruction cycle)


tem that is capable of providing either a The two steps of obtaining a MACHINE IN-
full or a reduced level of service in the event STRUCTION from main store and carrying it
of a fault. For example, in a fault-tolerant out. The fetch-execute cycle is under the di-
system if a disk were to develop a faulty rection of the CONTROL UNIT and is re-
track, then one of a number of spare tracks peated for every instruction.
would automatically be brought into use in
its place with minimum impact on the fiber optics transmission TRANSMIS-
overall performance of the system. SION of data using special glass (or plastic)
fibers, known as optical fibers. An optical
FDX See duplex transmission. fiber is very thin, flexible, and is made of
very pure material that absorbs only a tiny
feasibility study A study carried out be- proportion of the light passing through it.
fore development of a computerized sys- It is constructed in such a way that light
tem in order to establish that the proposed can travel down the length of the fiber
system is possible, practical, and can serve (which can exceed several miles) with very
a useful purpose. It may be a purely paper little loss through the walls. This is

76
file

plastic buffer
coating

transmitter
optical
cladding
material

thin glass light signal 1


core
light signal 2

cross section of a single optical fiber total internal reflection in an optical fiber

Fiber optics

achieved by making the refractive index of tains a fixed or variable number of letters,
the optical fiber vary across its diameter: it digits, or other characters.
is lowest on the outside of the fiber and in- 2. A portion of a MACHINE INSTRUCTION. It
creases either smoothly or in one or more contains a coded representation of, say, the
steps towards the center. (The refractive operation to be performed or the address
index of a medium is a measure of the ex- of the operand or operands.
tent to which light bends on entering that
medium.) The light is thus made to snake FIFO /fÿ-foh/ (first in first out) See
or to zigzag down the center of the fiber. queue.
A simple fiber optics transmission sys-
tem consists of a transmitter with a light fifth generation computers The types
source (such as a laser), a receiver with a of computer currently under development.
light detector, and an intervening optical The features are still conjectural but point
fiber. An electrical signal carrying the data toward the ‘intelligent’ machine. See also
to be transmitted is fed to the transmitter first, second, third, fourth generation com-
puters.
and causes the light emitted by the source
to be modulated, i.e. encoded with the data
fifth generation language A type of
in some way (see modulation); normally
programming language that expresses a
the light is emitted as a sequence of pulses.
problem to be solved in terms of the logical
The light signal enters and travels along the relationships between and the constraints
optical fiber, and at the other end is de- on the elements of the problem. Such lan-
tected and converted back into the original guages remove entirely the need for the
electrical signal. user to specify an ALGORITHM to solve the
In fiber optics transmission a sheaf of problem, and so carry further the abstrac-
optical fibers is used so that many signals tion already visible in FOURTH GENERATION
can be carried at the same time. Optical LANGUAGES.
fibers have become cost-competitive with
COAXIAL CABLE, with the advantages of file A named collection of information
having a much greater data-carrying ca- held temporarily or permanently on mag-
pacity, much lower signal loss, immunity netic disk, CD, DVD, tape, etc. The file-
to electrical interference, and no signal in- name is stored in a DIRECTORY and is used
teraction between the fibers. to identify the file to the OPERATING SYSTEM
of the computer. The details of how a file is
fiche /feesh/ (microfiche) See COM. stored are handled by the FILE SYSTEM. Files
may hold data, programs, text, or any
field 1. A portion of a RECORD. It con- other information, and can therefore be de-

77
file allocation table

scribed as DATA FILES, PROGRAM FILES, etc. file attribute A property of a file, such
They can also be broadly classified as MAS- as whether the file is hidden, read only, or
TER FILES, TRANSACTION FILES, or REFERENCE archived.
FILES. Some files are WORK FILES and have
only a very brief existence. file extension See extension.
A file is sequentially accessed if the
bytes or RECORDS are read or written one file format A method of organizing data
after another starting at the beginning. A in a FILE. There are many file formats, some
file organized to support sequential access of which (e.g. TEXT FILES) are understood
is known as a sequential file. Sequential or- by many programs. However, sophisti-
ganization is used for any files for which cated applications tend to use their own
there is no requirement to access a particu- formats. A file may or may not contain an
lar byte or record directly, but that are nor- indication of its format.
mally accessed by starting at the first byte
or record and moving through the file one file maintenance The maintenance of
byte or record at a time. This is the case for both the integrity of FILES, i.e. the correct-
many data files. ness of all the data values, and an efficient
A file is randomly accessed if any byte internal organization of files. It is per-
or record can be accessed directly without formed by software. See also file manage-
having to pass over previous bytes or ment.
records in the file. A file organized to sup-
port random access is known as a random- file management The overall manage-
access file (or direct-access file). In such ment of FILES, including their allocation to
cases a program needs a method of deter- space on BACKING STORE, control over file
mining which byte or record to access to ACCESS, the writing of BACKUP copies, the
find the data it needs. This information movement of files to the FILE ARCHIVE, and
must be already known to or computable the maintenance of DIRECTORIES. It is per-
by the program or held within the file itself. formed by software, basic file management
Three common random access methods are being done by the OPERATING SYSTEM of the
indexed (see indexed file), indexed sequen- computer. See also file maintenance.
tial (see indexed sequential file), and HASH-
ING. filename All files have names but differ-
ent operating systems impose different
file allocation table (FAT) The area on rules on how names are constructed. Most
a hard drive that uses the FAT FILE SYSTEM operating systems ban the use of certain
or its derivatives where details about the characters, for example a colon, and im-
location of files are kept. These include pose a limit on the length. Also many sys-
which CLUSTERS hold each file’s data, the tems including Windows and UNIX allow
order of clusters within the files, what free filenames to have an EXTENSION that con-
space is available, and where any flawed sists of one or more characters following
segments occur. The FAT file system was the proper name.
used by MS-DOS and is still supported by
Windows. file protection The protection of FILES
from mistaken or unauthorized ACCESS of
file archive A collection of magnetic information or, in the case of PROGRAM
disks, CDs, DVDs, or tapes on which are FILES, from mistaken or unauthorized exe-
held rarely used FILES, which can be re- cution. File protection may be concerned
stored to the computer system if required. with the security of the contents of files, or
Files may be explicitly placed in the with the protection of the media on which
archive, or may be automatically moved files are held. The former is implemented
there after they have remained unused for by software, the latter by operating proce-
a given period. dures.

78
finger

file server A computer on a network the receiver must agree to the transfer and
that acts as a storage device, on which any inform the sender of its eventual success or
user can store files. File servers are often failure. In MULTIPROCESSING SYSTEMS file
dedicated, i.e. they perform no other func- transfer is normally achieved by BACK-
tion. GROUND PROCESSING. See also file transfer
protocol.
file sharing The sharing of public or pri-
vate computer data or space in a network file transfer protocol (FTP) A protocol
with various levels of access privilege. File that allows a user on one host to access
sharing can happen on a small LAN and (read and possibly write to), and transfer
has been a feature of large mainframe com- files to and from, another host over the In-
puters for many years. It allows users to ternet. It is the simplest way to exchange
read, write, modify, erase, copy, and print files on the Internet and can be used with a
files according to their level of access priv- simple command line interface from MS-
ilege. DOS, with a Windows GUI program, or
through most Web browsers. A password
filestore /fÿl-stor, -stohr/ The portion of may be needed to gain access to some files.
disk BACKING STORE used for storing per- See also anonymous FTP; HTTP; SMTP.
manent FILES.
file updating Inserting, deleting, or
file system 1. The method by which the amending values in a file – usually a DATA
storage of FILES on magnetic disk, CD, FILE – without changing the organization of
DVD, etc., is organized. Files must be the contents. File updating can be achieved
stored in ways that make efficient use of in two ways. In one, commonly used in
the available space (e.g. files might not be DATA PROCESSING, the updating process is
physically contiguous), that provide quick carried out automatically by program. In
access times (e.g. filenames might be in- the other, a file is displayed on an INTERAC-
dexed), and that take account of the char- TIVE device and the operator can then see to
acteristics of a particular storage device amend it, using an appropriate editing pro-
(e.g. CDs work differently to magnetic gram.
disks). There are several ways this can be
done and each operating system supports filter A section of code or a program
one or more. For example, MS-DOS used the that takes input data and transforms it in
FAT (file allocation table) file system, some way. The output might be written to
whereas Windows XP uses NTFS (NT file a file or passed to another program or sec-
system) or FAT for fixed disks, FAT only tion of code.
for floppy disks, and CDFS (CD file sys-
tem) for CDs. find See search.
2. The part of an operating system respon-
sible for maintaining a particular file sys- Finder In Apple Macintosh computers,
tem and hiding its organizational details the desktop and file management system. It
from users, so that they can treat all files is also responsible for looking after the
simply as named collections of informa- clipboard and scrapbook and all desktop
tion. icons and windows.

file transfer The movement of entire finger A piece of software that displays
FILES from one computer system to an- information about a particular user, or in-
other, typically across a NETWORK. In order deed all users, logged on to a local or re-
to transfer a file successfully there must be mote system. It typically shows the full
cooperating programs running on each sys- name, last name, last login time, idle time,
tem: the sender has to be able to specify the terminal line, and terminal location (if ap-
filename, ultimate destination, and autho- propriate). The most common use is to see
rization for the transfer to the receiver, and if a person has an account at a particular

79
Firefox

Internet site. Many sites do not allow in- tating MAGNETIC DRUMS. Input/output was
coming finger requests. achieved mainly with PUNCHED CARDS,
punched PAPER TAPE, and later on with
Firefox Trademark An OPEN SOURCE MAGNETIC TAPE; simple PRINTERS were
WEB BROWSER produced by the Mozilla available. The use of valves meant that first
Foundation. First released in 2004 and fa- generation computers were very large in
vored by technical users, it quickly became size, generated considerable heat and thus
the second most widely used Web browser required cooling, and did not operate very
after INTERNET EXPLORER. fast or very reliably. They were still able to
perform impressive computations. Most of
firewall Software or a combination of them embodied the concept of the STORED
hardware and software that monitors and PROGRAM.
controls the data that passes across a net- The following are important first gener-
work’s connection to another network. It ation computers.
is often used to protect a private network ENIAC: design begun 1943 by J. W.
or intranet that also has connections to the Mauchly and J. P. Eckert at the University
Internet from unauthorized access by users of Pennsylvania; operational 1946, but did
of other networks. The firewall is often in- not use a stored program and was regarded
stalled in a dedicated computer separate as a general-purpose electronic calculator.
from the rest of the network so that in- EDVAC: design begun 1945 by J. von
coming users cannot directly access private Neumann at the University of Pennsylva-
network resources. Software-only firewalls nia, the proposal being the first written
can be installed on standalone PCs, and are documentation of a computer with a
now considered an essential safety precau- stored program; not operational until
tion when using the Internet. 1952.
Manchester Mark I: design begun 1946 by
FireWire (IEEE 1394) Trademark A T. Kilburn and F. C. Williams at the Uni-
standard INTERFACE used to connect a com- versity of Manchester; regarded as the first
puter to up to 63 external devices. Devel- operational stored program computer,
oped by Apple Computer, Inc., it became with realistic problem-solving first
an IEEE standard in 1995. It supports PLUG achieved in April 1949.
AND PLAY and offers high data-transfer EDSAC: design begun 1946 by M. V.
speeds, either 400 Mbps or 800 Mbps de- Wilkes at Cambridge University; started
pending on the version. FireWire has long operating in May 1949 as the first com-
been the de facto standard method of plete operational stored program com-
transferring data from digital camcorders puter.
to computers. All Macintosh and an in- Ferranti Mark I: commercial version of the
creasing number of Windows computers Manchester Mark I, produced by Ferranti
support FireWire. Ltd., Manchester, and delivered in 1951; it
was the world’s first commercially avail-
firmware /ferm-wair/ Programs that do able computer. Ferranti’s computer inter-
not have to be loaded into a computer but ests were sold, 1963, to ICT, which
are permanently available in main store. merged, 1968, with English Electric Leo
They are held in ROM (read-only memory) Marconi to form ICL (International Com-
and thus are fixed in content even when the puters Ltd.).
power supply is removed. UNIVAC I: product of the US company
Eckert-Mauchly Corp. and commercially
first generation computers The earli- available in 1951, shortly after the Ferranti
est computers to be produced, in the 1940s Mark I. Eckert-Mauchly was formed in
and early 1950s, based on the technology 1947 following development of ENIAC
of the time. Electronic valves were used in and later became Sperry-Univac.
the circuitry and storage devices were usu- LEO I: design begun 1947 by T. R.
ally delay lines, electrostatic devices, or ro- Thompson and J. Pinkerton for J. Lyons &

80
flash memory

Co. (a large UK catering firm) and opera- FLOATING-POINT NOTATION are unaccept-
tional by 1953; enhanced version (LEO II) able (e.g. in monetary calculations). How-
marketed by Leo Computers Ltd., formed ever, the values involved must be neither
1954. Leo Computers merged with English very large nor very small. The range of val-
Electric, 1963, and subsequently formed ues that a computer can handle efficiently
part of ICL. is limited by WORD length: each item of in-
See also second, third, fourth, fifth gen- formation must fit into a word containing
eration computers. a fixed number of bits. A 32-bit word, for
example, can have 232 possible values,
fixed disk, fixed disk drive See disk which can be used, say, to represent whole
drive. unsigned numbers from 0 to
4 294 967 295, or 0 to 429 496.7295 if an
accuracy of one ten-thousandth is re-
quired. Although more than one word can
1 2 3 4 5 6 7 8 9 10 be used to represent a number and hence
give a wider range of values, this increases
J O N E S 1 0 3 processing time. Where a wide range is
S M I T H 8 7 needed, floating-point notation must be
used.
B R O W N 1 2 3
flag A device, item of data, etc., that can
be set to a particular value to indicate that
some condition or state has been attained
Fixed format by a piece of equipment or by a program.
For example, an overflow flag is a single bit
fixed format Data arranged so that par- that is set to 1 when OVERFLOW occurs in a
ticular items always occur in particular po- register during an arithmetic operation; an
sitions. In the example shown in the interrupt flag is set when an INTERRUPT oc-
diagram, the name always starts in the first curs.
position, while the numbers are in posi- The word sentinel is used as a synonym
tions 8, 9, and 10. Because the where- for flag but is usually used in the context of
abouts of each item of information is input and output. For example, an end-of-
strictly defined, there is no need for gaps data sentinel indicates that all the data has
between the items. The format of the ex- been read. A flag or sentinel, once set, is
ample could be ‘A name in columns 1 to 5, subsequently used as a basis for a condi-
an age in positions 8 and 9, and the num- tional JUMP and similar decision processes.
ber in the family in position 10.’ Compare
free format. flame A strong opinion, criticism, or
derogatory comment about something or
fixed-point notation A representation someone in an e-mail, chat, or usergroup
of REAL NUMBERS that is in everyday use posting.
and in which a number is expressed in the
form of a set of digits with the RADIX POINT flash drive See flash memory.
fixed in position so that the digits have
their correct positional value (see number flash memory (flash RAM) A non-
system). Examples of fixed-point notation volatile memory that can be erased and re-
in decimal and binary are programmed in units called memory
4927.54, 101011.11, 0.0000001 blocks. It is a variation of EEPROM, which
Fixed-point notation is used in computing is erased and rewritten at byte level and is
in situations, such as commercial data pro- thus slower than flash memory updating.
cessing, where huge quantities of numbers Flash memory can be used to hold the
are handled, making speed important, or BIOS in PCs but is not suitable for RAM.
where the rounding errors possible with A popular use is in the flash drive, a tiny

81
flash RAM

device that acts as a disk drive holding nary 1 and binary 0. Flip-flops can there-
many megabytes of data. Flash drives usu- fore store one BIT of information, and are
ally connect to a computer through a USB widely used as storage elements, e.g. in
port and can thus be easily unplugged. ROM and RAM and in REGISTERS. Various
Flash memory is also used in digital cellu- types have been developed, differing
lar phones, digital cameras, cards for note- slightly in function.
book computers, and many other devices.
floating-point notation A representa-
flash RAM See flash memory. tion of REAL NUMBERS that allows both very
large and very small numbers to be ex-
flatbed plotter See plotter. pressed in a convenient form. Examples are
1.3 × 106, –2.5 × 103, 0.65 × 10–3
flatbed scanner A type of scanner in Such numbers are encountered in science,
which the page to be scanned is stationary math, and engineering and cannot be han-
behind a glass window while the head dled efficiently in a computer in FIXED-
moves past the page, similar to a photo- POINT NOTATION.
copier. In the flatbed scanner a series of A floating-point number is represented
mirrors keeps the image picked up by the by a pair of quantities called the mantissa
moving head directed onto a lens that feeds and the exponent, and has the general form
the image to a bank of sensors. The advan- m × be
tage of flatbed scanners is that they are rel- b is the base of the number system, equal to
atively inexpensive and thick documents, 10 in decimal notation; the mantissa, m,
such as books, can be scanned. can be positive or negative; the exponent,
e, is the power to which the base is raised,
flat panel display See display. and is a positive or negative integer. In pro-
gramming languages, whose character sets
flat screen A type of SCREEN in the form
do not include superscripts, different con-
of a thin flat panel rather than the protrud-
ventions are used. A common one is to use
ing surface usually associated with the
an ‘E’ to stand for ‘10 to the power of’, e.g.
cathode-ray tube used in many display de-
2.7 × 10–3
vices. Plasma panel DISPLAYS, ACTIVE MA-
TRIX DISPLAYS, and LCDS have flat screens.
is written
2.7 E –3
flexidisk /fleks-ă-disk/ See floppy disk. Inside a computer a floating-point num-
ber is stored and manipulated as a se-
flicker The phenomenon whereby a dis- quence of bits. Typically, the first bit is a
play screen appears to change brightness. sign bit, indicating whether the mantissa is
Flicker can be the result of several factors positive or negative; this is followed by a
including a low refresh rate, ambient light- fixed number of bits giving the sign and
ing, or low-persistence phosphors on the magnitude of the exponent; this in turn is
screen. It is somewhat subjective and most followed by a fixed number of bits repre-
people perceive no screen flicker if the re- senting the magnitude of the mantissa. The
fresh rate is 72 Hz or higher. radix point of the mantissa is usually taken
to be before the leftmost bit, i.e. the man-
flip-flop (bistable) An electronic circuit tissa is a fraction. There may be, say, 7 bits
that has two stable states, either of which for the exponent and 40 for the mantissa.
can be maintained until the circuit is made This gives a wide range of numbers but
to switch, or ‘flip’, to the other state. A means that on small machines each float-
change in output state requires a suitable ing-point number needs several WORDS of
combination of input signal(s) and existing store, which degrades performance. Also,
output state; in effect, the receipt of a pulse floating-point numbers cannot represent
will reverse the state. The two states are all possible real numbers within their range
used in computer circuits to represent bi- exactly; this leads to rounding errors.

82
flowchart

metal shutter

hub

disk

read-only
window

A 3.5 inch floppy disk with its envelope

floating-point number A number ex- protect hole in one corner of the en-
pressed in FLOATING-POINT NOTATION. velope.

floppy disk (diskette; flexidisk) A rela- flops (floating-point operations per sec-
tively small flexible MAGNETIC DISK, en- ond) A commonly used measure of com-
closed within a stiff protective envelope. puter performance, made in terms of the
Floppy disks were formerly used in small number of arithmetic operations that can
computers as on-line BACKING STORE and be performed on FLOATING-POINT NUMBERS
off-line storage devices. They have now in a period of one second. It is usually
largely been superseded by writeable CDs, expressed in megaflops (a million flops),
but are still used for storing or transferring gigaflops (a billion flops), teraflops (a tril-
small quantities of data. They have much lion flops), or petaflops (a thousand trillion
smaller storage CAPACITIES and much flops).
longer ACCESS TIMES than HARD DISKS, but
are considerably cheaper and need less floptical disk /flop-tă-kăl/ A type of
careful handling. magnetic disk the same size as a 3½″ floppy
The most common type of floppy disk that used a laser beam to help position the
is 3½ inches in diameter. The older 5¼ read/write heads more accurately than was
inch disks are now rarely seen. As with possible with an ordinary floppy. There
other magnetic disks, data is recorded in was a series of small, precise concentric
concentric tracks in the magnetic coating. tracks stamped in its surface coating. These
The tracks themselves are divided into SEC- tracks were where the data was written and
TORS. Most floppy disks have a capacity of were thinner and more numerous than on
about 1.4 megabytes. a conventionally formatted floppy. The
The floppy disk remains inside a rigid combination of more precision and more
plastic envelope when it is fed into a tracks allowed a floptical to hold up to 20
DISK DRIVE for reading and writing pur- megabytes of data. Flopticals are now ob-
poses. The disk rotates inside the en- solete.
velope, becoming rigid as it spins. A sliding
metal shutter covers a slot in the en- flowchart 1. (program flowchart) A di-
velope, which allows the read/write head agrammatic representation of the structure
to make contact with the disk surface. of a program, showing the actions per-
The disk drive can be prevented from formed by the program and the flow of
writing to the disk by means of the write- control. It consists of a set of boxes of var-

83
flowchart

ious standard shapes, interconnected by a natural language (e.g. English). In addition


set of flow lines. For clarity the lines may there are circular connector symbols that
have arrows to indicate the flow of control. connect flow lines and are used, for exam-
The different shapes of the boxes indicate ple, when a flowchart continues on an-
either different kinds of activity or a deci- other page.
sion to be made. The activity or decision is 2. (system flowchart; data flowchart) A di-
described within the boxes, typically in agrammatic representation of a complete

symbol use

for indicating start or finish of a flowchart

for any kind of processing activity, excluding decisions

for a processing activity dealt with elsewhere,


e.g. subroutine, procedure

where a decision is to be made, the two (or more) exits


being labeled, e.g. ‘yes‘ or ‘no’, in accordance with the
possible choices

for any input or output operation

for indicating continuation on or from another part


of the flowchart

description
for any input or output of data, however achieved
medium

content for data held in any on-line file, the medium usually
medium being disk

program
for processing of data
function

for indicating continuation elsewhere

Symbols in program flowcharts (top) and system flowcharts (bottom)

84
form

computer system, showing both the opera- font A set of printable or displayable
tions involved and the flow of data in the characters. The design for a set of fonts is
system. It does not indicate how the pro- called the typeface and the variations of
cessing operations are carried out – this in- this design (bold, italic, etc.) form the type-
formation would appear in a program face family. Many fonts have been de-
flowchart. The number of flow lines enter- signed and can be purchased for general
ing and exiting each symbol depends on the use. Three main kinds of font are in use on
situation. computers. TRUETYPE fonts are the com-
monest on personal computers. The other
flow control Procedures used to control kind are POSTSCRIPT fonts (also known as
the DATA TRANSFER rate, i.e. to limit the rate Type 1 fonts), which are preferred for out-
at which data is transferred to the rate at put of PostScript printing files used in com-
which it can be received – either at its final mercial printing. OpenType fonts are a
destination or at a series of points along its development of TrueType fonts that can
route. incorporate PostScript font data.
There are three flow-control methods in
common use. With XON/XOFF the re- footprint The area of floor or desk
ceiver can temporarily halt the sender by space occupied by a device, or the shape
transmitting an XOFF (transmitter off, and size of panel opening into which it
ASCII code 19), and an XON (transmitter
would fit.
on, ASCII code 17) when once more ready
to receive; this method requires full DUPLEX FOR See Basic.
TRANSMISSION. With ETX/ACK the sender
terminates a block of data with an ETX
foreground processing In a MULTI-
TASKING system, the processing of a com-
(end transmission, ASCII code 3), and the
puter program in a way that allows
receiver responds with an ACK (acknowl-
interaction with the user through the key-
edge, ASCII code 6) only when it is ready
board. Only one program per user can run
for more data; this method can be used in
in this way at any one time, and these are
HALF-DUPLEX communications but relies on
called foreground programs; all other pro-
the sender not sending too much at a time. grams are background programs. Fore-
Thirdly there is the use of control signals, ground programs are usually granted a
where the receiver uses a separate channel high priority and can thus preempt the re-
to indicate to the sender whether it is ready sources – main store, processor, etc. – of
for data. the computer from background programs,
which have a lower priority. Users can usu-
focus The state of the active item in a ally change the foreground program at will
GUI FORM. Only one item per form can by selecting one of the background pro-
have the focus at any one time and it is this grams, which immediately becomes the
item that receives input from the keyboard foreground program.
when the form is active. The focus can be
moved by clicking on a new item with the for loop See loop.
mouse or by pressing the tab key (move to
next item) or shift+tab (move to previous form 1. A page of printer paper. It may
item) on the keyboard. be a single sheet or may be sheets joined to-
gether in the form of CONTINUOUS STA-
folder 1. An alternative term for DIREC- TIONERY. In either case it may be multipart
TORY on GUI systems. so that copies can be produced. Individual
2. A component of a storage facility found sheets may be preprinted with headings or
in some programs. For example, an e-mail other information, possibly with lines or
client will often provide a system of user- boxes.
configurable folders to store received and 2. A display that contains blank fields,
sent messages. which can be filled in using a keyboard and

85
format

mouse. The data can then be transferred the earliest HIGH-LEVEL LANGUAGES gener-
automatically to a database. ally available for scientific and technical
3. A WINDOW whose content is so laid out applications, and has been under continu-
as to display a particular type of informa- ous development. Fortran is still widely
tion to the user, and possibly to receive used for scientific work, even though its
input. DIALOG BOXES are a type of form. CONTROL STRUCTURES are relatively crude
compared with more modern languages.
format 1. The structure that is used in Each new release has more sophisticated
the arrangement of data. It is determined features.
before use, and in some cases is set by in-
dustrial or international standards. There forum An on-line discussion group.
are various kinds. Instruction format de- Some Web sites, especially Web PORTALS,
fines the arrangement of the parts of a MA- provide a large selection of forums in
CHINE INSTRUCTION. Printer format defines which participants can exchange open
the layout on paper of the output from a messages. Newsgroups and conferences are
PRINTER, for example the areas of a page also types of forums.
where printing will occur and the spacing
between words and between lines. Tape forward compatibility See upward
format and disk format define the arrange- compatibility.
ments in which data can be recorded on
MAGNETIC TAPE or MAGNETIC DISK. fourth generation computers Com-
2. To prepare a blank storage medium, puters currently in use and designed in the
such as a disk, to accept data. period from about 1970. Since the design
3. To put data into a predetermined struc- of computers is a continuous process by
ture. different groups in several countries, it is
4. To organize or change the appearance difficult to establish when a generation of
and arrangement of text and images on a computers starts and finishes. Conceptu-
screen or printed page. ally the most important criterion that can
be used to separate fourth generation from
form feed A special character (ASCII THIRD GENERATION COMPUTERS is that they
decimal 12), sometimes abbreviated to FF, have been designed to work efficiently with
that by convention causes a printer to ad- the current generation of HIGH-LEVEL LAN-
vance one page length or to the top of the GUAGES and are intended to be easier to
next page. program by their end-user. From a hard-
ware point of view they are characterized
forms tractor See tractor feed. by being constructed largely from INTE-
GRATED CIRCUITS and have very large
Forth /forth/ A PROGRAMMING LANGUAGE (multi-megabyte) main store fabricated
designed originally for the control of scien- from SEMICONDUCTOR MEMORY.
tific instruments from microcomputers The availability of an ever-increasing
with very small memories. It is a LOW-LEVEL range of integrated circuits has produced a
LANGUAGE that makes great use of the rapid fall in the cost of hardware while
STACK, and is very compact. Although the software costs have continuously in-
current memory sizes of microcomputers creased. This has led to the existence of
have made the small size of Forth largely ir- many computers designed for special tasks
relevant, it is still used as a substitute for such as communications, automatic con-
ASSEMBLER language among some micro- trol, and military systems, which in the
computer users. past would have been general-purpose ma-
chines adapted to their task by software. It
Fortran /for-tran/ A PROGRAMMING LAN- has also led to a dramatic increase in home
GUAGE whose name is derived from for- computing and Internet use.
mula translation. It was first released by See also first, second, fifth generation
IBM in the mid-1950s. Fortran was one of computers.

86
fractal

fourth generation language A pro- Koch curve). This is generated by starting


gramming language designed to be closer with an equilateral triangle and dividing
to a natural language. Generally, a first each side into three equal parts. The center
generation language is machine code, a sec- part of each of these sides is then used as
ond generation is assembler, and a third the base of three smaller equilateral trian-
generation is a high-level programming gles erected on the original sides. If the cen-
language such as C or Java. A fourth gen- ter parts are removed, the result is a
eration language, such as SQL, allows users star-shaped figure with 12 sides. The next
to specify the desired commands in more stage is to divide each of the 12 sides into
abstract terms than previously, allowing three and generate more triangles. The
the language processor to choose the exact process is continued indefinitely with the
method used to achieve them. See also fifth resulting generation of a snowflake-shaped
generation language. curve. A curve of this type in the limit has
a dimension that lies between 1 (a line) and
fractal /frak-tăl/ A curve or surface that 2 (a surface). The snowflake curve actually
has a fractional dimension and is formed has a dimension of 1.26.
by the limit of a series of successive opera- One important aspect of fractals is that
tions. A typical example of a fractal curve they are generated by an iterative process
is the snowflake curve (also known as the and that a small part of the figure contains

Generation of a snowflake curve

87
fragmentation

the information that could produce the The format here could be ‘A name fol-
whole figure. In this sense, fractals are said lowed by an age followed by the number in
to be ‘self-similar’. The study of fractals the family.’ Compare fixed format.
has applications in chaos theory and in cer-
tain scientific fields (e.g. the growth of free space 1. Space not being used on a
crystals). It is also important in computer storage device.
graphics, both as a method of generating 2. Space provided free of charge for a user
striking abstract images and, because of to set up a Web page.
the self-similarity property, as a method of
compressing large graphics files. freeware /free-wair/ Copyrighted soft-
See also Mandelbrot set. ware that is offered at no cost but may
have limitations on its use, most commonly
fragmentation /frag-men-tay-shŏn/ The that it cannot be incorporated in any pro-
breaking up of disk FILES into a number of gram or package that is sold for profit and
different sections scattered across a disk. It that the author’s copyright must always be
occurs when files of different sizes are fre- acknowledged. See shareware.
quently deleted and written. Each new file
is written in the first available gap left by frequency division multiplexing (FDM)
the deletion of a previous file; if the new See multiplexer.
file is too big for the gap then the rest is
written in the next gap, and so on. The re- friction feed A technique for feeding
sult is that a number of movements of the paper into a PRINTER. Each sheet is fed in by
read/write heads of the DISK DRIVE might be hand and is gripped by a rotating roller, as
required to access each fragmented file, in a typewriter. The paper cannot be posi-
thus reducing the efficiency of the file sys- tioned as accurately as it is with TRACTOR
tem. Programs exist for defragmenting FEED. See also cut sheet feed.
disks.
front end The part of an application
frame 1. In data transmission, a unit of that interacts with the user, contrasted
data complete with addressing and the nec- with the ENGINE, which manages and con-
essary protocol control information that is trols the application’s data. In client/server
to be transmitted between network points. applications the front end usually runs on
The transmission is usually serial and con- the client while the engine runs on the
tains header and trailer fields that ‘frame’ server.
the data.
2. A separate section of a Web page that front-end processor A small computer
acts as an independent unit (e.g. text can be that is used to relieve a mainframe com-
independently scrolled). Frames can be de- puter of some of the tasks associated with
fined by tags in HTML. input/output. It receives data from a num-
ber of input/output devices (such as the ter-
free format Data arranged so that, al- minals in a MULTIACCESS SYSTEM), organizes
though the items are in a specified order, it, and transmits it to the more powerful
the actual positions of the items are not de- computer for processing. It also handles
fined. In free format it is necessary to have the output from the mainframe to the ter-
a separator such as some spaces and/or a minals. In a NETWORK, a front-end proces-
comma between the items so that it is pos- sor may handle the control of
sible to tell when one ends and the next be- communication lines, code conversion,
gins, for example error control, etc. It is more powerful than
JONES,10 3 a MULTIPLEXER in that it can perform simple
SMITH,8 7 editing, echoing, routing, etc.
BROWN,12 3
ROBINSON,25, 1 FTP See file transfer protocol.

88
FYI

full-duplex transmission /dew-pleks/ tions. These are usually like PROCEDURES,


See duplex transmission. except that they return a calculated value.
See also parameter.
full-screen In Windows systems, the dis-
play mode in which the main window is functional programming A style of
maximized and the toolbar and the menu, programming that emphasizes the evalua-
title, and status bars are hidden. tion of expressions rather than the execu-
tion of commands.
full-text index See searching.
function key See keyboard.
function A section of a program whose
main purpose is to calculate a single value, function part See operation part.
such as the square root of a number, the
sine or cosine of a number, or the length of
fuzzy logic A type of logic that deals
a character STRING. The item of data on
with ideas of possibility and probability.
which the calculation is performed, or its
Conventional logic deals with values ‘true’
address in memory, is known as the ARGU-
and ‘false’, whereas fuzzy logic could have
MENT; the calculation may be performed
on more than one item of data and hence a range of values such as ‘true’, ‘very true’,
there may be more than one argument. To ‘not very true’, etc. It is used in EXPERT SYS-
perform the calculation the function must TEMS and other applications of artificial in-

be called. telligence.
A collection of different functions are
provided as part of a programming lan- FYI (for your information) Publications
guage, and any of these can be used by the that convey general information about top-
programmer without an understanding of ics related to the Internet. They are a sub-
the details of its internal working. Most series of RFCs that are not technical
languages also permit user-defined func- standards or descriptions of protocols.

89
G

G The symbol used for GIGA-, or some- way of classifying computer systems on the
times for gigabyte. basis of advances in technology, especially
electronic technology, and latterly also on
game port The port on a PC into which advances in software. The generation of
devices such as joysticks or games con- computers currently in use is the FOURTH
trollers are connected. GENERATION (which succeeded the THIRD,
SECOND, and FIRST GENERATIONS), with
games console An interface designed FIFTH GENERATION COMPUTERS currently
especially for computer games. Movement under development. Since the design of
and speed are manipulated using buttons computers has been a continuous process
or levers on the console. Some controllers for decades – by a wide variety of people in
are specialized, such as those with steering different countries, faced with different
wheels and accelerator and brake pedals problems – it is difficult (and not very prof-
for racing games. Force feedback joysticks itable) to establish when generations start
are now available to add realism. and finish.

garbage Stored data that is no longer generator A program that accepts the
valid or no longer wanted. Removal of this definition of an operation that is to be ac-
superfluous data from store is known as complished and automatically constructs a
garbage collection. See also GIGO. program for the purpose. An example is
the report generator, which can be used in
garbage in garbage out See GIGO. commercial data processing to extract in-
formation from files. The input to such a
gas panel display See display. program is a description of the file struc-
ture and a specification of the information
gate See logic gate. required and the way in which it should be
presented to the user. The report generator
gateway A network connection device can then construct a program to read the
similar to a BRIDGE except that it is usually file, extract the desired information, and
visible to the user. It translates data be- output it in the desired format.
tween one type of network and another.
GHz (gigahertz) A measure of frequency
gender bender A component for joining equal to 109 hertz.
two male or two female connectors to-
gether. GIF /jiff, giff/ (graphics interchange for-
mat) A graphics file format developed by
general-purpose computer A com- CompuServe, which is widely used for
puter that can be used for any function for transmitting raster image files on the Inter-
which it can be conveniently programmed net. The files are encoded in binary and use
and can thus perform a series of unrelated LZW compression. GIF files are often
tasks. smaller than the same file would be if
stored in JPEG format but are limited to 256
generations of computers An informal different colors and so photographic im-

90
GOTO statement

ages are not stored so well. GIF files can ENGINE operated by Google, Inc. First de-
contain simple animations. These files have veloped in 1996–98 by Larry Page and
the file extension gif. See also PNG. Sergey Brin while they were graduate stu-
dents at Stanford University, it is based on
giga- /gig-ă-/ A prefix indicating a multiple their theory that the relative importance of
of a thousand million Web pages containing a match of the
(i.e. 109) search term can best be determined by an-
or, loosely, a multiple of 230 alyzing the number of links to each page
(i.e. 1 073 741 824). from the other matching pages; the results
In science and technology decimal notation are then presented in descending order of
is usually used, and powers of 10 are thus this importance. This theory was con-
encountered – 103 106, 109, etc. The sym- firmed in practice and Google acquired a
bol G is used for giga-, as in GV for giga- reputation for quickly and reliably return-
volt. Binary notation is generally used in ing relevant results – a notorious problem
computing, and so the power of 2 nearest with other search engines at the time. By
to 109 has assumed the meaning of giga-. early 2004 the Google engine handled over
The prefix is most frequently encoun- 80% of all Web searches. The verb ‘to
tered in computing in the context of stor- Google’, meaning to perform a Web search
age CAPACITY. With magnetic disks, mag- using Google, has entered the English lan-
netic tape, and main store, the capacity is guage.
normally reckoned in terms of the number
of BYTES that can be stored, and the giga- Gopher A distributed information ser-
byte is used to mean 230 bytes; gigabyte is vice (named after the mascot of the Univer-
usually abbreviated to G byte, GB, or just sity of Minnesota) that makes hierarchical
to G; thus a 1.2 G byte disk can hold collections of information available across
1.2885 × 109 bytes. Giga- is part of a se- the Internet. Each node is either a menu, a
quence search node, or a leaf node. A simple pro-
kilo-, mega-, giga-, tera-, peta-, … tocol is used that allows a single Gopher
of increasing powers of 103 (or of 210). client access to information from any ac-
cessible Gopher service. However, its use
GIGO /gÿ-goh/ Garbage in garbage out, declined with the spread of the more flexi-
signifying that a program working on in- ble World Wide Web.
correct data produces incorrect results.
GOSUB /goh-sub/ See Basic.
global Applicable to a whole document,
file, or program rather than a particular GOTO statement /goh-too/ An uncon-
section. See local. ditional JUMP INSTRUCTION in a high-level
language. It causes the normal flow of con-
global variable See scope. trol to be broken by specifying explicitly
the next statement to be executed, usually
golfball printer An obsolete type of im- by means of a statement label, as in
pact character PRINTER whose printing goto error_handler
mechanism was first used in electric type- Excessive use of GOTOs can make pro-
writers. The characters were moulded on a grams difficult to follow and their use is
spherical print head. The head was rotated therefore discouraged. An extended form,
(in two directions) in order to bring the re- the computed GOTO, appears in Fortran
quired character opposite the printing po- and is used to go to one of several state-
sition, and was then struck against the ments, the choice dependent on the value
inked ribbon and paper. The head was in- of an integer variable. Many versions of
terchangeable, enabling different character Basic have a similar facility; however, the
sets to be used. same effect can be achieved more elegantly
by the CASE or SWITCH STATEMENTS of other
Google Trademark An Internet SEARCH languages.

91
GPU

GPU See graphics processing unit. graphics processing unit (GPU; graphics
coprocessor) A CHIP or CHIPSET that per-
grandfather file See master file. forms data manipulations related to graph-
ical output on a VDU. Such operations
graph A network of lines and vertices, could be accomplished in the computer’s
or a data structure that emulates this. A CPU by appropriate software, but using spe-
TREE is a kind of graph. cialized hardware is much faster and mod-
ern uses of computer graphics – in
graphical user interface (GUI) The particular 3-D animations – require this
type of user interface provided with Win- extra speed. A GPU is the core component
dows and Macintosh operating systems of a GRAPHICS ACCELERATOR.
(and also others), which provides the user
with an intuitive graphical menu-driven graphics tablet See digitizing pad.
system incorporating such things as win-
dows, icons, pull-down menus, scroll bars, graph plotter See plotter.
and pointing devices.
gray scale The representation of colors
graphic character A symbol that can be in a graphics file or on a monochrome out-
produced by printing, typing, or handwrit- put by shades of gray ranging from black
ing. It may be an ALPHANUMERIC CHARAC- to white. The number of bits per pixel de-
TER, a SPACE CHARACTER, a SPECIAL
termines the number of shades of gray that
CHARACTER, or any other symbol. Compare
can be achieved.
control character.
greeking The substitution of meaning-
graphics See computer graphics.
less line patterns or bars of gray to repre-
sent characters or images whose size makes
graphics accelerator A chipset at-
them too small to be displayed at the cur-
tached to a video board that contains a
rent screen resolution. The spacing and
GRAPHICS PROCESSING UNIT. This enables it
arrangement of the text is visible but the
to update the video display much more
quickly than the CPU can and also com- text itself is not legible.
pute special effects common to 2-D and 3-
D images. Another benefit is that the CPU groupware Applications designed to be
is freed up to execute other commands useful to a team of people. Groupware ser-
while the graphics accelerator is handling vices cover such activities as the sharing of
graphics information. Graphics accelera- calendars, e-mail handling, shared infor-
tion has become a necessity since the ad- mation access, collective writing, and elec-
vent of multimedia and sophisticated tronic meetings. Examples of groupware
games, in which very large images need to applications are Microsoft Exchange and
change quickly in response to user input. Lotus Notes.
The older graphics accelerators tend to run
using the PCI bus but more power can be guest A log-in account on a network
obtained with accelerators designed for an that can be accessed without a password.
accelerated graphics port (see AGP). For example, on some subscription Web
sites it is possible to sample the content by
graphics card (graphics board) See ex- entering as a guest. The ACCESS PRIVILEGES
pansion card. of a guest account are generally very lim-
ited.
graphics display A VDU with graphics
capability, i.e. one that can display pic- GUI /goo-ee/ See graphical user inter-
tures, graphs, and charts as well as text. face.

92
H

hacker 1. A computer enthusiast who is reproducing a photograph or illustration in


particularly interested in the minutiae of print by using areas of regularly spaced
how PROGRAMS work and in techniques for small dots of a color whose differing diam-
stretching their capabilities. Hackers are eters allow more or less of the white back-
usually talented programmers and their in- ground to show through and thus create
terest often extends to writing their own the illusion of varying shades of the color.
programs or to altering existing software The larger the spot’s diameter, the darker
to ‘improve’ it, sometimes without autho- the shade at that point on the image. GRAY
rization. However, they tend to assume SCALE pictures use halftoning with black
that the users of their software will not ink to achieve shades of gray when printed,
only possess their level of computing skill and in color printing the intensity of each
but also share their cast of mind. Their primary color (see CMYK system) is varied
products are therefore often badly docu- using halftoning to create other colors. The
mented and difficult for normal users – frequency of the halftone dots is measured
whom hackers regard with contempt – to in lines per inch (LPI).
understand and operate.
2. (cracker) A person whose aim is to halt instruction A MACHINE INSTRUC-
breach the SECURITY of remote computer TION that halts the execution of a program
systems, such as those owned by banks or
and usually turns control of the computer
government agencies. The motive is often
to the OPERATING SYSTEM.
merely personal satisfaction but occasion-
ally malicious damage or fraud occurs. The
hand-held computer A computer that
hacker’s equipment need only be a per-
is small enough to be fitted in a handbag or
sonal computer and a telephone modem.
pocket and used while it is being held in the
half-duplex transmission /dew-pleks/ hand. Special operating systems, such as
(HDX) Transmission of data between Windows CE, and special applications run-
two endpoints, the data traveling in either ning under the operating system are
direction but only in one direction at a needed. Some hand-held computers accept
time. It cannot flow simultaneously in both handwriting as input; others use a small
directions. Only one signal wire is there- keyboard. Voice and data telephone ser-
fore required in half-duplex working. The vices are sometimes combined with the
time taken to reverse the direction of trans- hand-held computer in a single device. See
mission from send to receive or from re- PDA.
ceive to send is called the turnaround time.
Half-duplex transmission can be used for hand-held scanner A small scanner
terminals that perform their own echoing, that is moved manually across the docu-
and for any situation in which it is unnec- ment. Often the scanning head is not as
essary for both ends to transmit simultane- wide as that in a FLATBED SCANNER and
ously. Compare duplex transmission; most hand-scanner software automatically
simplex transmission. combines two half-page scans into a single
image. Hand scanners are relatively inex-
halftone /haf-tohn, hahf-/ A method of pensive and convenient for capturing small

93
handle

amounts of text, but unsuitable for repro- vances have greatly increased the recording
ducing high-quality images. DENSITY of hard disks and storage capaci-
ties of many gigabytes on a 3.5 inch disk
handle 1. An outline box that appears in are now common.
many applications when a graphical object
is selected. It can be used to resize the hard return The character that forces
image. The same mechanism can be used to the following text to be printed on a new
alter the boundaries of the area selected line in a document. In word-processing
without changing its contents. documents a hard return indicates the end
2. A name chosen to identify a user on an of a paragraph. See also soft return.
on-line service. It may be the user’s real
name, or a nickname. hard-sectored disk See sector.

handshake An exchange of signals that hardware /hard-wair/ The actual equip-


establishes communication between two or ment used in a computer system, including
more devices (by synchronizing them) and not only the major devices – such as VDUs,
allows data to be transferred. The signals disk drives, and printers – and the elec-
have various meanings such as tronic circuitry making up semiconductor
‘I am waiting to transmit.’ memory, logic circuits, etc., but also ca-
‘I am ready to receive.’ bles, cabinets, and so on. Compare soft-
‘I am not ready to receive.’ ware.
‘I am switched on.’
‘The data is available.’ hardware character generation A
‘Data has been read successfully.’ technique whereby a VDU, printer, or plot-
ter can be directed (by receipt of a particu-
hands on Describing work in which a lar signal from a computer) to display or
person controls and interacts with a com- draw a specified CHARACTER, the style and
puter directly. size of which is determined by the device’s
internal circuitry. This drastically reduces
hang A program, device, or system is the complexity of the information trans-
said to ‘hang’ when it has stopped re- mitted. Instead of having to describe each
sponding to input, although everything ap- character in terms of a number of dots or
pears to be otherwise normal. Sometimes strokes, a single code of typically 7 or 8 bits
this is caused by the system waiting for represents each character. By means of spe-
some event to happen and, when this oc- cial control codes, the size, slant, bright-
curs, normal running will resume automat- ness, etc., of the hardware characters may
ically. However, it is possible that the often be altered. However, the variety of
program has crashed and operator inter- characters and styles is still very limited
vention is needed to abort it. and inadequate for modern GUI-based op-
erating systems and applications where
hard copy A permanent copy, printed many different fonts are used. Most VDUs,
on paper for example, of information from etc., now use SOFT FONTS rather than hard-
a computer. ware character generation.

hard disk A rigid MAGNETIC DISK. A hardware interrupt See interrupt.


computer’s ON-LINE BACKING STORE is
nearly always formed by one or more hard hardwired /hard-wÿrd/ Describing func-
disks. Formerly there were several types of tions that are built in to a system rather
hard disk, e.g. DISK PACK and DISK CAR- than being added by software. Hardwired
TRIDGE, but modern ones all use WINCHES- logic is logic circuitry that forms all or part
TER DISK DRIVE technology, where the disk of an INTEGRATED CIRCUIT and is thus per-
itself and its DISK DRIVE form a single her- manently interconnected. Its function can-
metically sealed unit. Technological ad- not therefore be changed.

94
heuristic

hashing /hash-ing/ A technique used for with the surface of a hard disk as it rotates
organizing TABLES or FILES of information in a DISK DRIVE. (Normally the head flies
to permit rapid SEARCHING or TABLE LOOK- just above the surface.) A crash is often
UP. It is particularly useful for random-ac- caused by the head passing over a particle
cess FILES and for tables to which items are of dust on the surface. The contact destroys
added in an unpredictable manner, such as the track so affected – and the data stored
the SYMBOL TABLE of a compiler. Each item in that track. Particles of surface material
of information to be placed in the table or produced by the contact rapidly spread
file has a unique key. A special hashing al- around and cause other tracks to be de-
gorithm uses the key to allocate a position stroyed. The damaged disk usually has to
to each item, the collection of items being be thrown away. Disks should be BACKED
distributed fairly evenly over the table or UP at regular intervals so that in the event
file. The same algorithm is used to yield the of a crash a duplicate is available.
starting point for a search for the key.
header 1. Text or an image that is re-
hash total /hash/ See control total. peated at the top of pages.
2. In digital communications, information
Hayes compatible /hayz/ Describing a at the beginning of a packet of data con-
modem or system that has the same set of taining details about the sender, the re-
commands as a Hayes Microcomputer ceiver, the length of the packet, and,
Products modem. Although the company sometimes, the protocol being used.
no longer exists, Hayes compatibility re- 3. The part of an e-mail that precedes the
mains a de facto standard for microproces- main message and contains the name of the
sor modems. sender, the addressee and other recipients,
the date and time, etc.
HDTV (high-definition television) A
television with higher resolution than one help On-line documentation containing
based on the NTSC standard. HDTV sets information about a particular application
have a wider screen and roughly twice the or operating system.
normal resolution. The picture quality is
similar to 35-mm movies with sound qual- helper application A PLUG-IN that runs
ity similar to that from a CD. HDTV signal in a browser’s window so that streaming
transmissions are digital rather than ana- video, sound, and other processes can be
log, and need to be compressed, using the used in the Web page. The helper applica-
MPEG-2 file format and compression tion is launched when the browser down-
standard, before transmission through the loads a file it cannot process. Many
narrow TV lines. The signals are then de- modern Web browsers no longer need
compressed in the television receiver. helper applications and can cope with the
more common multimedia file formats
HDX See half-duplex transmission. themselves.

head The part of a peripheral device that hertz /herts/ The SI unit of frequency. A
is in contact with the data medium, or very frequency of 1 hertz is obtained if one cycle
close to it, and that is responsible for writ- of an event is repeated every second.
ing data on the medium or for reading or
erasing data. For example, DISK DRIVES heuristic /hyû-riss-tik/ A method of
have magnetic heads; a magnetic head may solving a problem that, unlike an ALGO-
be a read head, a write head, an erase head, RITHM, cannot be guaranteed always to
or a read/write head, depending on its find a good solution or to run in an accept-
function. able time. Heuristics are used where there
is no satisfactory algorithm available and
head crash (disk crash) The accidental with the acceptance that, while they will
and disastrous contact of a read/write head usually work better than an algorithm, in

95
hex

some cases they will work very badly or hidden file A file that has the hidden at-
even fail. Steps must be taken to ensure tribute set and is not normally visible to
that such cases cannot arise in practice, or users; i.e. is not shown on directory listings
can be detected if they do and an alterna- or as an ICON when its FOLDER is opened in
tive heuristic used. Systems based on a window. Files are usually hidden to pro-
heuristics often monitor their own perfor- tect them from deletion or modification
mance and adjust their heuristics accord- and tend to contain critical system code or
ingly. Heuristic methods have been data. Most file-management utilities allow
employed, for example, to control the the user the option to view hidden files.
routing of data through computer NET-
WORKS: the actual performance of a net- hierarchical database A type of data-
work is used to influence subsequent base that is structured as a TREE: all
decisions on routing. Heuristic techniques records, or nodes, have one parent node
have also been applied to problems in AR- (except for the root node) and possibly one
TIFICIAL INTELLIGENCE and to the detection or more child nodes. No other kind of link
of VIRUSES and SPAM. between nodes is allowed. Hierarchical
databases are less powerful than RELA-
hex /heks/ See hexadecimal notation. TIONAL DATABASES. See also network data-
base.
hexadecimal notation /heks-ă-dess-ă-
măl/ (hex) A number system that uses 16 hierarchical file system A FILESTORE
digits and thus has BASE 16. The 16 digits where files are organized in directories
are represented by (folders) that contain other directories or
0, 1, 2, … 9, A, B, C, D, E, F folders as well as files. The highest level di-
It is a positional notation (see number sys- rectory is called the root and the directories
tem), positional values increasing from passed through to reach a file is the path.
right to left by powers of 16. Hex is a con- Introduced by the Unix operating system in
venient shorthand by which people (rather the 1970s, hierarchical file systems are
than computers) can handle binary num- now the norm.
bers. Each hex digit corresponds to a group
of 4 binary digits, or bits, as shown in the hierarchy of operators The ORDER OF
table. Conversion of binary to hex is done PRECEDENCEof OPERATORS in a particular
by marking off groups of 4 bits in the bi- programming language.
nary number (starting from the right) and
replacing each group by its hex equivalent. high-definition television See HDTV.
Conversion of hex to binary is done by re-
placing each hex digit by its equivalent bi- high-level language A type of PRO-
nary group. See also binary notation. GRAMMING LANGUAGE whose features re-
flect the requirements of the programmer
rather than those of the computer. It
HEXADECIMAL AND BINARY
achieves this by being designed for the so-
EQUIVALENTS
lution of problems in one or more areas of
application. High-level languages are thus
Binary Hex Binary Hex
described as applications-orientated (or
0000 0 1000 8 problem-orientated). They are easier for
0001 1 1001 9 the programmer to use than LOW-LEVEL
0010 2 1010 A LANGUAGES, being closer to natural lan-
0011 3 1011 B guage and to the language of mathematics.
0100 4 1100 C The programmer needs little knowledge
0101 5 1101 D of the computer on which the program is to
0110 6 1110 E run: unlike a low-level language a high-
0111 7 1111 F level language does not reflect the facilities
provided by computer hardware. Before

96
housekeeping

being run on a particular computer, how- the pointer to the beginning of the line or
ever, programs written in a high-level lan- to the top of a menu, or to some recognized
guage must be translated into a form that home position in an application.
can be accepted by that computer, i.e. they
must be converted into MACHINE CODE. home page 1. The entry page of a hy-
This is achieved by means of a special pro- pertext system, usually acting as the intro-
gram – either a COMPILER or an INTER- ductory page on a Web site. The address
PRETER. Each statement in the original for a Web site is usually the home page ad-
program – called the source program – is dress.
translated into many machine instructions. 2. An individual’s personal Web page.
A source program can be translated into
different machine codes using different host (host computer) 1. A computer run-
compilers or interpreters. As a result, pro- ning a SERVER, or that provides services in
grams written in high-level languages can some other way to computers on its net-
be moved from one computer to another. work. Hosts can range from microcomput-
The first high-level languages were re- ers to mainframes. For example, the host
leased in the late 1950s. The number and for a Web site is the computer whose Web
variety now available is large and still server software manages the site and
growing. Examples include BASIC, COBOL, makes it available on the WWW.
FORTRAN, PASCAL, ADA, PROLOG, JAVA, and 2. In mainframe computing, the host is the
C++. Some high-level languages are aimed mainframe and may have intelligent or
at specific areas of application. Cobol, for dumb workstations attached to it that use
instance, was developed for commercial it as a host provider of services.
data processing while Fortran is widely
used for scientific computation. Java was host computer See host.
originally designed for programs down-
loaded from the Internet. Other languages, hot key A user- or application-defined
such as Basic, Pascal, C++, and Ada, are key combination that executes a command
designed to be of more general use. or causes the operating system to switch to
another program. For example, in Win-
highlight To change the appearance of dows applications Ctrl-S often saves the
displayed text, giving it emphasis. Data file currently being edited.
that has been SELECTED is usually high-
lighted, by displaying it in reverse video. hotlist A list of frequently accessed Web
sites. See also bookmark.
history A list of actions recently per-
formed by a user. For example, many ap- hot swapping (hot plugging) The re-
plications have a feature that shows the last placement of a hard drive, CD-ROM drive,
few files opened, so that the user is able to or other device without the need for
open a previously used file quickly. Web switching off the computer or reconfigura-
browsers also display a history of the pre- tion or resetting of system parameters.
vious Web sites visited.
housekeeping Actions performed within
hit A success in matching data. a program or within a computer system in
order to maintain internal orderliness. In
HMD (head mounted display) The the case of a program it may, for example,
headgear worn in VIRTUAL REALITY applica- involve the management of storage space
tions. by freeing areas no longer required (see
garbage). In the context of an entire com-
home computer A computer specifi- puter system, housekeeping involves back-
cally aimed at the home computing market. ing up the filestore, deleting files that are
no longer required or whose expiry dates
home key The keyboard key that moves have passed, running appropriate pro-

97
HTML

grams to reduce FRAGMENTATION, and human-system interface (HSI) See


many other mundane but essential tasks. man-machine interface.

HTML (hypertext markup language) hybrid computer See analog computer.


The script programming code used to gen-
erate pages on Web sites. HTML is an ap- hyperlink See hypertext.
plication of SGML that uses tags or markup
symbols to identify elements such as for- hypermedia /hÿ-per-mee-dee-ă/ See hy-
matting, links, and other special handling pertext.
of images, text, and objects. A Web
browser then uses these tags to display the hypertext /hÿ-per-tekst/ Text that con-
page. Files in HTML format usually have tains links, accessible by computer, to
the extension htm or html. The earliest ver- other parts of the document or to other
sion of HTML had a fairly simple set of documents (i.e. text with automatic cross-
tags. However, with the increasingly so- reference lookup). Hypertext is most usu-
phisticated design of Web pages, more fea- ally held in HTML format, with certain
tures have been added allowing designers words or phrases tagged to point to other
to produce more advanced typographic places in the document or to places in other
and layout effects. HTML is being super- files. These words or phrases are hyper-
seded by XHTML, a reformulation of the links. They are usually displayed in a dif-
language as an application of XML. See also ferent color and are often underlined.
cascading style sheets; hypertext. When the pointer moves over the hyper-
link, it changes appearance (e.g. from an
HTTP (hypertext transfer protocol) The arrow to a finger), and clicking on the hy-
protocol used to connect Web client soft- perlink takes the display to the destination
ware with Web servers and download Web it specifies. This destination can be another
pages. It also contains facilities for sending file on the user’s machine or network, but
simple data to the Web server and also for it can also be any Web page on the World
uploading and managing Web pages. The Wide Web. (Indeed, the hyperlinks in Web
letters ‘http’ are used in URLs, as in pages are the glue that binds the WWW to-
http://www.google.com. gether.) Consequently the user can jump
from place to place, without having to read
HTTPS A variant of the HTTP protocol the whole document. Electronic publica-
that uses encryption to transfer sensitive tions now are usually not simply text but
information securely over the World Wide may also contain graphics, audio, video,
Web. The URL of Web sites that use HTTPS and animations, and are generally referred
begins with ‘https://...’ rather than to as hypermedia.
‘http://...’
hypertext markup language See
hub A device that allows an ETHERNET HTML.
network to use a similar physical layout to
a star network. Ethernet networks nor- hypertext transfer protocol See
mally require all NODES to be connected to HTTP.
a single cable in a bus layout, but can use a
more convenient starlike layout if each hyphenation /hÿ-fĕ-nay-shŏn/ The split-
node is connected to a central device – the ting of words using a hyphen at the ends of
hub – that emulates this by broadcasting all lines in text. Word-processing and DTP ap-
PACKETS it receives to all connected nodes. plications insert hyphens automatically.
See also network switch. These are called discretionary hyphens or
soft hyphens, whereas hyphens that are
human-computer interface (HCI) See added explicitly by entering the dash char-
man-machine interface. acter are called hard hyphens.

98
I

IA-64 A 64-bit processor and instruc- signed Names and Numbers) A private
tion set based on explicitly parallel instruc- non-profitmaking corporation that since
tion computing (EPIC) design philosophy, 1998 has administered Internet IP AD-
produced by Intel. In 64-bit mode these DRESSES, DOMAIN NAMES, and some techni-
processors can calculate two bundles on up cal matters.
to three instructions at a time. However in
32-bit mode they are slower because de- icon A pictorial symbol or small picture
coders must first translate 32-bit instruc- used in a GRAPHICAL USER INTERFACE to rep-
tion sets into 64-bit instruction sets. The resent an available resource (a file, a
ITANIUM was the first in Intel’s line of these printer, etc.). Double-clicking an icon or
processors. dragging it onto another icon will initiate
an appropriate action.
IAP (Internet access provider) See ISP.
IDE (integrated drive electronics; intelli-
IAR See instruction address register. gent drive electronics) An interface for
mass storage devices that is built into the
IAS (immediate access store) See main disk or CD-ROM. This replaced the sepa-
store. rate drive-specific disk controller card that
had formerly been required. The result was
IBG (interblock gap) See block. greater flexibility in the choice of disk dri-
ves because all makes of IDE disk drive
IBM International Business Machines; communicated with the rest of the com-
formerly the largest computer manufac- puter in a standard way that concealed the
turer in the world, formed in 1911. The details of their internal workings. Devel-
company’s main business was originally as oped in the 1980s, IDE has been super-
a producer of punched-card tabulating ma- seded by EIDE.
chines, and then later in mainframe com-
puting and office equipment manufacture. identifier A STRING of one or more let-
Its first microcomputer, called the IBM PC, ters, digits, or other characters selected by
was built in the early 1980s and set stan- a programmer to identify some element in
dards that were widely adopted. a program. An identifier can be a NAME or
a LABEL. The kind of element that can be
IBM-compatible (PC-compatible) De- identified depends on the programming
scribing a personal computer that was a language. It could, for example, be a VARI-
clone of the IBM PC and its successors. The ABLE, an ARRAY, a PROCEDURE, or a STATE-
PC’s open architecture was further devel- MENT. When the program is compiled or
oped and improved and was subsequently assembled, prior to execution, identifiers
known as industry-standard architecture are converted to machine addresses using a
(ISA). SYMBOL TABLE. See also literal; reserved
word.
IC See integrated circuit.
idle time Time during which the central
ICANN (Internet Corporation for As- processor of a computer system is perform-

99
IDSL

ing no useful function. It usually occurs See also case statement.


when the workload on the system is insuf-
ficient to keep the processor fully occupied, if then statement See if then else state-
or when the demands on the input/output ment.
components of the system are such that the
processor runs out of work before out- illegal character A character, possibly
standing input/output is completed. in a binary representation, that is not in the
CHARACTER SET of a particular computer or
IDSL (Internet digital subscriber line) A of a particular programming language.
connection that provides DSL (digital sub-
scriber line) technology over existing ISDN illegal instruction A MACHINE INSTRUC-
lines. IDSL has been superseded by other TION whose OPERATION CODE cannot be rec-
DSL technologies that offer higher transfer ognized by a particular computer with the
rates. result that the instruction cannot be exe-
cuted by the computer. Since neither a
IE See Internet Explorer. COMPILER nor an ASSEMBLER ought to be
able to generate an illegal instruction, a
IEEE (Institute of Electrical and Electronic message from the OPERATING SYSTEM claim-
Engineers) A US society of professional ing that one has been encountered is usu-
engineers that defines standards. The ally caused by accidentally using part of the
British equivalent is the IEE (Institution of main store containing instructions to store
Electrical Engineers). data, and subsequently trying to execute
the data.
IEEE 1394 See FireWire.
iMac /ÿ-mak/ A group of Apple Macin-
IETF (Internet engineering task force) An
tosh computers, introduced in 1998, in
international open community of people
which the monitor, the CPU, and the CD-
interested in Internet networking, includ-
ROM drive were all in one unit. A distin-
ing designers, operators, vendors, and re-
guishing feature was the translucent
searchers. They are responsible to the
colored case. iMacs were designed for
Internet Engineering Steering Group
(IESG) and propose solutions to various home, school, and small office use and pro-
technical problems occurring on the Inter- moted by Apple as an easy-to-use and styl-
net. The TCP/IP protocol was formulated ish computer that outperformed other
from their specifications. low-cost options. The iMac range has been
updated regularly and is now based around
IF, IF THEN See Basic. a FLAT PANEL MONITOR.

if then else statement A simple condi- image Any picture or diagram stored ei-
tional CONTROL STRUCTURE that appears in ther as a set of pixels (raster image) or as a
most programming languages and allows series of instructions for reproducing the
selection between two alternatives; the picture (vector image).
choice is dependent on whether a given
condition is true or not. An example is image compression The use of data
if it rains this afternoon compression techniques on graphics files to
then we go to the cinema reduce the amount of storage required. See
else we go for a walk also compression.
Most languages also provide an if then
statement to allow conditional execution image map An image on a Web page
of a single statement or group of state- that contains links to other parts of the
ments, for example page, other pages, or to files. On older Web
if you have a dog with you browsers these maps were executed
then put it on a lead through CGI scripts. However, with newer

100
index

browsers the maps are executed by the immediate addressing The process by
browser itself. which the data needed as the OPERAND for
an operation is actually held in the associ-
image processing (picture processing) ated MACHINE INSTRUCTION. Although the
The analysis and manipulation of informa- data contained there is usually restricted in
tion contained in images. The original sub- size, immediate addressing provides a con-
ject can be an actual object or scene, or a venient and quick way of loading small
photograph, drawing, etc. A numerical numbers into a REGISTER or ACCUMULATOR.
version of this subject is obtained electron- See also addressing mode.
ically, for example by scanning: the origi-
nal is effectively divided into a large implementation 1. The working ver-
number of tiny individual portions, and a sion of a given design of a system.
set of numbers is produced, corresponding 2. The processes involved in developing a
to the measured brightness and color of working version of a system from a given
these portions. The original is thus con- design.
verted into a two-dimensional ARRAY of 3. The way in which some part of a system
data. The individual portions are known as is made to fulfil its function.
pixels; the greater the number of pixels per
image, the greater the detail available. The import To bring some external object,
original is said to have been digitized. such as a picture or another file, into the
This numerical version of the original is current system or application. The format
of the information being imported must be
usually stored in a computer and can be
supported by the system receiving the data.
manipulated in various ways to highlight
different aspects of the original. For exam-
inactive window In a system capable of
ple, a specified range of brightness can be
displaying multiple windows, a loaded
increased, or two slightly different images
window that is not currently being used. It
can be compared or superimposed. The
may be totally or partially hidden by other
final form of the image can be produced on
windows and becomes active (receives the
a screen, printer, etc., and information de- focus) when selected by the user.
rived from the image can appear in graphs
or tables and can be further analyzed. inclusive OR A Boolean operator that
returns the value of true if either or both of
imagesetter /im-ij-set-er/ A typesetting the operands is true.
device that produces a very high resolution
output (paper or film). Imagesetters are ex- incremental backup A backup system
pensive and are used by specialized compa- in which the only data backed up is that
nies or bureaus. Most users provide changed since the last backup.
PostScript or PDF files, which have been
proofed by printing to PostScript laser index 1. A data structure consisting of a
printers, and are then processed by the im- set of POINTERS that can be used to locate
agesetter. records in another data structure (often a
DATA FILE) based on the value of a KEY
IMAP See POP3. within the records. An index allows
records where the key has a particular
IMHO In my humble opinion; one of value or range of values to be accessed di-
many abbreviations in common use on the rectly, without having to search for them
Internet, for example in newsgroups and e- sequentially through the entire structure. A
mails. It is used to soften a criticism in small index might be a simple list of key
order to avoid a FLAME. values, with pointers to the records in
which they occur, arranged in ascending
immediate access store (IAS) See main order. However, large indexes have more
store. complex structures to minimize lookup

101
indexed addressing

times. Common uses of indexes are in data- by a variety of methods, depending on the
bases and in INDEXED FILES and INDEXED SE- type of computer; it may for example be
QUENTIAL FILES. loaded from the ACCUMULATOR.
2. The value held in an INDEX REGISTER.
3. (subscript) A value, usually an integer or indirect addressing An ADDRESSING
integer expression, that is used in selecting MODE in which the address specified in a
a particular element in an ARRAY. MACHINE INSTRUCTION identifies a storage
location that itself holds an address. The
indexed addressing (indexing) An AD- address part of the instruction is thus an
DRESSING MODE in which the address given address of an address. It is called an indi-
in a MACHINE INSTRUCTION is modified by rect address. The second location identified
the contents of one or more INDEX REGIS- generally holds the required item of data,
TERS; the contents of the index register(s) but may however hold a further address.
are usually added to the address. The result
identifies a storage location. The address infection The corruption of a computer
specified in the machine instruction is system by a VIRUS.
called an indexed address. It may be an ac-
tual address or an address of an address infinite loop A LOOP in a program from
(see direct addressing; indirect addressing). which, under certain circumstances, there
is no exit except by terminating the pro-
indexed file A DATA FILE in which gram. This can be done accidentally, per-
records can be accessed by means of an haps by a while loop whose condition can
INDEX. This is stored in a separate portion
never be false, or deliberately when a pro-
of the file. An indexed file has characteris-
gram is to repeat a sequence of actions
tics of a random-access file. See also file; in-
until stopped by some external event such
dexed sequential file.
as an interrupt or termination by the oper-
ating system.
indexed sequential file A FILE whose
records are organized in such a way that
they are written sequentially and can be
infix notation /in-fiks/ A form of nota-
tion in which an OPERATOR is placed be-
read sequentially or by means of an index
(see file; indexed file). The index can be tween its OPERANDS, as in the arithmetic
used to read data randomly or to skip over expression
unwanted records in a sequential read. The a+b*c
records are accessed by means of an in- If no brackets are used the expression is
dexed sequential access method (ISAM). evaluated in a computer according to the
An indexed sequential file is similar to a ORDER OF PRECEDENCE of the programming

textbook: It can be read in chunks or language. See also reverse Polish.


straight through, or specific information
can be found using an alphabetical index. information The meaning that is car-
ried by DATA. Computers process data
indexing 1. See indexed addressing. without any understanding of its meaning;
2. The process of selecting an element from however, it is the information contained in
an ARRAY by means of its INDEX. data that is important to people.
3. The process of creating an index for a
data file or other data structure by analyz- information processing The organiza-
ing its contents. tion and manipulation of pieces of INFOR-
MATION in order to derive additional
index register A REGISTER that can be information. Information processing is the
specified by machine instructions using IN- principal means of increasing the amount
DEXED ADDRESSING. Its contents are used to and variety of information. The computer
modify the address given in the instruction. is an information-processing machine in
Data can be loaded into the index register which information is enhanced or ex-

102
initialize

tracted by appropriate manipulations of added to a message during the transmis-


the underlying data. sion process, altering the signal received
from that sent. Information theory is used
information retrieval The process of to work out the probability that a particu-
recovering information from a computer lar signal received is the same as the signal
system. The aim is to access only the infor- sent. Redundancy, for example simply re-
mation required, and to do so in the mini- peating a message, is needed to overcome
mum time with a minimum of simple the limitations of the system. Redundancy
instructions to the system. See also infor- can also take the form of a more complex
mation storage. checking process. In transmitting a se-
quence of numbers, their sum might also be
information storage The recording of transmitted so that the receiver will know
information, usually on magnetic disk, so that there is an error when the sum does
that it may be used at some later time. not correspond to the rest of the message.
There are various methods of organizing The sum itself gives no extra information
and labeling the information so that it may since, if the other numbers are correctly re-
be readily accessed. See also information ceived, the sum can easily be calculated.
retrieval. The statistics of choosing a message out of
all possible messages (letters in the alpha-
information superhighway A phrase bet or binary digits for example) deter-
coined by Al Gore, when Vice President of mines the amount of information that is
the USA, in one of his speeches. It points contained in it. Information is measured in
toward a worldwide system of unlimited bits (binary digits). If one out of two possi-
bandwidth connections direct to businesses ble signals are sent then the information
and homes, bringing unlimited amounts of content is one bit. A choice of one out of
data and information to educational insti- four possible signals contains more infor-
tutions, businesses, and homes. The term is mation, although the signal itself might be
often used as a synonym for the INTERNET. the same.

information technology (IT) Any form infrastructure Generally the actual


of technology, i.e. any equipment or tech- hardware and software used to intercon-
nique, used by people to handle informa- nect computers and users on a large net-
tion. Although the abacus and the printing work, including such items as telephone
press are examples of IT, the term usually lines, cable television lines, satellites, and
refers to modern technology based on elec- antennas together with devices that control
tronics. It thus incorporates both the tech- transmission paths. The term is used espe-
nology of computing and of telephony, cially of the INTERNET, where infrastructure
television, and other means of telecommu- companies have been significant in its
nication. It has applications in industry, growth as they affect decisions as to where
commerce, education, science, medicine, interconnections are placed and made ac-
and in the home. The development of IT is cessible and how much information is car-
recognized worldwide as being of major ried.
importance, especially since cost reduc-
tions have made large-scale IT systems eco- Ingres /ang-grĕ/ An early relational data-
nomically possible. base management system that was devel-
oped from a research project at the
information theory The branch of University of California in the 1970s. It in-
probability theory that deals with uncer- fluenced several later systems.
tainty, accuracy, and information content
in the transmission of messages. It can be initialize /i-nish-ă-lÿz/ To set COUNTERS,
applied to any system of communication, contents of storage LOCATIONS, VARIABLES,
including electrical signals and human etc., to zero or to some other specific value
speech. Random signals (noise) are often before the start of some operation, usually

103
ink-jet printer

at the beginning of a program or program for example be a temperature sensor.


unit. The value set is known as the initial There may be many input devices in a com-
value. Many programming languages pro- puter system, each device providing some
vide a facility for specifying initial values of means of communication with the com-
variables when the variable is first de- puter; input devices used by people are said
clared. to provide a MAN-MACHINE INTERFACE.
Compare output device.
ink-jet printer A type of PRINTER in
which fine drops of quick-drying ink are input medium See media.
projected on to the paper to form the char-
acters. It is thus a nonimpact matrix printer input/output (I/O) Components or
and is much quieter in operation than an processes in a computer system that are
impact printer. In one design the print head concerned with the passing of information
contains a column of nozzles, each capable into and out of the system, and thus link
of ejecting a single drop of ink at a time. As the system with the outside world.
the head moves along the line to be printed,
the appropriate characters are built up. In input/output bus (I/O bus) See bus.
another design the head has only a single
nozzle that emits a jet of ink. The jet is input/output device (I/O device) Any
made to break up into droplets, and each device in a computer system that can func-
droplet is electrically charged; this charge tion both as an INPUT DEVICE and an OUTPUT
enables a droplet to be deflected vertically DEVICE, and can thus be used both as an
as it flies towards the paper. As the head entry point and as an exit point for infor-
moves along the line to be printed, the ap- mation. TERMINALS are I/O devices.
propriate characters are built up. This lat-
ter design is slower than the design with the input/output file (I/O file) A FILE used
column of nozzles, which can print up to to hold information immediately after
400 characters per second. Color ink-jets input from or immediately before output
can produce a large number of colors by to an INPUT/OUTPUT DEVICE.
mixing the inks as they print.
input/output processor (I/O processor)
input /in-pût/ 1. The data or programs See direct memory access.
entered into a computer system by means
of an INPUT DEVICE. insert key A keyboard key, labeled Ins
2. The signal – voltage, current, or power – or Insert, that toggles between overwrite
fed into an electric circuit. mode (i.e. characters typed on the key-
3. To enter data, programs, or signals into board replace those at the current position
a system. on the screen) and insert mode (i.e. typed
characters are inserted before those at the
INPUT See Basic. current position) when editing.

input device Any device that transfers install /in-stawl/ 1. To store and config-
data, programs, or signals into a computer ure software permanently so that it can be
system. Examples include KEYBOARDS, run on a particular computer and make use
graphical devices such as a MOUSE or DIGI- of the various peripherals attached to that
TIZING PAD, VOICE INPUT DEVICES, SCANNERS computer. Software and games can be ob-
and DOCUMENT READERS, SAMPLING devices tained on CDs or DVDs and installed from
that convert analog data, such as video and these media, or they can be downloaded
sound, to digital form, and independent and installed from the Internet.
digital devices, such as digital cameras and 2. To add hardware to a system.
camcorders, whose data can easily be
transferred to a computer. An input device installation program (setup program)
need not be operated by a person – it could A program provided with an operating sys-

104
integer arithmetic

tem or application program that facilitates the next instruction from the INSTRUCTION
the process of installation. The user is ADDRESS REGISTER, fetches this instruction
guided through a question-and-answer ses- from main store (via the MEMORY DATA
sion that will enable the software to be set REGISTER), and places it in the instruction
up and run effectively. register. The control unit can then interpret
the instruction in the instruction register
instruction See machine instruction. and cause the instruction to be executed.
See also microprogram.
instruction address register (IAR) A
REGISTER, i.e. a temporary location, in the instruction set All the instructions that
CONTROL UNIT from whose contents the AD- are available in a particular MACHINE CODE
DRESS of the next machine instruction is de- or ASSEMBLY LANGUAGE, i.e. all the instruc-
rived. It thus stores in turn the addresses of tions that a particular computer is capable
the instructions that the computer has to of performing. See machine instruction.
carry out. Each time the control unit
fetches an instruction, it automatically in- INT /int/ See Basic.
creases the contents of the IAR by one. If
the sequence of the instructions is altered integer /in-tĕ-jer/ Any positive or nega-
by an unconditional JUMP INSTRUCTION, the tive whole number, or zero. Integers be-
contents of the IAR are changed to the ad- long to the set … –4, –3, –2, –1, 0, +1, +2,
dress indicated by the jump instruction; in +3, +4, …
the case of a CONDITIONAL JUMP instruction, Negative integers carry a minus sign to dis-
the contents of the IAR are changed only if tinguish them from positive integers. Posi-
the condition is met. tive integers do not necessarily carry a plus
Since the contents of the IAR are incre-
sign. Any integer without a sign is said to
mented so as to point to the start of the
be unsigned.
next instruction, the IAR is a COUNTER and
Unsigned integers are stored in a com-
hence is also called an instruction counter
puter in BINARY NOTATION, i.e. as a se-
or a program counter.
quence of bits making up a WORD; the
sequence is the binary equivalent of the in-
instruction counter See instruction ad-
teger. In a machine with a 16-bit word, 216
dress register.
(i.e. 65 536) possible values can be stored,
instruction cycle See fetch-execute ranging from 0000000000000000 to
cycle. 1111111111111111. These represent the
integers from 0 to 216 – 1, i.e. from 0 to
instruction format The layout of a MA- 65 535. Signed integers are usually stored
CHINE INSTRUCTION, showing its con- in two’s complement (see complement),
stituent parts. and a 16-bit word then stores values from
–215 to +(215 – 1), i.e. from –32 768 to
instruction overlap See control unit. +32 767. See also integer arithmetic; real
number.
instruction prefetch /pree-fech/ See
control unit. integer arithmetic Arithmetic involving
only INTEGERS. The addition, subtraction,
instruction register (IR; current instruc- and multiplication of integers always pro-
tion register, CIR) A REGISTER (i.e. a tem- duces an integer as a result. In integer arith-
porary location) usually in the CONTROL metic, an integer division also always
UNIT, used for holding the MACHINE IN- produces an integer result, unlike normal
STRUCTION that is currently being per- arithmetic. This is achieved by ignoring the
formed or is about to be performed. Once remainder. Hence in integer division 7 di-
the control unit has finished execution of vided by 2 equals 3 (rather than 3.5). Other
one instruction, it obtains the address of examples are shown in the table overleaf.

105
integer division

tion technologies have advanced, ICs have


INTEGER DIVISION
become cheaper, with improved perfor-
Operation Integer Remainder Normal mance and reliability. In addition, the
result result number of components that can be fabri-
cated on a single chip is continuously and
9÷4 2 1 2.250
rapidly increasing; the greatest density is
47 ÷ 3 15 2 15.666
now over one hundred million per chip.
98 ÷ 5 19 3 19.60
IC technology can be classified accord-
1÷2 0 1 0.50
ing to the number of elements per chip,
ranging through ULSI (ultra large scale in-
tegration), VLSI (very large scale integra-
tion), LSI (large scale integration), MSI
In a modulo operation the result is the (medium scale integration), and SSI (small
remainder after one integer is divided by scale integration). The range goes from
another. This is usually written i modulo j more than 1 000 000 in ULSI down to 10
for the division of integer i by integer j. or more in SSI.
Hence 47 modulo 3 is equal to 2.
Many programming languages have integrated office system A program
special operators and functions to perform that performs several functions concerned
integer arithmetic. Pascal has div and mod with office tasks. It combines some of
operators for integer division and remain- the functions previously performed by
dering (i div j and i mod j where i and j are single-purpose programs, such as WORD
integers); Fortran assumes integer division PROCESSORS, SPREADSHEETS, DATABASE MAN-
if both operands are integers (I/J gives an AGEMENT SYSTEMS, or programs to create
integer result if I and J are integers), but has graphs and charts. The results of the vari-
a special function for the remainder ous sections can usually be loaded into
(MOD(I,J)); C and C++ use / for division in other sections where appropriate and
a similar fashion, and % for remaindering. merged to form a final document contain-
The original version of Basic had no con- ing textual, pictorial, and tabular material.
cept of integers as such, but most modern
forms remedy this in one way or another. integrity A measure of the correctness of
data following processing. For data to have
integer division See integer arithmetic. integrity, it should not have been acciden-
tally altered or destroyed during processing
integrated circuit (IC) A complete elec- by errors arising in the hardware or soft-
tronic circuit that is manufactured as a sin- ware of the system. (Neither should it have
gle package: all the individual devices been deliberately altered or destroyed by
required to realize the function of the cir- an unauthorized person.) System errors do
cuit are fabricated on a single CHIP of semi- occur from time to time. Normally, there-
conductor, usually silicon. Components fore, protective DUMPS are organized on a
(mainly transistors and diodes) can be regular basis. This ensures the existence of
combined to make a wide variety of cir- a valid copy of a recent version of every file
cuits, including LOGIC CIRCUITS and SEMI- stored in the system. See also security; pri-
CONDUCTOR MEMORY. vacy.
Integrated circuits can be fabricated
using either MOS technology or bipolar Intel /in-tel/ Trademark One of the
technology. MOS devices in general use largest microprocessor manufacturers,
less power and are more densely packed Intel Corporation, founded in 1968. Intel
with components than bipolar devices, but developed the 4004, which was the first
cannot operate as quickly as bipolar de- successful microprocessor, and the 8088
vices. Bipolar technology is used to pro- used in the first IBM PC. Earlier designs
duce the components of central processors have now been replaced by Intel’s PENTIUM
in large computers. As these two fabrica- series of chips.

106
interface

intelligent Describing a device that is interface /in-ter-fayss/ In general, a com-


controlled in part or totally by one or more mon boundary between two devices, two
integral processors and so does not require systems, or two software components. The
every detail of its operation to be specified word is often used to describe the elec-
by the computer. tronic circuitry plus associated software
that is required to connect two computer
intelligent terminal See terminal. systems or two components of a computer
system such as a peripheral device and the
interactive /in-ter-ak-tiv/ Denoting a de- central processor. The interface compen-
vice, system, application, etc., in which sates for differences in the speed of work-
there is an immediate response by the com- ing of the interconnected units and, if
puter to instructions as they are input by different CHARACTER ENCODINGS are used in
the user. The instructions can be presented the two units, will translate from one code
by various means – for example, a key- to the other.
board, a mouse, a light pen, or a digitizing Several interfaces are classified as stan-
pad. The response usually occurs suffi- dard interfaces; these may be developed by,
ciently rapidly that the user can work al- say, a national electronics association or an
most continuously; this mode of operation, international body, or they may be indus-
involving apparently continuous commu- try standards. All the characteristics of a
nication between user and computer, is standard interface are in accordance with a
thus often called conversational mode. See set of predetermined values. Use of a stan-
also multiaccess system. dard interface allows computer systems
and components from different manufac-
interblock gap /in-ter-blok/ (IBG) See turers to be interconnected. An example of
block. a standard interface is the USB interface,

MAIN INTEL MICROPROCESSORS

Name Date first Number of Clock speed Data width MIPS


introduced transistors
on the chip
4004 1971 2300 108 KHz 4 bits 0.06
8008 1972 3500 200 Khz 8bits 0.06
8080 1974 6000 2 MHz 8 bits 0.64
8088 1979 29 000 5 MHz 16 bits 0.33
8-bit bus
80286 1982 134 000 6 MHz 16 bits 1
80386 1985 275 000 16 MHz 32 bits 5
80486 1989 1 200 000 25 MHz 32 bits 20
Pentium 1993 3 100 000 60 MHz 32 bits 100
64 bit bus
Pentium Pro 1995 5 500 000 150 MHz 32 bits 100+
64-bit bus
Pentium II 1997 7 500 000 233 MHz 32 bits ~300
64-bit bus
Pentium III 1999 9 500 000 450 MHz 32 bits ~510
64-bit bus
Pentium 4 2000 42 000 000 1.4 GHz 32 bits ~1700

In 2005 Pentium chips were produced with clock speeds of over 3.5 GHz, with about
170 million transistors, and a 64 bit data width.

107
interface card

which was developed jointly by several now the Internet offers such services as e-
computing companies. See also RS232C mail, World Wide Web, IRC, Telnet, FTP,
interface. and news channels and is used for the ex-
In software, an interface of a module is change of data, news, conversation, and
a set of FUNCTIONS, PROCEDURES, and PROP- commerce. It is still decentralized in that no
ERTIES that can be used by the rest of the one person, organization, or country con-
program. Interfaces are important in soft- trols it or what is available through it.
ware development, for they allow different
modules of a program to be developed by Internet access The capability of a user
different teams, or even different compa- to connect to the Internet. A home user and
nies, that do not need to know the details many smaller organizations generally con-
of each other’s work. If all interaction be- nect through a MODEM or ADSL TRANS-
tween the modules is via agreed interfaces, CEIVER connected to a personal computer
the modules can be treated as BLACK BOXES. and, via a telephone line, to an ISP. Larger
Standards that include systems for specify- users may connect through a dedicated
ing interfaces, such as COM, CORBA, and line. Communications can also be estab-
.NET, allow pre-built third-party compo- lished using TV set-top boxes and cell-
nents to be integrated into a program. phones, although these tend to offer a
restricted service.
interface card (interface board) See ex-
pansion card. Internet address See domain name.
interlacing /in-ter-layss-ing/ 1. A tech- Internet Engineering Task Force See
nique for raster scanning in which all odd
IETF.
numbered scan lines are updated in one
sweep of the electron beam and all even
Internet Explorer (IE) A Web browser
numbered in the next sweep. This means
produced by Microsoft and introduced in
that the number of lines displayed and the
1995. It is, controversially, integrated into
information carried by the display signal
WINDOWS.
are halved. Images produced by interlacing
are not as clear as those produced by pro-
gressive scanning and, since the reaction Internet presence provider (IPP) A
time is slow, images such as animation and company that provides disk space, high
video may flicker or appear streaked. speed Internet connection, and possibly
2. The technique of displaying a graphics Web design and other services for compa-
image so that alternating rows are dis- nies or individuals requiring a presence on
played in separate passes. The effect is that the Internet.
the image is displayed quickly and then the
details are filled in gradually. It is often Internet protocol See IP.
used for images on Web pages.
Internet protocol security (IPSec) A
internal modem A MODEM that resides standard for security at the network or
on an expansion board that fits into one of packet-processing layer of a TCP/IP net-
the expansion slots on a personal com- work system. (Previously security has been
puter. Compare external modem. applied at the application layer of the com-
munications model.) IPSec is useful for vir-
Internet /in-ter-net/ (the Net) The com- tual private networks (VPNs) and for
plete worldwide system of networks and remote access through dial-up connections
gateways that communicate using the to a private network.
TCP/IP group of protocols. It was set up as
a decentralized network called ARPANET Internet relay chat (IRC) An Internet
by the US Department of Defense in 1969. service provided by an IRC server, en-
Later other networks were connected and abling a user to CHAT with other users.

108
IP address

Internet service provider (ISP) See ISP. there are different procedures – interrupt
service routines – to be executed for each
Internet Voice See VoIP. kind of interrupt, and (c) when the correct
action has been taken, control is returned
internetworking The process and sci- to the task that was being processed when
ence of connecting individual LANs to cre- the interrupt occurred.
ate WANs and connecting WANs to form Interrupts can be caused by an external
even larger WANs. This is an extremely event, such as a key being depressed on a
complex technology and is accomplished keyboard. They can also be caused by in-
using routers, bridges, and gateways to ternal conditions in the processor, such as
deal with the differing protocols used the detection of an attempt to divide by
across the various networks. zero. This kind of interrupt is called a hard-
ware interrupt. A software interrupt works
InterNIC /in-ter-nik/ (Internet network in- in the same way but is triggered by a MA-
formation center) The organization for- CHINE INSTRUCTION in a program. Each in-
merly responsible for registering and terrupt has a priority: higher-priority
maintaining top-level Internet domain interrupts may interrupt the servicing of
names. Its functions have been taken over lower-priority interrupts but not the other
by ICANN. way round.

interoperability /in-ter-op-er-ă-bil-ă- interrupt request See IRQ.


tee/ The ability of software and hard-
ware from different vendors, and using intranet /in-tră-net/ A private internal
different operating systems, to communi- company network sharing management in-
cate effectively. formation and computer resources among
employees. It behaves like a small private
interpreter A means of converting a WWW and is based on similar technolo-
program written in a HIGH-LEVEL LANGUAGE gies. Sometimes an intranet may be con-
into a form that can be accepted and exe- nected to the Internet; usually this is done
cuted by a computer. An interpreter is a through a FIREWALL to prevent unautho-
program that analyzes each line of code in rized access to information. See also ex-
the high-level language program – the tranet.
source program – and then carries out the
specified actions. In contrast to a COM- inverse video See reverse video.
PILER, an interpreter does not translate the
whole program prior to execution. Pro- inverter See NOT gate.
gram run times are much slower than when
a compiler is used. An interpreter does, I/O See input/output.
however, simplify the process of loading
and running source programs, and allows IP (Internet protocol) The standard pro-
source programs to be changed even while tocol defined in STD 5, RFC 791, which is
running. Some languages, such as BASIC, the network layer for the TCP/IP protocol
are found in both interpreter and compiler suite. It is a connectionless best-effort
versions; others, such as FORTRAN and C++, packet-switching protocol. The Internet is
are not suitable for interpreters and are al- currently based on version 4 of IP (IPv4),
ways compiled, while others, such as POST- but use of version 6 (IPV6) is spreading
SCRIPT, are always interpreted. slowly. See also IP address.

interrupt A signal that is sent to a IP address The unique 32-bit number


processor, making it suspend its current that identifies a host to other hosts on the
task and start another. The main features Internet. It is used when communicating by
of interrupts are that (a) they include infor- the transfer of packets using IPv4 (see IP).
mation as to what caused the interrupt, (b) About 4 billion hosts can be identified by

109
Ipng

this means. However, the growth of the In- ISAM /ÿ-sam/ (indexed sequential access
ternet is making this number inadequate. method) See indexed sequential file.
This problem is confronted by IPV6, which
supports 128-bit IP addresses. ISDN (integrated services digital network)
A telephone service that combines voice
Ipng (Internet protocol next generation) and digital network services in a single
An old name for IPV6. medium. Most ISDN lines offered by tele-
phone companies give two 64 kbps lines at
iPod Trademark A range of MP3 PLAYERS once, where one can be used for voice and
manufactured by Apple Computer, Inc. one for data, or both for data, which dou-
First released in 2001, the iPod has come to bles the transmission rate. For computing
purposes, such as Internet access, ISDN is
dominate the MP3-player market.
being superseded by ADSL.
IPTV The delivery of television over the
ISO The International Organization for
Internet. This is not yet practical because it
Standardization, the body that establishes
requires a higher BANDWIDTH than is pro-
international standards in industry, etc.,
vided by current BROADBAND connections, including those used in computing. Exam-
but it is expected to become important in ples include standards for many HIGH-
the next few years. LEVEL LANGUAGES, CHARACTER SETS and
CHARACTER ENCODINGS, aspects of net-
IPv6 (Internet protocol version 6) The working, and data formats for CDs and
latest level of the Internet protocol. Future other storage devices. While compliance
growth of the Internet is provided for by with such standards encourages interoper-
the lengthening of IP addresses from 32 ability, many manufacturers’ products de-
bits to 128 bits, enabling many more ad- viate from the relevant standard(s) for
dresses to be assigned. However, the adop- commercial reasons. See also ANSI.
tion of IPv6 has so far been slow because of
the problems and expense of integration ISO-7 A CHARACTER ENCODING scheme
with the existing, IPv4-based, Internet. See developed by ISO and hence internationally
also IP; IP address. agreed. ISO-7 uses 7 bits for each charac-
ter, and so provides 27, i.e. 128, different
IR See instruction register. bit patterns. Certain bit patterns are re-
served for national use, allowing countries
IRC See Internet relay chat. to include the symbols used for their cur-
rency, the accents used above and below
IRQ (interrupt request) A hardware line letters, etc. The US version is ASCII, which is
over which a device can send an inter- a code widely used in computing.
rupt signal to a computer. Sometimes DIP
ISP (Internet service provider) A com-
switches are used to set a device’s IRQ
pany that provides access to the Internet,
number before attaching to a computer.
usually for a charge. A software package,
Conflicts can occur when adding EXPAN-
username, password, and (if appropriate)
SION CARDS, but PLUG-AND-PLAY technology
access phone number are provided, and ac-
has largely resolved this problem. cess can be obtained through a modem,
ADSL transceiver, or by direct connection
ISA /ÿ-să/ (industry standard architecture) from a company’s network. An ISP is also
A standard bus architecture that was orig- called an Internet access provider (IAP).
inally associated with the IBM AT mother-
board. It allowed for 16 bits to flow IT /ÿ-tee/ See information technology.
between the motherboard and an expan-
sion card and its associated devices. It is Itanium /ÿ-tay-nee-ŭm/ The first mem-
now obsolete. See also EISA. ber of Intel’s IA-64 family of processors. It

110
iterative

is a 64-bit microprocessor and its main use FOR I = 1 to 100


is driving large applications requiring more S = S + X(I) ↑ 2
than 4 GB memory, such as databases, 120 NEXT I
ERP, and future Internet applications. It Iteration is also a method of solving a
has been succeeded by the Itanium 2. problem by successive approximations,
each using the result of the preceding ap-
iteration /it-ĕ-ray-shŏn/ (iterative process) proximation as a starting point to obtain a
Any process in which a sequence of opera- more accurate estimate. For example, the
tions is performed either a predetermined square root of 3 can be calculated by writ-
number of times or until some condition is ing the equation x2 = 3 in the form 2x2 = x2
satisfied. The repetition of the sequence + 3, or x = ½(x + 3/x). To obtain a solution
can be executed by means of a LOOP in a for x by iteration, we might start with a
program. Iteration is used, for example, to first estimate, x1 = 1.5. Substituting this in
obtain a numerical result: as the sequence the equation gives the second estimate, x2 =
of operations is repeated, the result of each ½(1.5 + 2) = 1.750 00. Continuing in this
cycle comes closer and closer to the desired way, we obtain:
value. x3 = ½(1.75 + 3/1.75) = 1.732 14
An iteration (in Basic) for calculating
the sum of the squares of numbers from 1 iterative /it-ĕ-ră-tiv/ Involving repeti-
to 100 is as follows: tion. See iteration; control structure; loop.

111
J

jabber An error in which corrupted or run on any platform. However, JavaBeans


meaningless data is continually transmitted must be developed in Java.
onto a network by a faulty device, often a
NIC. This may result in a network jam as JavaScript A programming language
other devices will ‘see’ the network as busy. developed by Netscape Communications
Corporation and Sun Microsystems. It al-
jaggies /jag-eez/ The display or printing lows HTML authors to script limited Java
of smooth straight lines or curves in stair- functionality directly into the text of an
like steps, often because the monitor or HTML file and is generally considered to
printer does not have a high enough reso- be easier to write than JAVA. JavaScript
lution to show a smooth line. Jaggies can runs in and manipulates Web browser en-
also occur when a bit-mapped image is vironments, such as INTERNET EXPLORER,
converted to a different resolution. Anti- MOZILLA FIREFOX, and NETSCAPE NAVIGA-
aliasing and smoothing can reduce the ef- TOR. When JavaScript is combined with
fect. CASCADING STYLE SHEETS (CSS), and ver-
sions of HTML 4.0 and later, the result is
JANET /jan-ĕt/ (Joint Academic Network) often called DYNAMIC HTML.
An important WAN in the United King-
dom that primarily links all university and
Java virtual machine (JVM) An INTER-
higher education networks. It is part of the
PRETER or JUST-IN-TIME COMPILER used to
Internet.
translate compiled Java code, known as
bytecode, into the machine code of what-
Java /jah-vă, jav-ă/ An object-oriented
ever computer the Java application or ap-
programming language created by Sun Mi-
crosystems. It was specifically designed for plet is running on. This is the way in which
writing programs that can be safely down- Java achieves its multiplatform ability.
loaded and immediately run on a variety of
platforms without fear of viruses or other JCL See job control language.
harm to the user’s computer files. Java pro-
grams are compiled to a machine-indepen- JDK (Java development kit) A software
dent code called bytecode, which is run by development package from Sun Microsys-
a JAVA VIRTUAL MACHINE. In addition, small tems that provides the basic set of tools
Java programs called applets may be em- needed to write, test, and debug Java ap-
bedded in Web pages to include functions plications and applets.
such as animations and calculations. Java
was mainly inspired by C++. See also JDK. Jini Sun Microsystems software that
aims to simplify the connecting and shar-
JavaBeans Objects conforming to the ing of devices on a network. A device that
standard developed by Sun Microsystems incorporates Jini announces itself to the
that defines how Java objects interact. A network, providing details about itself, and
JavaBean is similar to an ACTIVEX control. immediately becomes available to other de-
It can be used by any application that un- vices on the network. The software works
derstands the JavaBeans format and can be by passing applets back and forth among

112
jump

devices and any computer that can run duced and often used as a trail to aid re-
Java will be able to access this code. covery in the event of problems occurring.
It is used to contain details of network
JIT compiler See just-in-time compiler. transactions, such as file usage or message
transfer information.
job A set of programs and the data to be
manipulated by these programs, regarded joystick A device for generating signals
by a computer system as a unit of work. that can control movement on a display. It
The complete description of a job, required is a shaft a few inches in height that is
for its execution, is written in a JOB CON- mounted in an upright position in a base
TROL LANGUAGE. and can be pushed or pulled by the opera-
tor in any direction. Generally, the device
job control language (JCL) A special also has control buttons. Joysticks are
kind of programming language by means most commonly used in computer games.
of which a user can communicate with the
OPERATING SYSTEM of a computer. It is em- JPEG /jay-peg/ (joint photographic experts
ployed most often in connection with group) A compression standard common
BATCH PROCESSING format for image files. It is especially used
A JCL is used to write the sequence of for photographic images. Files in this for-
commands that will control the running of mat often have the extension jpg.
a JOB on a particular computer: an initial
command identifies the job while subse- Julia set A set of points in the complex
quent commands are each an instruction plane defined by iteration of a complex
for the operating system to take some ac- number. One takes the expression z2 + c,
tion on behalf of the user. For example, where z and c are complex numbers, and
there are usually commands to run a spec- calculates it for a given value of z and takes
ified program, find input data at a specified the result as a new starting value of z. This
source, and output results at some speci- process can be repeated indefinitely and
fied destination. The objects manipulated three possibilities occur, depending on the
in a JCL are thus not VARIABLES as in a nor- initial value for z. One is that the value
mal programming language but can, for tends to zero with successive iterations.
example, be complete programs or the Another is that the value diverges to infin-
input or output streams for these pro- ity. There is, however, a set of initial values
grams. A JCL command can be obeyed as of z for which successive iterations give val-
soon as it is keyed. Alternatively a com- ues that stay in the set. This set of values is
plete set of JCL commands can be stored a Julia set and it can be represented by
and executed later. See also command lan- points in the complex plane. The Julia set is
guage. the boundary between values that have an
attractor at zero and values that have an at-
job queue/stream The lining up of jobs tractor at infinity. The actual form of the
for a computer device such as a printer. Julia set depends on the value of the con-
stant complex number c. Thus, if c = 0, the
Josephson junction /joh-zĕf-sŏn/ The iteration is z → z2. In this case the Julia set
junction between a thin layer of insulating is a circle with radius 1. There is an infinite
material and a superconducting material number of Julia sets showing a wide range
across which a superconducting current of complex patterns. See also Mandelbrot
can flow in the absence of an applied volt- set.
age. Josephson memory, a cryogenic mem-
ory, uses Josephson cells that contain jump (branch) A departure from the
Josephson junctions, and is inherently ex- normal sequential execution of program
tremely fast but expensive to run. instructions. It is used when writing a pro-
gram in ASSEMBLY LANGUAGE or MACHINE
journal A log that is computer-pro- CODE. Instead of performing instruction 1,

113
jumper

then instructions 2, 3, 4, and so on, there word can be used if the space in a line is too
could be a jump from, say, instruction 3 to great. WORD PROCESSING systems allow the
instruction 19. This departure from nor- user to specify both the right and the left
mal program flow is specified by using a margin, between which text is automati-
special instruction in a program, known as cally justified as it is typed in; hyphenation
a jump instruction (or branch instruction). is offered as an option.
A jump can be either unconditional or 2. To shift the contents of a REGISTER, if
conditional. An unconditional jump takes necessary, so that the bit at a specified end
place whenever the instruction specifying it (right-hand or left-hand) of the data en-
is executed (see instruction address regis- tered in the register is at a specified posi-
ter). A conditional jump takes place only if tion (usually the right- or left-hand end) of
specified conditions are met, for example if the register. The contents are then said to
the contents of the accumulator equal zero be right-justified or left-justified, as the
or if the value of some variable exceeds a case may be.
stated number.
Jump instructions offer the only way of just-in-time compiler (JIT compiler) A
controlling the flow of events when using compiler that operates when a program is
assembly language or machine code. This run. Such programs are normally compiled
can lead to programming errors. Most in two stages. The source code is first
high-level languages offer improved facili- processed by a normal compiler, which
ties in the form of a variety of CONTROL checks for syntax errors, performs opti-
STRUCTURES. See also GOTO statement.
mizations, etc.; however, this compiler
does not generate MACHINE CODE but rather
jumper A small piece of plastic-encased
a machine-independent code, known as in-
metal that closes a circuit so that electricity
termediate language or bytecode. When
can flow through. The jumper is placed
the program is run, the JIT compiler trans-
across two metal pins sticking out of a cir-
lates this code into machine code for each
cuit board. Sometimes jumpers are used to
configure expansion boards; by placing program section when it is first used. (This
them over different sets of pins the board’s differs from an INTERPRETER, which trans-
parameters can be changed. lates each program section every time it is
used.) Unlike a traditional compiler a JIT
jump instruction (branch instruction) compiler is aware of its operating environ-
See jump. ment and can vary the machine code it gen-
erates accordingly; for example it can often
justify 1. To control the positions of determine the exact version of the comput-
printed or typed characters so that regular er’s central processor and take advantage
vertical margins to a page or column of of any special MACHINE INSTRUCTIONS that
text are obtained; the lines are then said to version provides to produce optimal code.
be justified. In some cases only one margin The slight overhead of compiling during
is aligned; the lines are then said to be left- program execution has been shown not to
justified when the left-hand margin is regu- affect the speed of many applications to
lar or right-justified when the right-hand any significant degree; nevertheless there
margin is regular. When both margins are remain programs where this overhead is
to be aligned, the spaces between words significant, and for these traditional com-
(and sometimes between letters) is adjusted pilation remains the appropriate method.
until each line fills the distance between the
two specified margins. Hyphenation of a JVM See Java virtual machine.

114
K

K (k) A symbol used in computing for an operating system, typically responsible


KILO-, or sometimes for kilobyte or kilobit. for hardware resource allocation and man-
agement. In order to share the hardware
Kb A symbol for kilobit. between multiple processes, it implements
the basic facilities for MULTITASKING. The
KB A symbol for kilobyte. kernel is the part of the operating system
that loads first, and it remains in memory
Kerberos /ker-bĕ-ross/ A secure method until the computer is shut down. It is part
of computer network user authenticating of the SUPERVISOR.
developed by Massachusetts Institute of
Technology. Kerberos is used in network key 1. A labeled button or marked area
applications and relies on trusted third- on a KEYBOARD.
party servers for authentication. A user re- 2. A value held in one of the fields of a
quests an encrypted ticket from the RECORD and used to identify that record in
authentication process that can then be a collection of records (usually a FILE or
used to access a particular service from a TABLE). See also index; searching; sorting.
server. A version of Kerberos can be down- 3. In CRYPTOGRAPHY, a pattern of bits, usu-
loaded from MIT and it is used in com- ally expressed as a STRING or a large num-
mercial products. ber, that governs the cipher code produced
by an encryption algorithm for a particular
Kermit A popular file transfer protocol piece of plain text, and allows the equiva-
used in asynchronous communications be- lent decryption algorithm to recover the
tween computers (not the same as FTP). It plain text from the cipher.
runs in most operating environments and
provides an easy method of file transfer. keyboard A manually operated input
Kermit was developed at Columbia Uni- device for converting letters, digits, and
versity in the USA. other characters into coded form. It is the
most commonly used means by which peo-
kernel /ker-nĕl/ The central module of ple can communicate with a computer. It

function keys
Print Scroll Pause
Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 Screen Num Caps Scroll
Lock
SysRq Break Lock Lock Lock

¬ ! “ £ $ % ^ & * ( ) _ + Insert Home Page


Num
Lock / _
`
l 1 2 3 4 c 5 6 7 8 9 0 - = Up *
{ } 7 8 9
Q W E R T Y U I O P Delete End Page
[ ] Down Home Pg Up

: ~ 6
+
Caps A S D F G H J K L @ 4 5
Lock
; ‘ #
| Z X C V B N M < > ? 1 2 3
\ , . / End Pg Dn
Enter
0 •
Ctrl Alt Alt Gr Ctrl
Ins Del

typewriter keys editing and numeric


cursor-control keypad
keys

A typical keyboard

115
key frame

consists of an array of labeled keys that are keystrokes it takes to perform common op-
operated by pressure applied by the fin- erations.
gers. In current devices the operation of a
particular key generates a coded electrical key to disk An obsolete system of data
signal that can be fed directly into a com- entry in which the data entered by a num-
puter. The characters that have been keyed ber of keyboard operators was recorded on
may be displayed on a VDU screen. a magnetic disk under the control of a
A computer keyboard consists of the small computer. The data from each key-
standard typewriter layout – the QW- board was routed by the computer to the
ERTY keyboard – plus some additional appropriate file on the disk. The data en-
keys (see diagram). These can include a coded on the disk was verified, often by
control key, function keys, cursor keys, comparing it with data entered by a second
and a numeric keypad. The control key op- operator working from the same source.
erates in the same way as a shift key but al- The disk could then be transferred to the
lows CONTROL CHARACTERS to be sent to computer on which the data was to be
the computer; the function keys send not processed.
one but a whole sequence of characters to
the computer at a time, and can often be key to tape An obsolete system of data
programmed by the user to send com- entry in which the data entered by a key-
monly used sequences; the cursor keys are board operator was recorded on a mag-
used to move the screen CURSOR to a new netic tape. The data encoded on the tape
was then verified, often by comparing it
position; and the numeric KEYPAD dupli-
with data entered by a second operator
cates the normal typewriter number keys
working from the same document. The
and speeds up the entry of numerical data
tape could then be transferred to a com-
by allowing one-handed operation. See
puter so that the data could be processed.
also alt key.
kHz See kilohertz.
key frame An animation technique in
which the start and end frames of a se-
kill To stop a process in a program or
quence are defined but the intervening operating system.
frames are interpolated by a computer to
give a smooth animation. kill file A feature of some e-mail clients
or newsgroup readers, or an independent
keypad A small KEYBOARD with only a Internet utility, that is used to block out or
few keys, often 12 or 16, that can be oper- filter unwanted messages or newsgroup ar-
ated with one hand. It is usually used for ticles from particular individuals. See also
encoding a particular sort of information. spam.
For example, a numeric keypad is used to
feed numerical data into a computer, and kilo- /kil-ŏ-/ A prefix indicating a multi-
can be operated much faster than an all- ple of 1000 (i.e. 103) or, loosely, a multiple
purpose keyboard; there are 10 keys for the of 210 (i.e. 1024). In science and technology
digits 0–9 plus additional keys for, say, the decimal notation is usually used and pow-
decimal point and minus sign. A keypad ers of 10 are thus encountered – 103, 106,
may be hand-held or may be part of a etc. The symbol k is used for kilo-, as in kV
larger keyboard. for kilovolt. In communications, kilo- (as
in kilobaud) means 1000. Binary notation
keystroke The action of pressing a key- is generally used in computing and so the
board key to enter a character or initiate a power of 2 nearest to 103 (i.e. 210 or 1024)
command in a computer system. A key- has assumed the meaning of kilo-.
boarder’s efficiency can be measured in The prefix is most frequently encoun-
keystrokes per minute, or ease of use of an tered in computing in the context of stor-
application can be assessed by how many age CAPACITY. With magnetic disks and

116
knowledge domain

main store, the capacity is normally reck- bust interface, such as a TOUCH SCREEN,
oned in terms of the number of BYTES that that anyone can use without training or
can be stored, and the word kilobyte (KB) documentation.
is used to mean 210 bytes; kilobyte is usu-
ally abbreviated to K byte or just to K, thus knowledge acquisition The transla-
a 256 K byte file is 262 144 bytes in size. tion of human knowledge into a form suit-
SEMICONDUCTOR MEMORY – RAM or ROM able for use on a computer. The term is
– is sometimes considered in terms of the used in EXPERT SYSTEMS.
number of bits that can be stored in the de-
vice, and the word kilobit (kb) is used to knowledge base A database of accumu-
mean 210 bits. lated human knowledge on a particular
Kilo- is part of a sequence subject used in EXPERT SYSTEMS. For exam-
kilo-, mega-, giga-, tera-, peta-, … ple, a knowledge base of symptoms for a
of increasing powers of 103 (or of 210). particular disease would be used in medical
diagnosis.
kilohertz /kil-ŏ-herts/ (kHz) A unit of
frequency equal to 1000 HERTZ. knowledge-based system See expert
system.
kiosk A booth providing a computer-
related service such as a theater booking knowledge domain The area of knowl-
service or tourist information service. A edge in which a particular EXPERT SYSTEM is
kiosk requires a very simple, physically ro- involved.

117
license agreement

LCD (liquid crystal display) A device dividual LEDs can be made to emit light
used in many FLAT PANEL MONITORS. The (usually red) so as to form the shape of a
screen is composed of many dots, each of particular character. A simple SEVEN-SEG-
which contains a liquid that is usually MENT DISPLAY can display the numbers 0–9
transparent. Individual dots can be dark- and some letters. LED displays require
ened however (by applying an electric more electrical power than LCDS.
field) and so an image can be built up. Note
that LCDs do not emit light, and can only left-justified See justify.
be seen because light shone from behind
the display makes the dark dots stand out. legacy system A computer, software,
Color images are achieved by each ‘dot’ in operating system, network, or other com-
fact being a triplet of red, green, and blue puter equipment that exists before a new
dots. A variant of LCD technology called system is installed, and is still required af-
ACTIVE MATRIX DISPLAY is generally used in terward. BACKWARD COMPATIBILITY is an
computer monitors. LCDs are also used in important part of the design and imple-
digital watches, calculators, cellphones, mentation of new systems, but cannot al-
etc. See also display. ways be maintained. The question of when
to engage in the expensive operation of up-
LDAP /el-dap/ (lightweight directory ac- grading legacy systems is therefore impor-
cess protocol) A significantly simpler tant.
version of the X.500 standard for a set of
protocols for accessing information direc- LEO /lee-oh/ Lyons Electronic Office.
tories. Unlike X.500 it supports TCP/IP See first generation computers.
and is an open protocol, which means that
applications do not need to know about LET /let/ See Basic.
the type of server hosting the directory.
letter quality (LQ) A quality of printing
leaf An item at the very bottom of a hi- that is as good as a top-quality electric
erarchical TREE structure. In hierarchical typewriter. The term is mainly used of dot
file systems, files are leaves whereas direc- matrix printers and is becoming less com-
tories are NODES. mon with the increased use of laser print-
ers, which generally give better quality
leased line A telephone line that is than electric typewriters.
rented for exclusive use by the customer
from one location to another. Typically lexical analysis The initial phase in the
leased lines are used by businesses to con- COMPILATION of a program during which
nect geographically distant sites for high- the source program is split up into mean-
speed data transfer. ingful units. These units could, for exam-
ple, be NAMES, CONSTANTS, RESERVED
least significant digit (lsd) The digit in WORDS, or OPERATORS. The part of the com-
the least significant, i.e. rightmost, position piler program that does this analysis is
in the representation of a number, and thus called a lexical analyzer. The units recog-
making the smallest contribution to the nized by the analyzer are known as tokens.
value of the number. With a binary num- They are output in some conveniently
ber, this digit is referred to as the least sig- coded form for further processing by the
nificant bit (lsb). compiler. See also syntax analysis.

LED display A device used in some cal- library See program library; subroutine
culators, digital clocks, etc., to display library.
numbers and letters. The characters are
formed from groups of segments. The seg- library program See program library.
ments are small electronic components
called LEDs, i.e. light-emitting diodes. In- license agreement An agreement defin-

119
LIFO
y

10

8 x + y = 10

7
x=y−2

5
x=8

1 x − 4y = k

O x
1 2 3 4 5 6 7 8 9 10 11 12
−1

−2

−3
Linear programming: possible values lie in the shaded area with the minimum value at (8,0)

ing terms for the use of hardware or soft- line 1. A hardware circuit connecting
ware by a user. two devices.
2. A single line in a computer program.
LIFO /lÿ-foh/ (last in first out) See stack. 3. A single data entry in a cache. For ex-
ample in an L2 cache each line is 32 bits
light-emitting diode See LED display. wide and can contain data from one or
more addresses.
light pen An obsolete hand-held penlike
instrument used together with a DISPLAY linear programming The process of
device for the input of data to a computer finding maximum or minimum values of a
graphics system. (The display had to be a linear function under limiting conditions
refreshed cathode-ray tube.) The main or constraints. For example, the function x
function of the light pen was to point to – 4y might be minimized subject to the con-
small areas of the screen, such as a single straints that x + y ≤ 10, x ≤ y – 2, x ≤ 8, x
character or a small graphical object, and it ≥ 0, and y ≥ 0. The constraints can be
could for example indicate a selection from shown as the area on a Cartesian coordi-
a displayed list (a MENU). It could also be nate graph bounded by the lines x + y = 10,
used to draw shapes on the screen. x = y – 2, x = 8, x = 0, and y = 0 (see dia-

120
line printer

gram). The minimum value for x – 4y is anism. Line printers are usually found on
chosen from points within this area. A se- large computers rather than personal com-
ries of parallel lines x – 4y = k are drawn puters, but their use is declining as they are
for different values of k. The line k = –2 replaced by high-volume LASER PRINTERS.
just reaches the constraint area at the point Line printers may be impact or nonim-
(8,0). Higher values are outside it, and so pact printers (see printer). Modern line
x = 8, y = 0 gives the maximum value of printers use the same technology as DOT
x – 4y within the constraints. Linear pro- MATRIX PRINTERS except that they have
gramming is used to find the best possible enough needles to print a line at a time.
combination of two or more variable quan- However, there are two older types still in
tities that determine the value of another use, barrel printers (also known as drum
quantity. In most applications, for exam- printers) and band printers (see illustration
ple, finding the best combination of quan- overleaf).
tities of each product from a factory to give A barrel printer involves a horizontal
the maximum profit, there are many vari- cylinder with rows of characters embossed
ables and constraints. Linear functions with along its length. The cylinder rotates con-
large numbers of variables and constraints tinuously at high speed, and one line is
are maximized or minimized by computer printed during each rotation. The paper is
techniques that are similar in principle to positioned between the cylinder and a set
this graphical technique for two variables. of print hammers; there is one hammer for
each printing position along a line, i.e. for
line editor See text editor. every character in a row on the cylinder.
The complete character set that can be
line feed 1. A control mechanism on a printed is provided at each printing posi-
PRINTER, or a programmed instruction, that tion. During one rotation of the cylinder all
causes the paper to move up a specified dis- the characters of one sort are printed at the
tance until the printing mechanism is op- same time; for example, all the As in a line
posite the next line to be printed. See also are printed, then all the Bs, then all the Cs,
paper throw. and so on.
2. A means by which the CURSOR on a A band printer involves a steel band
screen is moved down one line. If that with characters embossed along its length.
would result in the cursor dropping off the The band forms a loop and is rotated con-
bottom, the whole display moves up one tinuously at high speed. The band moves
line and the cursor is placed on a new horizontally, spanning the line to be
blank bottom line. printed. The paper is positioned between
3. (LF) The ASCII control character, with the band and a set of print hammers; there
the decimal value 10, that is often used to is one hammer for every printing position
invoke either of these operations. Sending along a line. As the appropriate character
a line-feed character to a printer or screen on the band passes beneath a particular
may or may not also generate a CARRIAGE hammer, the hammer strikes and prints it
RETURN. in the required position on the line. Bands
can be replaced when necessary. Mistiming
line printer A PRINTER that produces a of the hammer actions in a band printer
complete line of characters at a time, or produces slight variations in character
more precisely produces a complete line spacing; these are less obvious than the ver-
during one cycle of its operation. Printing tical displacements resulting from mistim-
rates range from 150 to 3000 lines per ing in a barrel printer.
minute (lpm). There are normally between Chain printers and train printers are
80 and 160 character positions on a line. earlier versions of the band printer. The
Each line is first assembled in the printer’s former involves small metal plates linked
memory and then printed. Once the line into a continuous chain rather than a metal
has been printed the paper is moved so that band; the latter involves metal slugs guided
the next line is opposite the printing mech- around a track.

121
link
ribbon
rows of embossed
characters
AAA
paper B B B BA A A
BB
CCCCC
DDDD C
EEEED
E
FF
GG
HH

rotating cylinder
hammers (not all shown)

barrel printer

paper

ribbon
PQR S embossed
AB CD E characters

hammers (not all shown) rotating metal belt

band printer

Line printers

link 1. (linkage) The part of a computer linkage See link.


program, possibly a single instruction or
address, that passes control and PARAME- link editor (linkage editor; linker) A
TERS between separate portions of the pro- UTILITY PROGRAM that combines a number
gram. of user-written or library routines, which
2. (pointer) A character or group of char- have already been compiled or assembled
acters that indicates the LOCATION of an but are individually incomplete, into a sin-
item of data in memory. gle executable program. This program is
3. A path for communications. See data then either stored on disk or placed in main
link. store for immediate execution. A link edi-
4. See hypertext. tor that performs the latter function is
5. To join together program modules that sometimes called a link loader. See also
have been compiled separately to form a program library.
program that can be executed. This opera-
tion is performed by a LINK EDITOR. linked list See list.

122
local

linker See link editor. the list components without moving the
data items; only the links are modified. For
link loader See link editor. example, a new item can be inserted in its
correct place by having the preceding item
linkrot /link-rot/ Informal The condi- link to the new item and the new item link
tion in which HYPERTEXT leads nowhere to the succeeding item.
because Web sites have removed or reorga-
nized their Web pages and the links are list box A type of CONTROL on a GUI
outdated. FORM. The user selects its content from a
list of available options. Compare text
Linux /lin-ŭks/ A freely distributable op- box; see also combo box.
erating system that runs on several hard-
ware platforms including Intel and listing An output of a computer system,
Motorola microprocessors, and thus on often diagnostic, that can be printed. The
PCs and Macintoshes. Linux is a form of word is usually qualified in some way to
UNIX written by Linus Torvalds. Its use has give a more precise idea of the contents, as
increased rapidly in recent years, especially in program listing or error listing. A listing
for SERVERS. may be created in a file rather than printed,
which allows it to be examined on line and
liquid crystal display See LCD. perhaps analyzed by program.

Lisp A high-level programming language literal A character or group of charac-


whose name is derived from list processing. ters that stands for itself, i.e. is to be taken
It was developed in the early 1960s. Lisp literally, rather than being a NAME for
was designed specifically for the manipula- something else. In nearly all programming
tion of LIST and TREE structures of various languages numbers are always taken as lit-
kinds and has an unusual SYNTAX. It was erals. When letters are used as literals they
later taken up by those working in the must be placed within some form of quota-
emergent field of ARTIFICIAL INTELLIGENCE. tion marks to distinguish them from letters
There are now a number of dialects of Lisp, used as names. For example, X may be the
extended in various directions. Lisp pro- name given to a VARIABLE in a program
grams are generally translated by an INTER- written in Basic.
PRETER. PRINT X
would then mean print the value assigned
list One form in which a collection of to that variable.
data items can be held in computer mem- PRINT ‘X’
ory. The items themselves are in a particu- would mean print the letter X.
lar order. The items could all be integers,
for example, or real numbers, or letters, or load 1. To enter data into the appropri-
they could be a mixture of, say, integers ate REGISTERS in a processor or into the ap-
and real numbers. If all the items are of the propriate storage LOCATIONS in main store.
same type then the list is a one-dimensional 2. To copy a program from backing store
ARRAY. into main store so that it may be executed.
There are two commonly used forms in
which this collection of data items is held loader A UTILITY PROGRAM that LOADS a
in memory. In a sequentially allocated list program into main store ready for execu-
the items are stored in their correct order in tion. The program loaded is an OBJECT PRO-
adjacent LOCATIONS. In a linked list each lo- GRAM that is read from backing store. See
cation contains a data item and a LINK con- also program library.
taining the address of the next item in the
list; the last item has a special link indicat- local 1. In communications, describing a
ing that there are no more items in the list. device, file, or other resource that does not
Various operations can be performed on need a communications line for access; in

123
local area network

other words, it is either part of the user’s local variable See scope.
computer or directly attached to it. See re-
mote. location (storage location) In general,
2. In programming, describing a variable any place in which information can be
that is only defined for one part (subrou- stored in a computer – in MAIN STORE or
tine, procedure, or function) of the pro- BACKING STORE. A storage location is an
gram and does not have GLOBAL scope. area within a computer memory capable of
storing a single unit of information in bi-
local area network (LAN) A communi- nary form. Each location can be identified
cation system linking a number of comput- by an ADDRESS, allowing an item of infor-
ers within a defined and small locality. This mation to be stored there or retrieved from
locality may be, say, an office building, an there. In most cases it is possible to change
industrial site, or a university. Linking the the stored value during execution of the
computers together allows resources, such program. The words location and address
as HARD DISKS, PRINTERS, or an Internet con- are often used as synonyms, as in ordinary
nection, to be shared between them, allows speech.
FILES to be shared, gives all users access Main store is divided into either WORDS
to specialized application SERVERS (e.g. or BYTES: in some computers each location
database servers that manage shared data- holds a word; in other machines each loca-
bases), allows an INTRANET to be estab- tion holds a byte. The memory is said to be
lished, and permits messages to be sent word-addressable or byte-addressable. A
between the computers by E-MAIL. word is now generally 32 bits and is usu-
The computers in the network are di- ally large enough to contain a MACHINE IN-
rectly connected to the transmission STRUCTION. A byte is always 8 bits and thus
medium by electrical INTERFACES; normally is the storage space required to hold a small
the medium is in the form of electric cables, number or a common CHARACTER.
optical fibers, or wireless. There are vari- Locations on disk and tape hold a num-
ous ways in which the interconnections be- ber of bytes and are addressed by TRACK
tween machines can be organized (see and SECTOR or by BLOCK, respectively.
network). The system is usually controlled
overall by a server that validates all users lock 1. A mechanical device on some re-
when they LOG ON and ensures they do not movable storage media that prevents the
access resources or perform operations for- user writing to the media.
bidden to them. Often, and especially on 2. A software security feature that ensures
small networks, this function is combined it cannot be used unless unlocked with a
with that of FILE and PRINT SERVERS on a key or DONGLE.
single machine, known as the server.
Local area networks generally provide locked up The condition of a system or
high-speed data communications and have an application that seems unable to re-
very low ERROR RATES. It is possible to in- spond to the user. See also hang.
terconnect two or more local networks,
and to connect a local network to a larger log /log/ A record containing details of
network, i.e. to a WIDE AREA NETWORK. past activities or actions on a computer sys-
tem, e.g. details of problems found (or not)
local bus A PC architecture design that and actions taken when scanning a disk.
gives high performance by allowing expan-
sion boards to communicate directly with logic /loj-ik/ See binary logic; digital
the microprocessor. logic.

LocalTalk /loh-kăl-tawk/ An obsolete logical device /loj-i-kăl/ A device that is


cabling system supported by the APPLETALK given a logical name or number and
network protocol for Macintosh comput- is treated by the operating system as a
ers. distinct device regardless of its physical

124
logic circuit

relationship to a system. For example, a 2. A piece of code that deliberately intro-


hard drive of a computer can be parti- duces provision for such an error into a
tioned into a number of logical drives E, F, system, often as the PAYLOAD of a virus.
G, etc.
logic circuit (logic network) An elec-
logical error See error. tronic circuit consisting of interconnected
LOGIC GATES and possibly other compo-
logical expression See Boolean expres- nents (such as FLIP-FLOPS). These elements
sion. are connected by paths that carry electrical
signals from one to another. A circuit con-
logical function See Boolean expres- sisting only of logic gates is shown in the
sion. diagram, LOGIC SYMBOLS being used to rep-
resent the different gates. The inputs to one
logical instruction See logic instruc- gate in a circuit are usually the outputs of
tion. other gates, or signals from, say, a periph-
eral device. The output of a gate can be fed
logical operation See logic operation. to another gate or to some other unit in the
computer system.
logical operator See logic operator. Logic circuits are found in all types of
computer devices, including the CENTRAL
logical record See record. PROCESSOR where they perform various
arithmetic, logic, and control operations,
logical shift See shift. and in memory devices (such as ROM and
RAM) and COUNTERS.
logical value See truth value. A TRUTH TABLE can be drawn up to de-
termine the output of a COMBINATIONAL
logic bomb 1. A catastrophic program LOGIC circuit for all possible combinations
error that only occurs under certain condi- of inputs (see diagram). It can also be used
tions when least expected. to obtain an expression of the logical func-

A A
OR

NOT B +A
B
(B + A) . (A + B)
AND

NOT A
A +B
OR

B B

inputs _ _ _ _ output_
A B A B A+B A+B (B + A).(A + B)
0 0 1 1 1 1 1
0 1 1 0 0 1 0
1 0 0 1 1 0 0
1 1 0 0 1 1 1

Logic circuit and truth table of this circuit

125
logic diagram

tion of the circuit. In the circuit and truth TRUTH TABLES are used to describe the
table shown, +, ., and ¯ are the OR, AND, output of a logic gate for all possible com-
and NOT OPERATORS. The expression de- binations of inputs. A simple gate with 2
rived for the circuit output indicates that it inputs has 22, i.e. 4, possible combinations
is an EQUIVALENCE GATE. of inputs and hence 4 possible outputs;
with 3 or with 4 inputs there are 23 or 24,
logic diagram A diagram in which i.e. 8 or 16, possible outputs. Truth tables
LOGIC SYMBOLS are used to show how the are given at individual entries for gates in
inputs and outputs of components are con- this dictionary. See also logic symbols;
nected together in a LOGIC CIRCUIT. It thus logic diagram.
displays the design of the circuit but gives
no indication of the electronics involved. logic instruction A MACHINE INSTRUC-
TION specifying a LOGIC OPERATION and the
logic element A LOGIC GATE or combi- OPERAND or operands on which the logic
nation of gates. operation is to be performed. An example,
expressed in ASSEMBLY LANGUAGE, might be
logic error An error in the logic of a OR A,B
program that causes incorrect results but This is an instruction to perform the OR
does not stop the program running. operation between the contents of registers
A and B, placing the result in A. See also
logic gate A device, almost always elec- arithmetic instruction.
tronic, that is used to control the flow of
signals in a computer. It does this by per- logic network See logic circuit.
forming LOGIC OPERATIONS on its inputs.
Normally there are between two and eight
logic operation An operation per-
formed on quantities (OPERANDS) that can
inputs to a gate and one output. An input
be assigned a truth value; this value is ei-
signal is either at a high level or at a low
ther true or false. The result of the opera-
level, the level changing with time. (It is ac-
tion is in accordance with the rules of
tually the voltage level of the signal that
BOOLEAN ALGEBRA, and again has a value
changes in an electronic gate.) The signal
true or false. The operands may be state-
thus has a binary nature; the two values
ments or formulae, such as
can be represented as 1 (high) and 0 (low).
It is July
As the input signals switch between their the wire is less than 10 cm long
high and low levels, the output level x + 2 = 16
changes, the value depending on the logic The operands of a logic operation can be
operation performed by the gate. For ex- represented by letters. For example, in
ample, one type of gate has a high output P AND Q, P OR Q, NOT (P OR Q)
only when all its inputs are high at the P and Q are the operands and AND, OR,
same time. In any logic gate the output and NOT are LOGIC OPERATORS that repre-
changes extremely rapidly in response to a sent three commonly used logic operations,
change in input. namely the AND, OR, and NOT OPERATIONS.
There are several simple gates that each Logic operations can be described by
perform a basic logic operation. For exam- means of TRUTH TABLES. LOGIC GATES are
ple, the AND GATE and OR GATE perform the constructed so as to perform logic opera-
AND and OR OPERATIONS, respectively, on tions on their input signals.
their inputs. The NOT GATE performs the
NOT OPERATION on its single input. The logic operator A symbol representing a
other simple logic gates are the NAND GATE, LOGIC OPERATION such as the AND or OR
NOR GATE, NONEQUIVALENCE GATE, and operation. A logic operator has logical
EQUIVALENCE GATE. Selected gates can be quantities as its OPERANDS and delivers a
connected together to form a LOGIC CIR- logical result. For example, the expression
CUIT. ‘I have no money’ and ‘it is Tuesday’

126
long filename

is true if both the operands are true, other- incorporates the concepts of PROCEDURES
wise it is false. In programming languages and LISTS, and helps children to think algo-
logic operators are either spelled out in full rithmically. Logo includes TURTLE GRAPH-
or various symbols are used; some of these ICS: the turtle is a simple pen-plotter that
are shown in the table. can be steered around a large piece of
An example of how logic operators are paper on the floor, under program control,
used, in Basic, is as follows: allowing the children to create complex
IF (A=3) AND (X<10) THEN A=0 patterns. In some microcomputer imple-
See also order of precedence. mentations the turtle pictures may be
drawn on the screen. This is cheaper but
perhaps not so effective.
LOGIC OPERATORS
Operation Operators log off (log out; sign off) To inform a
computer system or NETWORK from a TER-
AND AND .AND. & .
MINAL or WORKSTATION that one’s work is
OR OR .OR. ! | +
– finished for the moment. This log off or log
NOT NOT .NOT. ¬ ! ′
out process is required in any MULTIACCESS
SYSTEM for security and accounting pur-
poses. After a user has logged off, the com-
puter system or network will not be
available on that terminal or workstation
logic symbols The symbols used in a until someone has logged on there. See also
LOGIC DIAGRAM to represent the various log on.
LOGIC GATES and the other possible compo-
nents in a LOGIC CIRCUIT. One set that is log on (log in; sign on) To identify one-
used to represent logic gates is shown in the self to a computer system or NETWORK
diagram: the logic operation performed by when wishing to enter the system from a
the gate is printed inside a circle, and ar- TERMINAL or WORKSTATION. This log on or
rowed lines labeled by letters represent the log in process is required in any MULTIAC-
inputs and output. In another set (widely CESS SYSTEM. The log on sequence involves
used in technical literature) the shape of the first saying who one is by means of one’s
symbol is used to indicate its function. name or account number and then entering
one’s PASSWORD. In some cases where, say,
log in See log on. security is very strict, there may be more to
do. See also log off.
Logo /loh-goh/ A PROGRAMMING LAN-
GUAGE developed in the 1960s by Seymour log out See log off.
Papert for use in teaching young children.
Logo is a simple but powerful language. It long filename In Windows, a FILENAME

P (P AND Q) P (P OR Q)
AND R OR R
Q Q

(NOT P) P NOT (P AND Q)


P NOT R NAND R
Q

Logic symbols for gates

127
look-up table

that can be up to 255 characters long and tems, a test signal sent to a network desti-
include spaces. The term is used to contrast nation that is then returned as received by
such names with the short filename (or 8.3 the sender. Loopback is used in fault diag-
filename) system used by MS-DOS, where nosis. On the Internet a comparable utility
filenames were limited to 8 characters plus is called PING.
a 3-character EXTENSION and spaces were
not allowed. Windows still maintains short lossless compression /loss-liss/ Any data
filenames for BACKWARD COMPATIBILITY. compression accomplished by a technique
that reduces file size by eliminating redun-
look-up table A TABLE used in table dancies in the data. Data compressed by
look-up. these methods can be restored exactly to its
original value. Lossless compression is
loop A statement or group of statements used for data and programs. Compare
whose execution is repeated either a speci- lossy compression. See also PKZIP.
fied number of times or while or until some
condition is met. Both types of loop are it- lossy compression /loss-ee/ Any data
erative CONTROL STRUCTURES, and appear compression accomplished by a technique
in various forms in almost every program- that reduces file size by discarding some
ming language. data forever, such as small variations in
The for loop appears in several lan- color, whose loss won’t be noticed. Lossy
guages and permits a specified number of files cannot be decompressed to their orig-
repetitions to occur. An example, in Pascal, inal state. Only certain types of data, such
is
as graphics, audio, and video, can tolerate
for i := 1 to 10 do statement
lossy compression. JPEG and MPEG, for ex-
This causes the statement to be executed 10
ample, use lossy compression techniques.
times. In Basic this would be written
Compare lossless compression.
FOR I = 1 TO 10
statement
lost cluster A CLUSTER on a disk storage
NEXT I
device that the FILE SYSTEM thinks is in use
There are two main forms of the second
but is not part of any file. Lost clusters are
type of loop, i.e. the conditional-type loop.
In one form the condition is given at the be- usually caused when a system or program
ginning of the loop and execution contin- is closed down without going through the
ues while this condition is satisfied. This is proper procedures, for example in the case
commonly referred to as a while loop or a of a power cut. Some file systems (e.g. FAT)
while do loop. For example, Pascal has are more vulnerable to lost clusters than
while condition do statement others (e.g. NTFS).
The statement or statements will not be ex-
ecuted at all if the condition does not hold Lotus 1-2-3 /loh-tŭs/ Trademark An
the first time round. The other form is the electronic spreadsheet application intro-
repeat until loop, which is executed at least duced in 1982. It is widely credited with es-
once since the condition is given at the end tablishing the popularity of the IBM PC.
of the loop, causing it to terminate when
necessary. For example, Pascal has Lotus Notes A GROUPWARE application
repeat statement until condition developed by Lotus, now part of IBM.
It is possible for one or more loops to be Notes was one of the first applications to
included within a loop; the incorporated support a distributed database of docu-
loop or loops are referred to as nested ments that could be accessed by users
loop(s). The nesting must be such that each across a LAN or WAN. Its sophisticated
inner loop is entirely contained within the REPLICATION features enable users to work
outer loop or loops. with local copies of documents and have
their modifications propagated throughout
loopback /loop-bak/ In telephone sys- the entire Notes network. With the grow-

128
LZW compression

ing popularity of the WWW, IBM inte- LQ See letter quality.


grated Web support into Notes.
lsb (least significant bit) See least signifi-
lower case Describing a small alpha- cant digit.
betic character as opposed to a capital let-
ter. lsd See least significant digit.
low-level language A kind of PRO- LSI (large scale integration) See inte-
GRAMMING LANGUAGE whose features di- grated circuit.
rectly reflect the facilities provided by a
particular computer or class of computers. LTO (Linear Tape-Open) A type of TAPE
It is designed mainly around the set of in- CARTRIDGE used to back up computers and
structions (i.e. the INSTRUCTION SET) that a networks. The first version, introduced in
particular computer or computer class is 1999, could hold 100 Gb of uncompressed
able to perform: low-level languages are data; usually data compression allowed up
thus described as machine-orientated (or
to 200 Gb to be stored. The current ver-
computer-orientated). It is possible from
sion, LTO3, can store up to 400 Gb (800
the program source code either to control
Gb compressed) with future capacity in-
exactly what MACHINE CODE is generated
when the program is compiled or to predict creases planned. LTO is an open format
what it will be. ASSEMBLY LANGUAGES are developed by Hewlett-Packard, IBM, and
the most common types of low-level lan- Certance. See also DLT.
guage. See also high-level language.
Lycos /lÿ-kos/ An Internet SEARCH EN-

lpm (lines per minute) A measure of the GINE.


rate of output of LINE PRINTERS.
LZW compression (Lempel-Ziv-Welch
LPT A name frequently used by operat- compression) A data-compression tech-
ing systems to identify a printer. The print- nique developed in 1977 by J. Ziv and A.
ers attached to a computer are called LPT1, Lempel and later refined by Terry Welch. It
LPT2, LPT3, etc. It was originally an ab- is the compression algorithm used in GIF
breviation of ‘line printer’. files and other graphics-file formats.

129
L

L1 cache (primary cache) A small cache electric charge. This charge pattern is
memory in microprocessors. Compare L2 coated with varying amounts of toner (dry
cache. particles of pigment) according to the
strength of the charge. The toner is rolled
L2 cache (secondary cache) Cache onto the paper and fused in place by heat,
memory that was originally external to the producing a permanent image. Laser print-
microprocessor. Modern micr-oprocessors ers work quietly and at high speed, gener-
now include L2 caches in their architec- ating high-quality print. They readily
tures. Compare L1 cache. produce graphs and diagrams and a wide
variety of typestyles. Color laser printers
label An IDENTIFIER associated with a are also available.
STATEMENT in a program and used in other
parts of the program to refer to that state- latency 1. In general, the period of time
ment. that one component in a system is waiting
for another component. For example, in
LAN /lan/ See local area network. accessing data on a disk, latency is the time
it takes to position the sector under the
landscape The arrangement of printed read/write head. See access time.
matter on a page so that the top of the page 2. In networking, the amount of time it
is on the wider side. Compare portrait. takes a packet to travel from source to des-
tination. Together latency and BANDWIDTH
language See programming language. determine the speed and capacity of the
network.
laptop /lap-top/ A small portable per-
sonal computer. Laptops can be run from LaTeX /lay-tekh/ A typesetting system
battery packs or from the mains. Flat panel based on the TeX programming language
display screens are used and a TRACKERBALL for typesetting. It provides for higher level
is often embedded in the keyboard. In macros than TeX, making it easier to for-
other respects the memory capacity, hard mat documents, but in doing so it loses
drives, and CPUs are the same as those some flexibility.
used in a personal computer.
launch To start a program.
large-scale integration See integrated
circuit. layer A level in a program or system that
performs a particular function or functions
laser printer A type of PRINTER in which and has a defined interface for passing re-
a page-sized image is produced in the form sults to/from the layers next to it. OSI is an
of a pattern of very fine dots by the action example of a layered system.
of a laser beam. The principle is similar to
that used in many office copiers. The laser layout In word processing and desktop
beam writes the image on the surface of a publishing, the arrangement of the text and
drum or band in the form of a pattern of graphics on a page.

118
M

M The symbol used for MEGA-, or some- item of data consists of a particular se-
times for megabyte. quence of bits.
It is very slow and tedious for a person
Mac The popular abbreviation for the to write a program in machine code, and
Apple MACINTOSH computer. very difficult to read and understand such
a program. Instead a programmer nor-
MacBinary /mak-bÿ-nă-ree, -nair-ee/ A mally uses a HIGH-LEVEL LANGUAGE (such as
file transfer protocol that preserves Mac- Basic or C++), which is translated into ma-
intosh file formats when stored on non- chine code by a program – either a COM-
Macintosh computers. PILER or an INTERPRETER. A large number of
machine code instructions are required for
machine An actual computer, or some- each high-level language statement. An-
times a model of a computer used in theo- other less easy alternative is for the pro-
retical studies. grammer to use ASSEMBLY LANGUAGE,
which gives a ‘readable’ and hence more
machine address A unique number that convenient representation of machine
specifies a unique storage LOCATION (or in code; a program written in assembly lan-
some computers a particular REGISTER or guage is converted into machine code by a
INPUT/OUTPUT DEVICE). A machine address
program known as an ASSEMBLER.
contains a fixed number of bits, n, and
hence can identify 2n different locations.
machine instruction (computer instruc-
tion) An instruction that can be recog-
The number of distinct locations to which
nized by the processing unit of a computer.
a machine address can refer is known as
It is written in the MACHINE CODE designed
the address space. A machine address is de-
for that particular computer, and can be in-
termined by the computer hardware and
terpreted and executed directly by the CON-
when specified in a MACHINE INSTRUCTION TROL UNIT and the ARITHMETIC AND LOGIC
can be used directly by the hardware. A UNIT of that computer. A machine instruc-
machine address is thus an ABSOLUTE AD- tion consists of a statement of the OPERA-
DRESS. See also address.
TION to be performed, and some method of
specifying the object upon which the oper-
machine code The code used to repre- ation is to be performed (i.e. the OPERAND)
sent the instructions in the INSTRUCTION SET together with an indication of where the re-
of a particular computer. It is therefore sult is to go. There may be more than one
specific to a particular computer. It is the operand involved.
form in which programs must be recorded The portion of the machine instruction
on, say, magnetic disk and entered into in which the operation is specified is
main store, and is the form subsequently known as the operation part. The operand
used for processing. Machine code consists or operands are generally specified in the
of a sequence of MACHINE INSTRUCTIONS. In instruction by stating their actual AD-
order for the computer hardware to handle DRESSES in main store, or by some other
it, machine code is expressed in binary scheme such as INDIRECT ADDRESSING, IN-
form: every operation, every address, every DEXED ADDRESSING, or RELATIVE ADDRESS-

130
magnetic disk

ING; in IMMEDIATE ADDRESSING the operand to record a series of keystrokes and com-
itself is stated explicitly in the instruction. mands, which can be given a name or as-
This information about the operand or signed to a combination of keys. The
operands is given in the address part or macro can then be used over and over
parts of the instruction. again to repeat the recorded actions.
In addition to the operation and ad- In programming languages or applica-
dress parts, special bit positions are re- tions that provide a macro facility, which
quired in the machine instruction to may include a macro language, a set of in-
indicate whether a particular addressing structions can be given a name. When the
mode is to be used. There are thus bit posi- program is compiled or assembled, when-
tions to specify indirect addressing, the use ever the macro name is used the set of in-
of index registers for indexed addressing, structions is substituted by a process called
or the use of base registers in relative ad- macro expansion.
dressing. Additional bits may be used for
other purposes. macro virus A virus written in the
The layout of a machine instruction, macro language associated with an appli-
showing its constituent parts, is known as cation. The document file that uses the
the instruction format. It is laid down by macro carries the virus which is usually
the computer manufacturer, and specifies triggered when the document is opened or
the number of bits allocated to each part – sometimes when other actions are per-
operation part, address part or parts, etc. – formed. A macro virus is often spread as an
and the relative positions of each of these e-mail virus. A well-known example was
parts. the Melissa virus of 1999.

machine-orientated language See low- magnetic disk A storage medium in the


level language. form of a flat circular plate that can be ro-
tated by some means and that is covered on
machine-readable Available in a form one or both sides with a magnetic film.
that can be input to a computer system or Data is recorded in concentric TRACKS in
application. Digital data in a computer file the film (see below). Disks can be either
is machine-readable, but the term is also rigid or flexible, leading to the two cate-
applied to such things as bar codes and gories of HARD DISK and FLOPPY DISK. The
magnetic inks. storage CAPACITY depends on a number of
factors including type and size of disk, the
machine word See word. number of tracks per disk, and the record-
ing density along the tracks.
Macintosh /mak-in-tosh/ A series of Magnetic disks are RANDOM ACCESS de-
personal computers introduced in 1984 by vices: items of data can be located directly,
Apple Computer Corporation. They were independently, and within a very short pe-
one of the first personal computers to use riod of time (the ACCESS TIME) of some tens
GUIs (graphical user interfaces) and the of milliseconds. It follows that FILES of data
3½″ floppy, and are noted for their user- can be stored on disk either in an ordered
friendly features and stylish design. Most sequence or in a random manner. In addi-
personal computers are Windows-based tion, data within a file can be accessed ei-
PCs rather than Macintoshes, but the Mac- ther in sequential order or randomly. The
intosh is used extensively in certain areas access time to disks is brief enough for ON-
such as graphic design and publishing. The LINE processing and magnetic disks are
Windows interface drew many features used as BACKING STORE in the whole range
from the Macintosh. See also iMac. of computers.
Data is recorded and retrieved when a
macro /mak-roh/ An instruction that disk is rotating rapidly in a peripheral de-
represents a sequence of other instructions. vice known as a DISK DRIVE, and this is
Many application programs allow the user achieved by means of read/write heads.

131
magnetic drum

When the head is to write data on the disk purposes; they are found for example on
it receives a coded electrical signal. This credit cards and swipe cards.
signal causes magnetization of tiny regions
in the magnetic film immediately below the magnetic tape A cheap robust storage
head. The regions are magnetized in either medium consisting of a flexible plastic tape
of two directions; magnetization in one di- with a magnetic coating on one side. For-
rection represents a binary 1 and in the merly held on large reels, magnetic tape is
other direction a binary 0. A letter, digit, or now found mainly in small CASSETTES. It is
other character can therefore be encoded essentially the same as that found in do-
as a particular sequence of magnetized mestic video cassettes. SERIAL ACCESS must
spots (see binary representation). This pat- be used for storage and retrieval from tape.
tern of spots is written on the disk in dif- When magnetic tape was first used in
ferent SECTORS of the tracks. The sectors computer systems in the 1950s it was the
may be in a continuous sequence or scat- only form of high-speed BACKING STORE. It
tered in different tracks. When the head is is still a cheap way of storing very large
to read data from a specified track and sec- amounts of information, especially when
tor, it senses the magnetized patterns there the information is accessed rarely, as in FILE
ARCHIVES or BACKUP copies of information
and converts them into a corresponding
electrical signal. Items of data can be held on MAGNETIC DISK.
deleted from a disk and new data added – Items of data are recorded on and re-
trieved from magnetic tape by read and
a magnetic disk is a reusable resource.
write heads operating in a TAPE DRIVE. The
write head receives a coded electrical sig-
magnetic drum An obsolete type of
nal. This signal causes magnetization of
BACKING STORE that has now been displaced
tiny regions in the magnetic film immedi-
by the MAGNETIC DISK. It was a cylindrical
ately below the head. Each spot represents
storage device whose curved outer surface
one BIT: a spot magnetized in one direction
was coated with a magnetic material in
represents a binary 0 while a spot magne-
which data could be recorded.
tized in the opposite direction represents a
binary 1. A letter, digit, or other character
magnetic ink character recognition is encoded as a pattern of magnetized
See MICR. spots.
The data is written on the tape in
magnetic media Material on which BLOCKS; a sequence of blocks makes up a
data can be recorded in the form of a mag- FILE. When data is to be read from a block,
netic pattern on the surface of a magnetiz- the read head senses the magnetized pat-
able film. The data is represented in binary terns there and converts them into a corre-
form by the direction in which points on sponding electrical signal. Blocks of data
the surface are magnetized. Magnetic can be erased from tape and new data
media form the recording basis of MAG- added – magnetic tape is a reusable re-
NETIC DISKS, MAGNETIC TAPE, and MAGNETIC source.
STRIPES. See also digital audio tape.

magnetic storage Any noninternal data magnetic tape unit (MTU) See tape
storage medium that uses magnetic proper- unit.
ties to effect the representation of data, for
example disk. magneto-optic recording A technol-
ogy used with optical disks in which small
magnetic stripe (magnetic strip) A strip areas of the surface are heated by a laser so
of magnetic film on a plastic card on which that they can be easily magnetized and the
machine-readable data is encoded. The regions of magnetization can be confined
most common application of magnetic and precisely located. A lower power laser
stripes is for identification and security is used to read the data from the disk. The

132
MAN

disks are erasable and have a capacity sim- and data awaiting processing, being
ilar to a CD-ROM. processed, or resulting from processing.
Programs can only be executed when
mailbox A network user’s area for stor- they are in main store. Programs and asso-
ing incoming e-mail messages. Mail sys- ciated data are not, however, retained per-
tems usually allow mail to be read, manently in main store. They are kept in
archived, copied to a file, deleted, printed, backing store until required by the proces-
or forwarded to another user. sor. The backing store in a particular com-
puter (large or small) has a larger storage
mailing list 1. A system, usually auto- CAPACITY and is also less expensive (in
mated, that allows users to send e-mail to terms of cost per bit stored) than the main
one address, whereon their message is store in that computer.
copied and sent to all of the other sub- Main store consists of SEMICONDUCTOR
scribers to the list. MEMORY. There is RANDOM ACCESS to data
2. A named list of e-mail addresses. Enter- and the average ACCESS TIME is less than a
ing the name of the list in the address field millionth of a second, typical values being
of an e-mail causes the e-mail to be sent to a few nanoseconds. Semiconductor mem-
all addresses on the list. ory is very reliable and is highly miniatur-
ized.
mail merge A technique used in word- A single item of data is stored in a par-
processing applications for the merging of ticular LOCATION in main store. In most
names and addresses and sometimes other computers each location holds a fixed
facts from a list (perhaps derived from a number of BITS; this number is the same for
database) into a form letter or other basic all locations in the main store of a particu-
document for mass mailing purposes. lar computer, and is usually 8, 16, or 32
bits. Each location can be identified by its
main body The program code that is ex- ADDRESS.
ecuted when the program is started and
that then calls subroutines and functions as maintenance 1. Any activity, including
necessary. tests, measurements, adjustments, replace-
ments, and repairs, that aims to prevent
mainframe /mayn-fraym/ Any large the occurrence of faults in hardware or
general-purpose computer system, as op- corrects an existing hardware fault. See
posed to the smaller MINICOMPUTERS and preventative maintenance; corrective main-
MICROCOMPUTERS. Mainframes are typi- tenance.
cally expensive computers used by large or- 2. (program maintenance) See program.
ganizations and are capable of supporting
a large number of users. malfunction The occurrence of a FAULT,
usually a hardware fault.
main memory See main store.
malware (malicious software) An over-
main store (main storage; main memory; all term denoting any software intended to
RAM; immediate access store, IAS; pri- damage a computer system or subvert its
mary store) The storage closely associ- operation. Malware includes ADWARE, SPY-
ated with the PROCESSOR (or processors) of WARE, TROJANS, VIRUSES, and WORMS.
a computer and from which program in-
structions and data can be retrieved ex- MAN (metropolitan area network) Usu-
tremely rapidly and copied directly into the ally characterized by very high speed con-
processor registers, and in which the re- nections using fiber optic cables or other
sulting data is stored prior to being trans- digital media, a network that can consist of
ferred to BACKING STORE or OUTPUT DEVICES. several LANS as well as satellite and mi-
Main store thus stores instructions waiting crowave relay stations. It is smaller, but
to be obeyed or currently being obeyed, generally speaking faster, than a WAN.

133
Manchester Mark I

Mandelbrot set (left) with a magnified detail (right)

Manchester Mark I See first genera- computer interface, HCI; human-system


tion computers. interface, HSI) The means of communi-
cation between a human user and a com-
Mandelbrot set /man-dĕl-brot/ A set of puter system, referring in particular to the
points in the complex plane generated by use of input/output devices with support-
considering the iterations of the form z → ing software.
z2 + c, where z and c are complex numbers.
This process can produce an infinite num- mantissa /man-tiss-ă/ See floating-point
ber of patterns depending on the value cho- notation.
sen for the constant complex number c (see
Julia set). These patterns are of two types: map 1. In programming, a file showing
they are either connected, so that there is a the structure of a program after it has been
single area within a boundary, or they are compiled. It lists variables and memory ad-
disconnected and broken into distinct dresses and is useful for debugging pur-
parts. The Mandelbrot set is the set of all poses.
Julia sets that are connected. It can be rep- 2. To make logical connections between
resented by points on the complex plane two entities.
and has a characteristic shape. 3. To reproduce an object in a different for-
It is not necessary to generate Julia sets mat while preserving the object’s internal
for the Mandelbrot set to be produced. It organization. For example a graphics
can be shown that a given value of c is in image can be mapped onto a display
the Mandelbrot set if the starting value z = screen.
0 is bounded for the iteration. Thus, if the
sequence mapped drives 1. In a Windows sys-
c, c2 + c, (c2 + c)2 + c, … tem, NETWORK DRIVES or DIRECTORIES that
remains bounded, then the point c is in the have been given local drive letters.
Mandelbrot set. 2. In a UNIX system, defined drives that
The set has been the subject of much in- can be activated.
terest. The figure is a FRACTAL and can be
examined on the computer screen in high MAR See memory address register.
‘magnification’ (i.e. by calculating the set
over a short range of values of c). It shows marker In communications, a marker is
an amazingly complex self-similar struc- used to define a part of a communications
ture characterized by the presence of signal that specifies the structure of the
smaller and smaller copies of the set at in- message.
creasing levels of detail.
mark reading Optical mark reading
man-machine interface (MMI; human- (see OMR). See also document reader.

134
mean

mark sensing An obsolete process of capacity disk drives used primarily as FILE-
data entry to a computer in which a ma- STORE. See also capacity.
chine sensed pencil marks made by a per-
son in his or her choice of indicated master file A DATA FILE that is subject to
positions on a document. The pencil marks frequent requests for data and frequent up-
were electrically conductive and could thus dating of the values stored. It can therefore
be sensed by electrical methods. Mark be considered an authoritative source of in-
sensing has been displaced by optical mark formation. A master file can be updated by
reading, i.e. OMR, which employs more re- being completely rewritten by the system.
liable (photoelectric) sensing methods. The version prior to a particular update is
called the father file, while the one before
markup language A set of formatting that is the grandfather file. The father file,
codes and indexing and linking informa- and often the grandfather file, are retained
tion included in a text file, indicating how as BACKUP copies of the master file. See also
the file should look when it is printed or file updating.
displayed or describing the document’s
logical structure. The markup indicators math coprocessor A coprocessor de-
are often called tags. Some markup lan- signed to enable quick processing of float-
guages are specific to an application, but ing-point numbers. This speeds up the
others are designed to enable documents to processing of math and graphs consider-
be platform independent, offering great ably if the application is designed for its
portability between applications and ma- use. Formerly important in microcomput-
chines. See also HTML; SGML; XML. ers, the functionality of math coprocessors
is now built into most microprocessors.
mask 1. A pattern of bits that is used to
modify or identify part of a byte, word, matrix A two-dimensional ARRAY.
etc., with the same number of bits. An op-
eration, such as an AND OPERATION or an matrix printer See printer; dot matrix
OR OPERATION, is performed on corre- printer; ink-jet printer.
sponding pairs of bits in the two patterns;
this operation is called masking. For exam- maximize To make a window take up
ple, with an AND operation a 1 in the the full screen.
mask will retain the value of the corre-
sponding bit in the input byte, word, etc., Mb A symbol for megabit.
for subsequent processing, while a 0 in the
mask will set or keep the corresponding bit MB A symbol for megabyte.
as a 0. Thus an AND on a byte containing
an 8-bit number with a mask of 00000011 MBR See memory buffer register.
will clear all bits except the two least sig-
nificant, i.e. it will return a number be- MDR See memory data register.
tween 0 and 3 that is the modulo 4 of the
input. Masking is often used to store more mean In general, a number representing
than one piece of information in a single the average or typical value of a group of
byte or word. For example, the 8 bits of a numerical values, such as measurements of
byte can be made to store 5 TRUTH VALUES a quantity. If the values are represented by
in one bit each and also a 3-bit number, i.e. x1, x2, x3, … xn
between 0 and 7. so that there are_ n values in all, then their
2. A chemical shield used to determine the mean (symbol:
_ x ) is given by the formula
pattern of interconnections in an INTE- x = (x1 + x2 + x3 + … + xn)/n
GRATED CIRCUIT. The mean of 8 numbers is thus the sum of
those numbers divided by 8. For example,
mass storage device Any backing stor- with the numbers
age device that contains one or more high- 2, 5, 3, 7, 5, 1, 3, 2

135
media

the mean is 3.5. The amount of variation for subsequent use by a computer. The
within the group is indicated by its STAN- word is synonymous with store and stor-
DARD DEVIATION. age but is most frequently used in the terms
random-access memory (RAM) and read-
media (singular: medium) Materials only memory (ROM), i.e. semiconductor
used in the entry or storage of data in a memory used for MAIN STORE. The word
computer, or in the recording of results ‘memory’ by itself is generally used to
from a computer. The latter group are mean main store. See also storage device;
known as output media, the former as media.
input media and storage media. Input and
storage media include MAGNETIC MEDIA, memory address A number represent-
CDs, and DVDs. Data is represented in ing a location in MAIN STORE.
coded form on these media. Output media
include the sheets of paper or film or the memory address register (MAR) A
CONTINUOUS STATIONERY used in PRINTERS, REGISTER (i.e. a temporary location) in the
the paper or film used in PLOTTERS, and the central processor, used for holding the ad-
microfiche used in COM. dress of the next location in main store to
be accessed. Whenever the main store is to
mega- /meg-ă-/ A prefix indicating a be used, the required address must be sent
multiple of a million (i.e. 1 000 000 or to the MAR. The corresponding storage lo-
106) or, loosely, a multiple of 220 (i.e. cation can then be selected automatically,
1 048 576). In science and technology dec- and data read from there or stored there.
imal notation is usually used and powers of See also memory data register.
10 are thus encountered – 103, 106, etc.
The symbol M is used for mega-, as in MV memory buffer register (MBR) See
for megavolt. In communications mega- memory data register.
(as in megabaud) means a million. Binary
notation is generally used in computing memory card (memory board) See ex-
and so the power of 2 nearest to 106 has as- pansion card.
sumed the meaning of mega-.
The prefix is most frequently encoun- memory data register (MDR) A REGIS-
tered in computing in the context of stor- TER (i.e. a temporary location) used for
age CAPACITY. With magnetic disks, holding all instructions and data items as
magnetic tape, and main store, the capacity they are transferred between main store
is normally reckoned in terms of the num- and central processor. It thus acts as a
ber of BYTES that can be stored, and the BUFFER, and is therefore also called memory
word megabyte (MB) is used to mean 220 buffer register (MBR). See also memory ad-
bytes; megabyte is usually abbreviated to dress register.
M byte or just to M, thus a 256 M byte
flash drive can hold 268 435 456 bytes. memory mapping 1. A technique al-
Mega- is part of a sequence lowing a processor to access more memory
kilo-, mega-, giga-, tera-, peta-, … than it is ordinarily capable of addressing.
of increasing powers of 103 (or 210). Different banks of memory are electroni-
cally switched so that they appear to the
membrane keyboard A keyboard in processor to have the same address.
which the keys are covered by a transpar- 2. In microcomputers, a way of making
ent plastic shell. It is difficult to type accu- input/output devices appear to be memory
rately and quickly on such a keyboard but locations so that instructions that would
it has the advantage that the components normally store or retrieve information
can be kept very clean. from main store perform output or input to
an external device.
memory A device or medium in which
data or program instructions can be held memory-resident Describing programs

136
MICR

that are permanently in memory. The op- metafile /met-ă-fÿl/ 1. A file that con-
erating system is not permitted to swap tains information about another file, e.g. a
such programs out to a storage device. format for graphics files. The commonest
is the Windows metafile (which has the file
memory size The total number of bytes extension wmf).
of MAIN STORE available on a computer.
metalanguage /met-ă-lang-gwij/ A lan-
menu A list of options, usually displayed guage used to describe other languages in
on a screen, from which a choice can be the theory of computer languages. SGML
made by the user. The list may be displayed and XML are metalanguages.
with a different letter or number in each
option underlined or shown separately op- meta tag A tag used to describe the con-
posite each option, and the selection made tents of a Web page. Meta tags do not af-
by typing in the appropriate letter or num- fect how the page is displayed but provide
ber using a keyboard. The selection can information such as authorship, what the
also be made by positioning the cursor on page is about, and keywords that represent
the selected option using, for instance, a the page’s content. Many search engines
mouse or cursor keys on a keyboard, or by use this information when building their
touching a selected area of a touch-sensi- indexes.
tive screen. The selected item will often be
highlighted in some way; REVERSE VIDEO or metatext /met-ă-tekst/ Text contained in
blinking are commonly used. a document that does not appear on the
screen but is included to trick Web search
Any program that obtains input from a
indexing software into giving the site a
user by means of a menu is said to be
higher relevance rating in a search. For ex-
menu-driven.
ample, by repeating the word aeroplane
100 times, the document is more likely to
menu bar A horizontal menu that ap-
turn up in a search that includes aeroplane
pears at the top of a window. Usually each
as a key word. Search engines are now
option in the menu is associated with a
aware of this trick and compensate for it.
PULL-DOWN MENU.

method See class.


menu-driven See menu.
MFLOPS /em-flops/ (mega floating-point
merge To combine together in logical se- operations per second) A measure of the
quence. speed of computers used to perform float-
ing-point calculations. See also MIPS.
message switching A process whereby
information (in digital form) can be sent MICR (magnetic ink character recogni-
automatically from one computer on a tion) A process in which a machine rec-
NETWORK to any other, the information ognizes characters printed on a document
being switched from one communication in magnetic ink and converts them into a
line to another until it reaches its specified code that can be fed straight into a com-
destination. The information to be com- puter. The machine is called a magnetic ink
municated is known as a message. A mes- character reader. The characters can be
sage may be of any length, and is read not only by the machine but also by
transmitted as a whole rather than being people: they may be digits, letters, or other
split up. At each switching point along its symbols. The ink contains a magnetic sub-
route the message is checked for errors, stance. When the document is fed into the
stored temporarily, and forwarded to the machine the ink is magnetized, enabling
next point when the necessary resources each character to be sensed by magnetic
become available. Compare packet switch- read heads. For the machine to recognize
ing. and encode the characters, they must be of

137
micro

Digits that can be used in MICR

an appropriate shape and size and have a Microcomputers were originally rather
high print quality; one standardized and limited in what they could do. With the
widely used set of type is rectangular in ap- emergence of more powerful, more sophis-
pearance with thickened vertical sections. ticated, but cheaper systems they are now
The most common application of MICR is regarded as serious problem-solving tools
in the handling of cheques by banks; in many fields, including business, science,
cheque number, branch number, and ac- and engineering, and are a standard feature
count number are printed in magnetic ink in many homes. The capability of the sys-
characters along the bottom of the cheque, tem depends not only on the characteristics
the amount of the cheque being added of the microprocessor employed but also
manually. See also OCR; OMR. on the amount of storage provided, the
types of peripheral devices that can be
micro /mÿ-kroh/ See microcomputer. used, the possibility of expanding the sys-
tem with add-on peripherals and addi-
micro- 1. a prefix to a unit, indicating a tional storage, and other possible options.
submultiple of one millionth (i.e. 10–6) of
that unit, as in micrometer, microsecond, microelectronics /mÿ-kroh-i-lek-tron-iks/
or microvolt. The Greek letter µ (mu) is Electronics involving the use of very small
used as the symbol for micro-; micrometer, electronic parts to build circuits and sys-
microsecond, and microvolt are thus often tems.
written µm, µs, µV. Micro- is part of a se-
quence milli-, micro-, nano-, pico-, … microfiche, microfilm /mÿ-kroh-feesh,
of decreasing powers of 1000. mÿ-kroh-film/ See COM.
2. A prefix indicating smallness or compar-
ative smallness, or something concerned microinstruction /mÿ-kroh-in-struk-shŏn/
with small objects, quantities, etc. See microprogram.

microchip /mÿ-kroh-chip/ A CHIP (inte- microprocessor /mÿ-kroh-pross-ess-er/


grated circuit) used in a microprocessor. The physical realization of the CENTRAL
PROCESSOR of a computer on a single chip
microcode /mÿ-kroh-kohd/ 1. The code of semiconductor, or on a small number of
in which microinstructions of a MICROPRO- chips. It forms the basis of the MICROCOM-
GRAM are written. It is used to create the PUTER. The INTEGRATED CIRCUIT manufac-
microprogram that defines exactly what tured on the chip or chips implements – at
each MACHINE INSTRUCTION does. the very least – the functions of an arith-
2. A sequence of microinstructions. metic and logic unit and a control unit.
Normally there are other sections such as
microcomputer /mÿ-kroh-kŏm-pyoo-ter/ semiconductor memory in the form of RAM
(micro) A computer system that uses a (random-access memory) for data and pro-
MICROPROCESSOR as its processing unit. The grams and ROM (read-only memory) for in-
central control and arithmetic element is built programs, plus special REGISTERS and
thus fabricated on (usually) one CHIP of input/output circuits.
semiconductor material. In addition a mi- Microprocessors are characterized by a
crocomputer contains storage and combination of their speed (i.e. CYCLE
input/output facilities for data and pro- time), their WORD length, their INSTRUCTION
grams, possibly all on the same chip as the SET, and their ARCHITECTURE (i.e. storage
microprocessor. organization and addressing methods, I/O

138
milli-

operation, etc.). They are used not just in addition to ROM. Use of RAM allows
microcomputers but are embedded in a modifications to be made and specialized
wide variety of devices. microinstructions to be introduced.
The first microprocessor – the Intel
4004, produced by the US company Intel – Microsoft /mÿ-kroh-soft/ Trademark
appeared in 1971. It had a 4-bit word Microsoft Corporation is the largest pro-
length, 4.5 kilobytes of memory, and 45 in- ducer of PC operating systems and applica-
structions. Its 8-bit counterpart, the Intel tions, founded in 1975 by Paul Allen and
8008, was introduced in 1974 and its im- Bill Gates. See also Windows.
proved derivative, the Zilog Z80, in 1976.
The number of microprocessors, and their MIDI /mid-ee/ (musical instrument device
sophistication, has increased rapidly – interface) A standard INTERFACE that al-
alongside developments in the fabrication lows electronic instruments such as musi-
technology of integrated circuits. The Intel cal keyboards and synthesizers to be
PENTIUM 4 series of microprocessors, intro- attached to and used on a computer. The
duced in 2000 and now the usual chip in MIDI standard is supported by most syn-
computers designed for SOHO use, has a 32- thesizers and sounds created by one syn-
bit word length and can address at least 4 thesizer can be played and manipulated by
gigabytes of memory; other microproces- another. Applications are available for
sors, such as the ITANIUM, are more power- composing and editing music on comput-
ful still. ers to MIDI standards.

microprogram /mÿ-kroh-proh-gram/ A migration The process of moving from


sequence of fundamental instructions, the use of one operating environment to
known as microinstructions, that describe another. Migration can be small, for exam-
all the steps involved in a particular com- ple taking an existing application and mak-
puter operation. It is the means by which ing it work on another computer or
an operation is accomplished. A micropro- operating system, or large scale involving
gram is set into action once a MACHINE IN- many systems, new applications, or a re-
STRUCTION is loaded into the INSTRUCTION designed network. Data can be migrated
REGISTER of a computer. One part of the in- from one kind of database to another, usu-
struction – the operation part – specifies ally involving the conversion of data to
the operation to be performed, and the mi- some intermediate common form.
croprogram for that operation can then be
executed. Almost all processors in both millennium bug A problem that faced
large and small computers are now micro- some computers when year 2000 was
programmed, i.e. controlled by micropro- reached. There were two main problem
grams. (It is often thought, mistakenly, areas. The first was that some software,
that only microcomputers use micropro- mainly accounting and database applica-
grams.) tions, relied on 2 digits to represent the
The memory in which microprograms year and produced incorrect follow-on
are stored forms part of the CONTROL UNIT dates. The second involved the BIOS giving
or ARITHMETIC AND LOGIC UNIT of the com- incorrect dates after Dec 31, 1999. Most of
puter. It is sometimes referred to as control the problems were resolved either by new
store. It must be very fast (i.e. have a very issues of software or patches to existing
short storage cycle) and not prone to er- software and very little disruption was
rors. Semiconductor ROM (read-only mem- caused.
ory) is almost always used. The contents
are therefore fixed, and the circuitry itself milli- /mil-ee/ A prefix to a unit, indicat-
is usually permanently connected. In larger ing a submultiple of one thousandth (i.e.
computers semiconductor RAM (random- 10–3) of that unit, as in millimeter, millisec-
access memory) can be used to store mi- ond, or millivolt. The symbol m is used for
croprograms, either instead of or in milli-; millimeter, millisecond, and milli-

139
MIMD

volt are thus often written mm, ms, mV. bar button with the application’s name on
Milli- is part of a sequence it.
milli-, micro-, nano-, pico-, …
of decreasing powers of 1000. minitower /min-ee-tow-er/ A microcom-
puter in which the power supply, mother-
MIMD (multiple instruction multiple data board, and mass storage devices are
stream processing) A type of computer stacked on top of one another in a small
architecture used in parallel processing in vertical cabinet.
which CPUs are used to process data and
fetch instructions independently. See CPU; MIP mapping A technique used in 3D
parallel processing. graphics for correcting pixelation and
speeding up rendering times. Different pre-
MIME /mÿm/ (multipurpose Internet mail built texture maps are applied when the
extensions) A method for attaching files object on the screen is close up or far away.
to an e-mail that allows 8-bit binary data MIP is an abbreviation for the Latin mul-
to be included with the e-mail rather than tum in parvo (many in few).
encoding the binary data as 7-bit ASCII text.
An e-mail program is said to be MIME MIPS Millions of instructions per sec-
compliant if it can both send and receive ond; a measure of processor speed.
files using the MIME standard.
mirror An arrangement where data is
mini /min-ee/ See minicomputer. written to more than one hard disk simul-
taneously, so that if one disk fails, the sys-
minicomputer /min-ee-kŏm-pyoo-ter/ tem can instantly switch to the other disk
(mini) Loosely, a medium-size computer, without any loss of data or service. Mir-
i.e. one that is usually considered to be rored disks are a type of RAID.
smaller and less capable in terms of perfor-
mance than a contemporary MAINFRAME mirror site A Web or FTP site that
computer, and hence cheaper. A modern maintains exact copies of material origi-
minicomputer might well operate faster nated at another location, usually in order
than many of the mainframes used in the to provide more widespread access to the
l970s. Again, it might be outperformed by information or to improve the perfor-
a sophisticated MICROCOMPUTER. Mini- mance of a heavily used site.
computers came on the scene before micro-
computers and the boundary between the mod /mod/ Modulo. See integer arith-
two is no longer clear. metic.
Minicomputers are often to be found in
laboratories built into complex experi- model A mathematical or graphical rep-
ments, or controlling industrial processes. resentation of something. Mathematical
They are also used for small multiuser sys- models can usually be changed so that
tems, although networks of PERSONAL COM- ‘What if’ analyses can be carried out. See
PUTERS attached to a server are now also simulation.
commonly used for this purpose. Main-
frame computers often have a number of modem /moh-dem/ A device that con-
minicomputers to perform such tasks as verts a DIGITAL SIGNAL into an ANALOG SIG-
input/output or communications, thus NAL suitable for transmission over an
freeing the power of the mainframe CPU analog communication channel, and that
for more demanding tasks. converts an incoming analog signal back
into a digital signal. It does this by MODU-
minimize To shrink a window down so LATION of the digital signal and demodula-
that it is displayed only on the TASK BAR. A tion of the incoming analog signal. (The
minimized application remains active and word ‘modem’ is a contraction of ‘modula-
can be brought back by clicking on the task tor/demodulator’.) A pair of modems can

140
monadic operator

thus be used to connect two units – two ing ANALOG SIGNAL. The other signal may
computers, say, or a computer and a termi- for instance be a DIGITAL SIGNAL, e.g. a
nal – across a telephone line; the streams of stream of bits. The pattern conveyed by
bits from each unit are digital signals that this signal is superimposed on the carrier
are converted by the modems into continu- by varying one of the properties of the car-
ously varying signals suitable for transmis- rier, e.g. its frequency, amplitude, or phase.
sion. This modified analog signal – the modu-
lated signal – can then be transmitted.
moderator /mod-ĕ-ray-ter/ A person or Demodulation is the reverse process to
group who has the authority to intervene in modulation: a signal is obtained from a
a newsgroup or other on-line discussion
modulated signal (by means of a demodu-
forum and to block messages where appro-
lator) and has the same shape as the origi-
priate. A moderated forum has fewer
nal modulating signal.
FLAMES and less SPAM than unmoderated fo-
See also modem.
rums.

Modula-2 /moj-ŭ-lă/ A programming modulator /moj-ŭ-lay-ter/ See modula-


language developed in the 1970s to correct tion.
some of the deficiencies in PASCAL. Its em-
phasis is on modular programming and it is module /moj-ŭl/ 1. A largely self-con-
used to teach beginners good programming tained component of a program. See mod-
techniques. ular programming.
2. A unit of hardware that has a specific
modular programming /moj-ŭ-ler/ A function or carries out a specific task and is
style of programming in which the com- designed for use with other modules.
plete program is broken down into a set of
components, called modules. Each module modulo /moj-ŭ-loh/ See integer arith-
is of manageable size, has a well-defined metic.
purpose, and has a well-defined boundary
composed of one or more INTERFACES. Al- modulo-n check (checksum; remainder
most all programs are modular in struc- check) A type of CHECK, i.e. an error-
ture. The basis on which a program is detecting process performed on an item of
broken down could be that, for example, information. In the simplest case the indi-
each module involves one specific task to vidual bits making up the item are added
be performed by the computer. Alterna- together and divided by a number n to
tively each module could involve a single generate a remainder. For example, in a
design decision. It should be possible for modulo-5 check the number n is 5 and the
the modules to be developed, tested, and remainder will be 0, 1, 2, 3, or 4. This re-
debugged independently. Modules can
mainder is added as an additional digit –
then be brought together and tested to see
the check digit – to the item of information.
if they operate together correctly. Finally
The check digit can be recomputed after
the whole program can be tested to ensure
that it is performing in the desired way. A the item has been transferred or otherwise
modular program is easy to amend or up- manipulated. The new value is compared
date, in many cases the modifications being with the received value, and most simple
necessary in just one module. bit errors (certainly all single bit errors)
will be detected.
modulation /moj-ŭ-lay-shŏn/ The pro- If the number n is made equal to 2, then
cess of altering one SIGNAL (called the car- the process is known as a PARITY CHECK and
rier) according to a pattern provided by the check digit can be a parity bit.
another signal. The device used to achieve
this is known as a modulator. The carrier is monadic operator /mon-ad-ik/ (unary
usually a continuously and regularly vary- operator) See operator.

141
monitor

monitor A video display unit in a com- puter systems, the motherboard carries all
puter system. the major functional elements, e.g. the
processor and some of the memory; addi-
monochrome /mon-ŏ-krohm/ Using or tional boards plugged into the mother-
involving only one color. For example, a board perform specific tasks such as
monochrome graphics image uses one memory extension or disk control.
color, shades of that color, and no color
(i.e. white). The color is usually black, in Motorola /moh-tŏ-roh-lă/ Formerly one
which case the image is a GRAY SCALE of the leading manufacturers of micro-
image. processors. Until the early 1990s, Mo-
torola chips were used in all Macintosh
monospaced /mon-ŏ-spaysst/ Describ- computers and in many workstations. To-
ing a font in which all the characters oc- gether with Apple Computer and IBM,
cupy the same width. Typewriter-like fonts they launched the PowerPC architecture in
such as Courier are monospaced. They are 1994. In 2004 Motorola’s semiconductor
often used in software programs where division became a separate company
vertical alignment needs to be maintained. (Freescale Semiconductor), allowing Mo-
See also fixed format. torola to concentrate on cellphones and
other communications equipment.
morphing /mor-fing/ The gradual trans-
formation of one image into another. This mouse A pointing device that is moved
is a common motion-picture special effect by hand around a flat surface: the move-
and is available in computer animation ments on the surface are communicated to
packages. a computer and cause corresponding
movements of the CURSOR on the display.
MOS /moss/ (metal oxide semiconductor) The mouse has one or more buttons to in-
See integrated circuit. dicate to the computer that the cursor has
reached a desired position (by a ‘click’).
Mosaic /mŏ-zay-ik/ Client browser soft- Usually, a click on the main mouse button
ware for access to WWW, Gopher, and is equivalent to ‘enter’ on the keyboard;
FTP servers. It was the first WWW browser however, on Windows systems the default
that was available for Macintosh, Win- is that a click selects an item while a dou-
dows, and Unix, all with the same inter- ble-click is equivalent to ‘enter’ and opens
face. Development ceased in 1997. See also it. Using suitable software, other mouse
NCSA. buttons can be assigned different func-
tions. A mouse is normally connected by
MOSFET /moss-fet/ (metal oxide silicon cable to the computer; a ‘tailless’ mouse
field-effect transistor) A field-effect tran- communicates by means of infrared rather
sistor that uses the MOS capacitor, which than electrical signals (as occurs in a TV
is a two-terminal capacitor structure, as its remote control system).
basis.
mousepad /mowss-pad/ (mouse mat) A
most significant digit (msd) The digit small mat that provides better traction for
in the most significant, i.e. leftmost, posi- a mouse ball than the smooth surface of a
tion in the representation of a number, and desk or table. It usually has a plastic sur-
thus making the largest contribution to the face and a thin non-slip rubber or plastic
value of the number. With a binary number backing.
this digit is referred to as the most signifi-
cant bit (msb). MP (multilink point-to-point protocol)
An extension of the PPP protocol that al-
motherboard /muth-er-bord, -bohrd/ A lows multiple physical connections be-
PRINTED CIRCUIT BOARD into which other tween two points to be combined into a
boards can be plugged. In most microcom- single logical connection. The combined

142
MS-DOS

MP3 files
MP3 files uploaded to the
downloaded Internet to be
from the Internet used by another
user

audio is
digitally
compressed
and encoded
to make MP3
files

MP3 files collected


MP3 files ripped by the computer
from an audio from a portable
CD to the MP3 player
computer
MP3 files
MP3 files transferred to
made into an a portable
audio CD MP3 player

MP3

connections are called a bundle and pro- removable flash memory cards, and
vide greater BANDWIDTH than a single con- plugged into the player to swap collections
nection. MP is an open standard specified of music. The illegal sharing of music in
in RFC 1990. MP3 format, in breach of copyright, has
been a cause of controversy in recent years.
MP3 A form of audio compression See also iPod.
adapted from the MPEG format for com-
pressed video. Similar to Dolby Digital, MPEG /em-peg/ (moving picture experts
MP3 compresses the sound by filtering out group) The set of digital video compres-
the differences in the sound signal that the sion standards and file formats developed
human ear cannot detect. Additionally, a by a working group of the ISO. MPEG
musical CD has a sampling rate of 44 100 achieves a high compression rate by only
times a second, whereas MP3 can produce storing the changes from one frame to the
almost the same quality by sampling at next, instead of each entire frame. The
16 000 times a second for music and video information is then encoded using
10 000 times a second for voice. This discrete cosine transform. MPEG uses a
means a sound track can be compressed to type of lossy compression as some data is
about one-tenth its original size. removed. However this is generally imper-
ceptible to the eye. There are several
MP3 player A portable device that can MPEG standards, the latest being MPEG-
store sound tracks in MP3 format, usually 7. Files in this format have the file exten-
music, and play them through earphones. sion mpeg or mpg.
MP3 players can be connected to comput-
ers and tracks transferred from the com- msb (most significant bit) See most sig-
puter to the inbuilt memory (RAM) in the nificant digit.
MP3 player. 32-MB flash memory can
store 32 minutes of CD-quality sound msd See most significant digit.
using 128 kilobits of storage for each sec-
ond of sound. MP3 files can be stored on MS-DOS /em-ess-doss/ Trademark An

143
MSN

OPERATING SYSTEM produced by Microsoft multifunction card /mul-ti-funk-shŏn/


Corp. It was introduced in 1981 and in- (multifunction board) See expansion
tended for use on microcomputers that card.
supported a single user at any one time. It
was the standard operating system on PCs multimedia /mul-ti-mee-dee-ă/ Electronic
before Windows was created. It provided a media that includes pictures, animations,
basic set of services for using and storing video, and sounds as well as text.
files on disk and communicating with
other peripheral devices, as well as an envi- multiplate disk /mul-tĭ-playt/ A disk
ronment to run one program at a time, a storage medium in which there is more
command line interface, and a simple than one plate on which data can be stored.
BATCH FILE facility. Windows still supports
MS-DOS programs for backward compat- multiplexer /mul-tĭ-pleks-er/ (MUX) A
ibility and provides an MS-DOS CLI that device that merges information from sev-
runs in a window. This is sometimes called eral input channels so that it can be trans-
a DOS box. mitted on a single output channel. One
transmission channel can thus be shared
MSN Microsoft’s Web PORTAL, which among multiple sources of information or
offers e-mail, news, information, entertain- multiple users. This can be achieved by al-
ment, on-line shopping, and chat rooms. locating to each source or user a specific
time slot in which to use the transmission
MTBF (mean time between failures) See channel; this is known as time division
failure. multiplexing (TDM). Alternatively the
transmission channel can be divided into
MTU (magnetic tape unit) See tape unit. channels of smaller bandwidth – frequency
range – and each source or user is given ex-
multiaccess system /mul-ti-ak-sess/ A clusive use of one of these channels; this is
system allowing several people to make known as frequency division multiplexing
apparently simultaneous use of one com- (FDM). Multiplexers are often used in
puter, usually a mainframe or minicom- pairs, connected by a single transmission
puter. Each user has a TERMINAL, usually a channel and allowing contact to be made
VDU plus keyboard. The terminals are between any of a large choice of points at
connected to a MULTIPLEXER or to a FRONT- each end.
END PROCESSOR, both of which transmit the
data, etc., from the various terminals to the multipoint /mul-ti-point/ A communica-
computer in a controlled way. The OPERAT- tions line in which several secondary sta-
ING SYSTEM of the computer is responsible tions are sequentially connected along the
for sharing main store, processor, and line and the line is usually controlled by a
other resources among the terminals in use, primary station.
which it accomplishes by MULTITASKING or
TIME SHARING. As the number of users at multiprocessing system /mul-ti-pross-
any one time increases, the RESPONSE TIME ess-ing/ A computer system in which two
of the computer gets longer. A multiaccess or more PROCESSORS may be active at any
system is an example of a MULTIPROGRAM- particular time. Two or more programs
MING SYSTEM. can therefore be executed at the same time
– a multiprocessing system is thus also a
multicasting /mul-ti-kast-ing, -kahst-/ MULTITASKING system. The processors share
The simultaneous sending of a message to some or all of main store. They must also
several network destinations. Multicasting share other resources, such as input/output
refers to sending a message to a select devices and parts of the system software.
group whereas broadcasting refers to send- The allocation and release of resources is
ing a message to everyone on a network. under the control of the OPERATING SYSTEM.

144
MUX

multiprogramming system /mul-ti-proh- ing the operating system takes the decision.
gram-ing/ A computer system in which Preemptive multitasking is generally pre-
several individual programs may be exe- ferred, because a single misbehaving pro-
cuted at the same time through MULTITASK- cess that does not give up control properly
ING. can bring other processes to a halt in a co-
operative multitasking system.
multitasking /mul-ti-task-ing/ The pro- Some operating systems allow processes
cess of loading and running at least two themselves to be multitasked, by subdivid-
PROCESSES (tasks) at the same time. A MUL- ing them into parallel units of execution
TIPROCESSING SYSTEM, containing several called threads. In such systems the alloca-
processors, is a multitasking system. It is tion of processor time is performed at the
also feasible for a multitasking system to be thread level rather than the process level. In
operated with only one processor. On any general all a process’s threads share its re-
processor only one processing task can sources, such as memory, files, etc. (by con-
take place at a particular time. In a multi-
trast, each process has its own independent
tasking system there is rapid switching be-
set of resources). The use of more than one
tween the tasks to be performed for each of
thread in a process is called multithread-
the processes running. For example, while
ing.
one process is waiting for an input or out-
put operation to be completed, another
process can be allocated use of the proces-
multithreading /mul-ti-thred-ing/ 1. See
sor. TIME SLICING is also used. This switch- multitasking.
ing procedure is under the control of the 2. In data manipulation, the use of extra
OPERATING SYSTEM, which also controls the
pointers in a tree data structure to facilitate
allocation and release of other resources in moving around the structure.
the system.
Multitasking enables optimum use to multiuser system /mul-ti-yoo-zer/ A
be made of the computer resources as a computer system that is apparently serving
whole: a processor operates very much more than one user simultaneously. A
faster than its peripheral devices, and valu- multiuser system is generally a MULTIAC-
able processor time is wasted if the proces- CESS system.
sor remains idle while a process uses a
peripheral. mutual exclusion A programming
Most current operating systems sup- technique used to ensure that a resource,
port multitasking, which can be coopera- such as a file, can be used by only one pro-
tive or preemptive. In cooperative gram at a time.
multitasking, processes give up control vol-
untarily, whereas in preemptive multitask- MUX See multiplexer.

145
N

nagware /nag-wair/ Informal Shareware space and their identifier. A common syn-
that reminds the user at regular intervals tax, used in C++, is ‘nsa::x’ and ‘nsb::x’ to
that payment or registration is needed. distinguish the two procedures called ‘x’.
Namespaces are not only applicable to
NAK (negative acknowledgment) The programs: XML uses them to prevent dupli-
ASCII character 21 transmitted as a con- cate ELEMENT and ENTITY names. Name-
trol code by a receiving station to a sending spaces are generally hierarchical: i.e. it is
station to indicate that the transmitted in- possible to qualify the contents of a name-
formation has been received incorrectly space by dividing it into two or more sub-
and should be resent. See also acknowledg- namespaces. There are various conventions
ment. to ensure that publicly-used namespaces
are unique; for example JAVA namespaces
name A means of referring to or identi- should begin with the Internet DOMAIN
fying some element in a computer pro- NAME of the author.
gram, in a computer NETWORK, or in some
other system. For example, VARIABLES, AR- NAND gate /nand/ A LOGIC GATE
RAYS, and PROCEDURES in a program would whose output is low only when all (two or
be named, as would be the NODES in a net- more) inputs are high, otherwise the out-
work. In many programming languages a put is high. It can thus be regarded as an
name must be a simple IDENTIFIER consist- AND GATE followed by a NOT GATE: it effec-
ing of a string of one or more characters. In tively first performs the AND operation on
most of these languages names can be cho- its inputs then negates the output, i.e. per-
sen quite freely by the programmer. The forms the NOT operation on it. The TRUTH
names used in a program are stated in a se- TABLE for a NAND gate with two inputs
ries of DECLARATIONS. When the program is (A, B) is shown, where 0 represents a low
compiled or assembled, prior to execution, signal level and 1 a high level. The LOGIC
names are converted to MACHINE ADDRESSES OPERATION implemented by the gate is
by means of a SYMBOL TABLE. Compare lit- known as the NAND operation and can be
eral. written as A NAND B for inputs A and B.

namespace A named group of IDENTI-


FIERS. This device, found in many modern A B output
computer languages, aids program or data 0 0 1
organization and in particular prevents 0 1 1
name clashes between modules. A software 1 0 1
library, for example, might define a name- 1 1 0
space called ‘nsa’ and assign to it the pro-
cedures ‘x’, ‘y’, and ‘z’. Another software
Truth table for NAND gate
library might also have procedures with
these names, but it assigns them to its own
namespace, ‘nsb’. A programmer can use
both libraries without problems by refer- The NAND gate is important because
ring to the functions by both their name- any logic gate can in theory be constructed

146
negation

from a suitable combination of NAND database framed in natural language. Var-


gates. For example, a two-input NAND ious syntax rules must be obeyed so that
gate with one input kept permanently high the system can parse the query.
acts as a NOT gate. An AND gate is pro-
duced by feeding the output of a NAND navigation 1. The control of cursor
gate through such a NOT gate, i.e. movement using the navigation keys on the
NOT (A NAND B) = A AND B keyboard or a mouse.
This can be checked by means of the 2. The process of moving around in a doc-
NAND and AND truth tables. Again, an ument or on the WWW using hyperlinks.
OR GATE is produced if each of the two in-
puts to a NAND gate is first fed through a NCR paper A paper that is impreg-
NOT gate, i.e. nated with a special chemical so that it
(NOT A) NAND (NOT B) = A OR B darkens when pressure is applied, used in
See also NOR gate. multipart forms, especially those printed
on continuous stationery to be used on a
NAND operation See NAND gate. computer system. NCR stands for ‘no car-
bon required’.
nano- /nan-oh-/ A prefix to a unit, indi-
cating a submultiple of one thousand mil- NCSA The National Center for Super-
lionth (i.e. 10–9) of that unit, as in computing Applications; a research center
nanometer or nanosecond. The symbol n is based in the University of Illinois and
used for nano-; nanometer and nanosec- formed in 1985 as part of the National Sci-
ond are thus often written nm and ns. ence Foundation. NCSA MOSAIC and
Nano- is part of a sequence NCSA TELNET are two of its best-known
milli-, micro-, nano-, pico-, … products.
of decreasing powers of 1000.
NDIS (network driver interface specifica-
NAP (network access point) An inter- tion) A Windows device driver interface
change point for network access. Informa- developed by Microsoft and 3COM that
tion originating on a network and being enables a single NETWORK interface card
accessed by another network invariably (NIC) to support multiple protocols, for
passes through at least one NAP. example TCP/IP and IPX connections.

NAS See network-attached storage. near letter quality (NLQ) A print qual-
ity that is not quite as good as LETTER QUAL-
native compiler The usual form of ITY, the quality produced by a top-quality
compiler, which runs on a computer pro- electric typewriter, but is better than draft
ducing an object file for that computer, as quality. The term is mainly used of dot ma-
opposed to a CROSS COMPILER. trix printers and is becoming less common
with the increased use of laser printers,
natural language Language as used and which generally give better quality than
spoken by humans as opposed to a pro- electric typewriters.
gramming or machine language. One facet
of ARTIFICIAL-INTELLIGENCE research is the negation 1. In computing, a NOT OPERA-
approximating of natural language in a TION, the performance of a NOT opera-
computer environment. tion, or the result of a NOT operation. The
NOT operation can be performed, for ex-
natural-language processing The study ample, on a binary digit or number or a
of computer systems that can react to and logic statement. The outcome is the COM-
understand both spoken and written nat- PLEMENT of that entity. (It should be noted
ural language. that if a number is stored in two’s comple-
ment, then to negate it is to take the two’s
natural-language query A query to a complement.)

147
negative acknowledgment

2. The changing of the sign of a nonzero connected system. The information is sent
number or quantity. The negation of +42 is as an encoded signal, and is transmitted
–42; the negation of –42 is +42; the nega- along communication lines such as tele-
tion of 0 is 0. phone lines, satellite channels, electric ca-
bles, and optical fibers.
negative acknowledgment See acknowl- It is not sensible (in terms of cost and ef-
edgment; NAK. ficiency) for each computer to be directly
connected to every other computer on the
NEQ gate See nonequivalence gate. network: communication lines are expen-
sive to provide and maintain and would be
nested structure A programming struc- unused for much of the time. Direct con-
ture that is incorporated into another nections are made only at certain points in
structure of the same kind. More than one the network, called NODES. (Strictly, a net-
structure, of the same kind, can be incor- work is a set of interconnected nodes.)
porated. For instance, one or more LOOPS Computers are attached to some or all of
can be nested in another loop. the nodes. Nodes may be at a junction of
two or more communication lines or may
Net See Internet. be at an endpoint of a line. A particular
piece of information has to be routed along
NetBIOS (network basic input output a set of lines to reach its specified destina-
system) An application programming in- tion, being switched at the nodes from one
terface (API) that adds special functions to line to another, often by a computer. A
the MS-DOS BIOS for local area networks. particular destination is specified by its AD-
DRESS, which is indicated by the sender and
netiquette /net-ă-ket/ Internet etiquette; forms part of the transmitted signal.
guidelines for posting messages to on-line The computers on a network may be
services and particularly newsgroups. organized in several ways (see diagram). In
a star structure all communication lines
Netscape Navigator /net-skayp/ A connect directly to a single central or con-
Web BROWSER produced by Netscape Com- trolling node. The endpoints on each line
munications Corporation, which was cannot therefore communicate directly. In
founded in 1994 by James H. Clark and a ring structure there is a single loop of
Marc Andreessen. It was based on MOSAIC communication lines (usually electric ca-
and was one of the first commercial Web bles) between the various nodes on the net-
browsers. It runs on all major platforms, work. Each node is thus connected to two
Windows, Macintoshes, and UNIX. For- adjacent ones. Information can pass in
merly the leading Web browser, it has been only one direction around the loop. A bus
overtaken by INTERNET EXPLORER. configuration is linear rather than circular.
All nodes are connected to a single electric
Netware /net-wair/ A local area net- cable acting as a bus, and information can
work (LAN) operating system developed travel in both directions.
by Novell Corporation. Formerly the lead- See also local area network; wide area
ing network operating system, it has been network; packet switching; message
overtaken by WINDOWS-based systems. switching.

network /net-werk/ Loosely, a group of network administrator The person who


computer systems that are situated at dif- is in control of a network.
ferent places and are interconnected in
such a way that they can exchange infor- network architecture The aspects of
mation by following agreed procedures the design of a communications network
(see protocol). The computer systems must that involve the way in which the network
be capable of transmitting information communicates and how its interconnec-
onto and receiving information from the tions are arranged.

148
network-attached storage

network-attached storage (NAS) A SERVERS but do so more efficiently: because


device, connected to a network, on which they are special devices and not general-
data is stored rather than on the network’s purpose computers running file-serving
servers. NAS devices consist of an NAS software, they can be optimized to do
Head, which is connected to network and nothing but handle data quickly and se-
handles all data requests, and one or more curely. As well as providing general shared
data-storage devices, such as RAID disk ar- storage for the network’s users, NAS de-
rays, controlled by the NAS Head. NAS de- vices can take the place of the local hard
vices perform many of the functions of FILE disks on all types of server. This consolida-

star network

ring network

bus network

nodes

flow of information

controlling node

Types of network configuration

149
network computer

tion of data storage and its separation from network topology See network archi-
other network functions simplifies both tecture.
network management and the addition of
new storage capacity. NAS is not appropri- neural network /new-răl/ A network of
ate to all networks: it is unnecessarily so- interconnected components (called neu-
phisticated for small networks, while the rons), designed so that an input signal to
faster STORAGE AREA NETWORKS are often each component is multiplied by a weight-
preferred in large networks. ing factor and passed to two or more other
components, and so on. The output signal
network computer See thin client. depends on the weighting factors used, and
these can be adjusted so as to optimize the
network database 1. A type of data- final output. Neural networks are designed
base that is similar to but less rigorously by analogy with the transmission of im-
structured than a HIERARCHICAL DATABASE, pulses in the human brain. They do not
in that records, or nodes, can have more have to be physical networks; usually they
than one parent. Network databases are are simulated by a computer. They can be
less powerful than RELATIONAL DATABASES. ‘trained’ to recognize patterns in large
2. A database that runs in a network. amounts of data and are used for making
3. A database containing the addresses of predictions (e.g. in financial markets).
users on a network. They are also used for research in ARTIFI-
CIAL INTELLIGENCE.

network directory A DIRECTORY that


can be used, if rights have been granted, by
neuron /new-ron/ See neural network.
other computers on a LAN.
news aggregator See Web feed.
network drive A disk drive that can be
newsgroup A discussion group on
used, if rights have been granted, by other
USENET. Newsgroups cover every conceiv-
computers on a LAN.
able interest. A NEWSREADER is needed to
view and post messages to a newsgroup.
network interface card See NIC.
newsreader A client application en-
network layer See OSI. abling the user to read messages posted to,
and send messages to, Internet news-
network operating system (NOS) An groups. Microsoft Internet Explorer and
operating system that includes the capabil-
Netscape Navigator both include news-
ity for organizing computers and devices readers. A number of freeware, shareware,
on a local area network (LAN). Some, such and commercial newsreaders are also
as UNIX, Windows, and Mac OS, are stan- available.
dard operating systems, but others, such as
Netware, are exclusively devoted to net- news server A computer or program
working functions. that exchanges Internet newsgroups with
newsreader customers and other servers.
network switch A device that performs
the same function as a HUB but in a more ef- NEXT See Basic.
ficient fashion. In particular, as far as pos-
sible it only sends PACKETS it receives to nibble (quadbit) A unit of 4 bits (i.e. half
their correct destination NODE rather than a byte).
broadcasting them to all connected nodes.
This strategy makes better use of available NIC (network interface card) An expan-
BANDWIDTH and gives improved network sion board enabling a computer to be at-
performance. tached to a network. A NIC is usually

150
NOR gate

designed to interface with a particular net- high and the rest are low; otherwise the
work, protocol, and media. output is low. It effectively performs the
operation of EQUIVALENCE on its inputs and
NLQ See near letter quality. then negates the output, i.e. performs the
NOT OPERATION on it. The TRUTH TABLE for
NNTP (network news transport protocol) a gate with two inputs (A, B) is shown,
The protocol used by client and server soft- where 0 represents a low signal level and 1
ware to carry USENET postings back and a high level.
forth over a TCP/IP network. The NEQ gate is also called the exclu-
sive-OR (or XOR) gate: it excludes the
node 1. A point in a computer NETWORK possibility (allowed in the OR GATE) that
where communication lines, such as tele- the output is high when more than one
phone lines, electric cables, or optical input is high. See also equivalence gate.
fibers, are interconnected, or the endpoint
of such a line. Some nodes are used to con- noninterlaced /non-in-ter-laysst/ Describ-
nect client computers, SERVERS, printers, ing monitors and video standards that do
etc., to the network. Others, especially on not use INTERLACING techniques to improve
larger networks, are devices dedicated to resolution.
the operation of the network itself, for ex-
ample HUBS, NETWORK SWITCHES, RE- nonlocal variable /non-loh-kăl/ See scope.
PEATERS, BRIDGES, and ROUTERS.
2. See tree. nonprocedural language A PROGRAM-
MING LANGUAGE where the programmer
noise Any unwanted electrical signals states the problem but does not specify the
occurring in a system and producing dis- exact steps (procedure) to be used in solv-
turbances in the output of the system. ing it. FOURTH and FIFTH GENERATION LAN-
Noise can disturb a TV picture or make a GUAGES are nonprocedural languages.
telephone message inaudible. It can also in- Compare procedural language.
troduce errors in data communications.
nonvolatile memory /non-vol-ă-tăl/ A
nonbreaking space A character repre- type of memory whose contents are not
senting a space between words that must lost when the power supply to the memory
not be split between lines in text format- is switched off. ROM is nonvolatile mem-
ting. ory. Compare volatile memory.

nondestructive read The process of no-op instruction /noh-op/ (do-nothing


reading a memory device in a way that operation) An instruction whose execu-
does not alter the contents of the device. tion causes no action to take place in a
Most devices are read in this way. computer. The computer just proceeds to
the next instruction to be executed.
nonequivalence gate (NEQ gate) A
LOGIC GATE whose output is high only NOR gate /nor/ A LOGIC GATE whose
when one of its (two or more) inputs is output is high only when all (two or more)

A B output A B output
0 0 0 0 0 0
0 1 1 0 1 0
1 0 1 1 0 0
1 1 0 1 1 0

Truth table for nonequivalence (NEQ) gate Truth table for NOR gate

151
normalization

inputs are low, otherwise the output is low. notation The set of symbols and for-
It can thus be regarded as an OR GATE fol- mats used in a programming language.
lowed by a NOT GATE: it effectively first per-
forms the OR operation on its inputs then notebook A small LAPTOP computer
negates the output, i.e. performs the NOT usually weighing less than 6 lbs that will fit
operation on it. The TRUTH TABLE for a inside a briefcase.
NOR gate with two inputs (A, B) is shown,
where 0 represents a low signal level and 1 NOT gate (inverter) The only LOGIC
a high level. The LOGIC OPERATION imple- GATE with a single input. When the input is
mented by the gate is known as the NOR high then the output is low; when the input
operation and can be written as A NOR B is low the output is high. The NOT gate
for inputs A and B. thus performs the NOT OPERATION on its
The NOR gate is important because input and has the same TRUTH TABLE. The
any logic gate can in theory be constructed truth table is shown in the diagram, where
from a suitable combination of NOR 0 represents a low signal level and 1 a high
gates. For example, a two-input NOR gate level.
with one input kept permanently low (i.e.
earthed) acts as a NOT gate. An OR gate is NOT operation A LOGIC OPERATION

produced by feeding the output of a NOR with only one OPERAND. When applied to
gate through such a NOT gate, i.e. an operand A (a statement or formula, for
NOT (A NOR B) = A OR B instance), the outcome is false if A is true
and is true if A is false. It thus negates the
This can be checked by means of the NOR
truth value of A. The TRUTH TABLE is shown
and OR truth tables. Again, an AND GATE is
in the diagram, where the two truth values
produced if each of the two inputs to a
are represented as 0 (false) and 1 (true).
NOR gate is first fed through a NOT gate,
The operation can be written in several
i.e.
ways, including ∼
(NOT A) NOR (NOT B) = A AND B
NOT A ¬A A ~A A′
See also NAND gate.
The symbol next to the operand A (i.e.
NOT, ¬, etc.) is a LOGIC OPERATOR for the
normalization 1. In relational database NOT operation.
design, the organization of data to mini- In a computer the NOT operation is
mize duplication. The ideal is that data is used in HIGH-LEVEL LANGUAGES to negate a
organized into tables and relationships be- logical expression. It is used in LOW-LEVEL
tween tables in such a way that field mod- LANGUAGES on a BYTE or WORD, producing
ifications, additions, and deletions need a result by performing the NOT operation
take place in only one table. Although nor- on each bit in turn. If 8-bit words are used,
malization makes databases more efficient then for example with the operand
to maintain, they can become very com- 01010001
plex. the outcome of the NOT operation is
2. In programming, changing the represen- 10101110
tation of a floating-point number so that See also NOT gate.
the most significant digit in the mantissa is
not zero. NSFnet /en-ess-eff-net/ A wide area net-
work that was developed by the National
NOR operation See NOR gate. Science Foundation and replaced
ARPANET as the main USA government
NOS /noss/ See network operating sys- network linking research establishments
tem. and universities. It was replaced in 1995
with a commercial Internet backbone. A
NOT /not/ A Boolean operator that re- new backbone for research and develop-
turns the value true when the operand is ment, the very high speed backbone net-
false and vice versa. work service (vBNS), was also set up.

152
num lock key

NT See Windows NT. sitional value increases from right to left by


powers of the base; in BINARY NOTATION,
NTSC (national television standards com- for example, the positional value increases
mittee) An organization for setting tele- by powers of 2. See also hexadecimal nota-
vision and video standards in the USA. tion; floating-point notation; octal nota-
tion.
null character A character denoting
nothing. When interpreted as text it can numerical control The control, by
have a special meaning. For example, in means of a computer, of a manufacturing
database and spreadsheet applications null process. It typically involves a machine
characters are often used as padding and tool used in metal-working, such as a
are displayed as spaces. Most character milling machine, lathe, or welding ma-
sets use character number 0 as the null chine. Numerical control systems range
character. from very simple to quite complex. The
principal variable that is controlled is the
null modem A technique for allowing position of the machine tool during the
two computers to be connected together
manufacturing process. The desired posi-
through a special null-modem cable via
tions for a particular process are calculated
their communications ports. An actual
and stored in numerical form on, for ex-
modem is not required.
ample, a magnetic storage medium, to-
gether with other necessary information.
null string See empty string.
When fed into the computer associated
number cruncher Informal Any pow- with the machine tool, this information is
erful computer designed or used mainly for converted into signals that operate servo-
numerical and mathematical work, usually mechanisms that in turn guide the tool
of a scientific or technical nature. See also through the desired sequence of positions.
supercomputer.
numeric keypad A section on the right-
number system Any of various systems hand side of a keyboard that duplicates the
used to represent and manipulate numbers. normal typewriter number keys and which
A particular system is characterized by its also doubles up the cursor control keys.
BASE, i.e. the number of different digits (and Using the numeric keypad can speed up the
possibly letters) used to represent the num- entry of numerical data.
bers. All present-day number systems are
positional notations. In such a notation the num lock key A toggle key that turns
value of a number is determined not only on/off the locking of the numeric keypad
by the digits it contains but also by the po- into producing numeric codes or enabling
sition of the digits in the number. The po- cursor control.

153
O

object An item of data, such as a picture, and must be LINKED to other, separately
a spreadsheet, or a CAD document, to be compiled, object modules to form the com-
used in a program. See also object-oriented plete program. An object module contains
programming. object code, which is either MACHINE CODE
or, for such languages as JAVA, a machine-
object code See object program. independent code that is interpreted at run-
time. See also object program.
object file A file containing object code,
which has normally been generated by a object-oriented graphics The repre-
compiler or assembler. sentation of images by the use of a combi-
nation of basic graphical shapes (polygons,
object linking and embedding (OLE) ellipses, curves, lines, etc.). Because of the
The use of a data OBJECT created in one ap- way they are defined such objects can be
plication (the server or object application) layered, rotated, or resized with relative
by another (the client application). A file ease. See also computer graphics.
created by the server application is inserted
at the desired point in the client document. object-oriented programming (OOP)
A compound document is created and the Programming using a language in which all
object can be edited from the client appli- the files, inputs, and outputs are consid-
cation using the server application. For ex- ered as discrete objects, and the programs
ample, a spreadsheet inserted into a dealing with these are part of the same ob-
word-processing document will appear as jects. This is a form of modular program-
a seamless part of the document when it is ming in which the definition of each data
printed, but is updated from within the structure is normally contained in one
word-processing application by automati- module. When a data structure’s internal
cally calling the spreadsheet application. design is altered and the implementation
An object can be inserted in one of two details of actions carried out on it need to
ways. If it is linked, the compound docu- be changed, the program modifications are
ment contains a link to the object’s original localized and easier to control.
file; any changes made to this file are re-
flected in the compound document, and object program The program that is in
vice versa. If the object is embedded, a copy object code and is ready to be loaded into
of the original file is taken and stored a computer for execution. An object pro-
within the compound document; no con- gram consists of one or more OBJECT MOD-
nection between the original file and the ULES.
compound document is maintained and
changes will not be replicated. OCR (optical character recognition) A
process in which a machine scans a docu-
object module A unit of output from a ment and is able to convert the characters
COMPILER or ASSEMBLER, usually the trans- that it recognizes into a code that can be
lated form of one file of source code. An fed straight into a computer. The machine
object module may be a self-contained pro- is called an optical character reader, also
gram, or it may be part of a larger program sometimes abbreviated to OCR. Scanners

154
off-line browser
binary 000 001 010 011 100 101 110 111
octal 0 1 2 3 4 5 6 7

Octal and binary equivalents

with appropriate software can also func- base-access technologies, ODBC is still
tion as optical character readers. The char- widely used.
acters can be read not only by the machine
but also by a person: they can be letters, odd parity See parity check.
digits, punctuation, and other symbols.
Early optical character readers could only OEM (original equipment manufacturer)
recognize a limited number of rather styl- Usually, an organization that purchases
ized characters. Current devices can now equipment, such as electronic circuitry,
recognize characters in a variety of type- that is to be built into one of its products.
faces, sizes, layouts, etc., and may even rec- In some cases the term is used to refer to
ognize handwritten characters. OCR is the supplier of the equipment.
widely used in billing and banking, opti-
cal characters being used for example on Office (Microsoft Office) A suite of re-
gas and electricity bills. See also MICR; lated applications, developed by Microsoft
OMR. and designed to meet the WORD-PROCESS-
ING, SPREADSHEET, E-MAIL, etc., needs of
octal notation /ok-tăl/ (octal) A number computer users. There are several editions
system that uses 8 digits, 0–7, and thus has of Office, aimed at different types of user.
BASE 8. It is a positional notation (see num- All mainstream editions include WORD,
ber system), positional values increasing EXCEL, OUTLOOK, and POWERPOINT; ACCESS
from right to left by powers of 8. Octal is a and other programs are added in those
convenient shorthand by which people aimed at business users. Although some of
(rather than machines) can handle binary these applications existed prior to Office
numbers. Each octal digit corresponds to a and all can be used on their own, they can
group of 3 binary digits, or bits. Conver- easily share data and successive versions
sion of binary to octal is done by marking have increased common features that assist
off groups of 3 bits in the binary number integration and management in a corpo-
(starting from the right) and replacing each rate environment. First released for the
group by its octal equivalent. Conversion Macintosh in 1989 and Windows in 1990,
of octal to binary is done by replacing each the current versions are Office 2003 (Win-
octal digit by its equivalent binary group. dows) and Office 2004 (Macintosh).
The use of octal notation has declined in
favour of HEXADECIMAL NOTATION. See also off-line 1. Of PERIPHERAL DEVICES or FILES:
binary notation. not under the control of the processing unit
of a computer, i.e. not connected to a com-
ODBC (open database connectivity) The puter system or not usable. A peripheral
Windows interface, part of the WOSA device may be connected to a computer but
(Windows open system architecture), that is off-line if the system has been instructed
provides a common language for applica- not to use it.
tions needing network database access. 2. Involving peripheral devices or files that
The goal of ODBC is to make it possible to are off-line (as in off-line processing or off-
access any data from any application re- line storage).
gardless of which database management Compare on-line.
system is handling the data. In order to
achieve this, both the data and the applica- off-line browser A browser designed to
tion must be ODBC-compliant. Despite the read HTML files from a disk rather than
subsequent release of new Microsoft data- on the Internet.

155
off-line navigator

off-line navigator A piece of software dated periodically, often by adding a copy


used to download and save to disk infor- of the current contents of an OLTP data-
mation from the Internet so that it can be base together with a record of the date and
browsed off-line. This minimizes connec- time the copy was taken. OLAP databases
tion time and reduces costs. are often used in DATA WAREHOUSES. Com-
pare on-line transaction processing.
OLAP See on-line analytical processing.
on-line information service A busi-
OLE /oh-el-ee/ See object linking and ness that provides its users with infor-
embedding. mation transmitted over, for example,
telecommunications lines and possibly a
OLTP See on-line transaction process- range of services such as e-mail, chat, on-
ing. line conferencing, forums, etc. Many on-
line information services are now based on
OMR (optical mark reading; optical mark the Internet.
recognition) A process of data entry to a
computer in which a machine detects on-line transaction processing (OLTP)
marks made by a person in his or her 1. An application that facilitates and man-
choice of indicated positions on a docu- ages activities such as banking, mail order,
ment. The marks could be put for example and travel booking. Because transactions
in one or more chosen columns of a table may span a network and involve more than
or in selected areas of a multiple-choice an- one company, modern OLTP software uses
swer sheet. OMR displaced the less reliable client/server processing and brokering soft-
but similar process of MARK SENSING. In ware.
OMR each mark is detected photoelectri- 2. Describing a database whose contents
cally, usually by the reduction in intensity are frequently updated by many users and
of a narrow light beam after reflection by whose structure is designed to optimize
the mark rather than the less absorbent this type of usage. The term is also used of
paper or card. The positions of a mark on the activities that typically utilize such a
a document indicate the input data. Once a database. Compare on-line analytical pro-
mark has been detected, the relevant data is cessing.
converted into a code that can be fed
straight into the computer. See also OCR; on the fly Describing a process that is
MICR. carried out when needed while normal op-
erations are still proceeding. The term is
one’s complement See complement. also used to describe activities that occur or
develop dynamically rather than as the re-
on-line 1. Of PERIPHERAL DEVICES or FILES: sult of something predefined. An example
under the control of the processing unit of is a Web page that can be varied ‘on the fly’
a computer, i.e. connected to the computer depending maybe on the time of day, what
and usable. previous pages have been looked at, and
2. Involving peripheral devices or files that possibly user input. See also cookie.
are on-line (as in on-line processing or on-
line storage). OOP See object-oriented programming.
Compare off-line.
op code See operation code.
on-line analytical processing (OLAP)
Describing a database whose contents are open Accessible or providing accessibil-
stable and are used as source data for ity. For example, an open file is one that is
analysis, and whose structure is designed ready to be used.
to optimize this usage. The term is also
used of the activities that typically utilize open architecture 1. Any computer ar-
such a database. An OLAP database is up- chitecture or peripheral design whose spec-

156
operation

ifications are public. Open architecture al- LOGIC OPERATION is performed. For exam-
lows other manufacturers or developers to ple, in
produce add-ons. (3 + 5)/2
2. A design allowing for expansion slots on 3, 5, and 2 are the operands. The symbols
a motherboard. + and / are called OPERATORS.
2. The parts of a MACHINE INSTRUCTION
open database connectivity See ODBC. that specify the objects upon which the op-
eration is to be performed. For instance, in
Open Group An international group of the instruction
computer hardware and software manu- ADD A,B
facturers, and users, formed in 1996 by the A and B are the operands and could be REG-
consolidation of the Open Software Foun- ISTERS in the central processor, or actual
dation and X/Open Company Limited, to values, or ADDRESSES of values, or even ad-
promote the furthering of multivendor in- dresses of addresses of values. See also ad-
formation systems. The Open Group owns dressing mode.
the trademark of the UNIX operating system
and so certifies whether a particular imple- operating system (OS) A program or
mentation is or is not permitted to describe collection of programs used for managing
itself as ‘UNIX’. the hardware and software resources of a
computer system on behalf of the user(s).
open source A programming methodol- Every general-purpose computer has an
ogy founded on the premise that better operating system. In general a portion of
software will result by making the SOURCE
the operating system is always resident in
CODE available for any user or interested
MAIN STORE; the rest is kept on BACKING
party to study and modify. All contribu-
STORE and is read into main store when re-
tions are then fed back into the master ver-
quired.
sion, which is updated frequently. Open
The operating system provides the USER
source has had some successes, notably the
INTERFACE that interprets commands typed
LINUX operating system. It contrasts with
on a user’s KEYBOARD and movements of
closed source, or proprietary, software,
the MOUSE, and provides information about
where the source code is a closely-guarded
secret of the developer and all development the current state of the system on the VDU.
is strictly controlled. The merits of the two In GUI systems it manages the WINDOWS that
methodologies are hotly debated. appear on the screen. It also manages
queues for slower devices such as PRINTERS,
open standards Standards for the spec- keeps track of where FILES are stored, what
ification of hardware or software that is they are named, and who they belong to,
generally known and can be used by any- and transfers files between disks or be-
one. Open standards encourage the devel- tween disks and main store when in-
opment and use of new technologies. structed. Input from and output to any
connected INPUT or OUTPUT DEVICES is con-
open system Any system that conforms trolled by the operating system. In MULTI-
to standards that are not specific to the TASKING systems the operating system is
particular supplier, but that are generally responsible for deciding in what order and
well defined and well known. for how long each processing task is to
have the central processor, and what sec-
open systems interconnection See tions of memory they are to use. All com-
OSI. munications are managed by the operating
system – not only links between the user(s)
OpenType Trademark See font. and the computer but also links to other
computers or to a NETWORK.
operand 1. In general, a quantity or
function upon which an arithmetic or operation 1. In mathematics, the act of

157
operation code

OPERATING SYSTEMS
BASIC FUNCTIONS

Function Description

CPU management To ensure that every process and application that is running has
enough processor time to funtion properly and to optimize the
use of processor cycles by scheduling processor priorities. Dealing
with hardware and software interrupts.

Memory management The different types of memory in the system must be used
effectively and each process must have enough secure memory
in which to run.

Device management Usually performed through device drivers.

I/O management Largely the management of data in the form of a stream of bits
coming in from or going out to a device such as a keyboard,
monitor, printer, or disk.

Application interface The provision and management of an API that lets applications
use operating system functions and request input/ouput functions
without having to keep track of the CPU’s basic operation.

User interface To provide a structure for the communication between a user


and the computer.

doing something to an entity or entities operand, as in –1, NOT P. An operator


that produces a new entity. See operator. taking two operands is called a dyadic op-
2. An action carried out during the execu- erator or binary operator. A dyadic opera-
tion of a program. tor usually appears between the operands,
as in 1 + 1, 3/X; in certain notations, how-
operation code (op code) The code that ever, it appears before or after the
can be placed in the operation part of a MA- operands (see reverse Polish). See also
CHINE INSTRUCTION and that specifies the arithmetic operator; logic operator; rela-
operation to be performed.
tional operator; order of precedence.
2. A person responsible for the supervision
operation part (function part; operator
part) The part of a MACHINE INSTRUCTION of the hardware of a computer system.
in which the operation to be performed is
specified. optical character recognition See OCR.

operator 1. A symbol representing the optical computer A theoretical device


operation that is to be performed on one or that uses light or infrared beams instead of
more OPERANDS so as to yield a result. An an electric current to perform digital com-
operator taking one operand is called a putations. Because light travels about 90%
monadic operator or unary operator. A faster than an electric current it may be
monadic operator usually precedes the possible to build an optical computer that

158
OR gate

is much smaller and faster than a conven- performed in an expression. Programs


tional electronic one. treat expressions in parentheses as a unit to
be calculated. In a set of nested parenthe-
optical disk Any of various disk storage ses, the innermost ones are handled first.
devices on which the data is read or written For instance, in evaluating the expression
by a laser. Examples are the CD and DVD. ((3*(6+(4–2)))/5)+7
the program first subtracts 2 from 4, then
optical drive A disk drive that uses a adds 6 to the result, multiplies this value by
laser to read or write information. See also 3, divides the result by 5, and finally adds
CD. 7. Sets of nested parentheses can always be
used in programs to make the expression
optical fiber See fiber optics transmis- unambiguous.
sion. When no parentheses are used, arith-
metic and logic operations are performed
optical font A font designed for easy in a particular order. This means that the
use by an optical character reader. OPERATORS are applied in a particular
order. This order of precedence is not the
optical mark reading See OMR. same for all programming languages. A
typical order is as follows (the operator
optical mouse A mouse that uses light- symbols are not included since they vary
emitting diodes (LEDs) and optical sensors from one language to another):
to detect motion. unary minus
exponentiation
optical scanner See flatbed scanner; multiplication division
hand-held scanner; sheet scanner. addition subtraction
relationals
optomechanical mouse /op-tŏ-mĕ-kan- NOT
ă-kăl/ A mouse that uses a combination AND
of optical and mechanical technology to OR
detect movement. Because there are fewer Using this order of precedence, the ex-
moving parts than in a standard mouse ample given above could be written
fewer faults occur. (3*(6+4–2)/5)+7
There are always several levels of prece-
Oracle Trademark A database system dence, some operations/operators lying on
from Oracle Corporation, which runs on the same level and thus having the same
Windows, Macintosh, and several varieties precedence. When an expression is to be
of UNIX, including Linux. Oracle was the evaluated, operations of the highest prece-
first database to support the SQL query dence are performed first, then the next
language, which has since become an in- highest, and so on. With the order shown,
dustry standard. UNARY MINUS would be done first, i.e. all
negative numbers would be set as such be-
ORB (object request broker) See CORBA. fore any EXPONENTIATION, multiplication,
division, etc., was performed. Operations
order 1. The relative significance of a bit on the same level are usually performed
or byte. Usually high order will be the most from left to right but in some languages the
significant (leftmost) and low order the order is undefined. Again, in some lan-
least (rightmost). guages the RELATIONAL OPERATORS (less
2. The sequence in which arithmetic oper- than, greater than, etc.) come after the
ations are performed (see order of prece- logic operators (NOT, AND, OR, etc.); the
dence). relationals do not always have the same
precedence.
order of precedence The order in
which ARITHMETIC or LOGIC OPERATIONS are OR gate /or/ A LOGIC GATE whose out-

159
OR operation

put is low only when all (two or more) in- after the market success of Windows
puts are low; otherwise the output is high. prompted Microsoft to withdraw from the
It thus performs the OR OPERATION on its partnership. Following a period of rivalry
inputs and has the same TRUTH TABLE. The in the early 1990s OS/2 is no longer a
truth table for a gate with two inputs (A, B) major force but is still supported by IBM
is shown, where 0 represents a low signal and is used in specialized areas.
level and 1 a high level.
OSI /oh-ess-ÿ/ (open systems interconnec-
tion) A standard description for how
A B output/outcome messages should be transmitted between
two points in a telecommunications net-
0 0 0 work. Its purpose is to guide developers to
0 1 1 produce products that will work with
1 0 1 other products in a consistent fashion. OSI
1 1 1 divides telecommunications into seven lay-
ers of functions.
Truth table for OR gate and OR operation
outage /owt-ij/ The time when a com-
puter system is out of use because of ser-
OR operation A LOGIC OPERATION com- vicing or maintenance.
bining two statements or formulae, A and
B, in such a way that the outcome is false outline font A font in which the shape
only when A and B are both false; other- of the character is defined by a set of com-
wise the outcome is true. The TRUTH TABLE mands. Page description languages such as
is shown in the diagram, where the two PostScript treat everything on a page as a
truth values are represented by 0 (false) graphic and use outline fonts, which are
and 1 (true). The operation can be written more versatile at producing different sizes
in several ways, including of type with different attributes or special
A OR B A ! B A | B A + B effects. TrueType and OpenType are other
A and B are known as the OPERANDS and kinds of outline fonts.
the symbol between them (OR, !, |, +) is a
LOGIC OPERATOR for the OR operation. Outlook (Microsoft Outlook) Trade-
In a computer the OR operation is used mark An E-MAIL and personal-information
in HIGH-LEVEL LANGUAGES to combine two management application developed by Mi-
logical expressions according to the rules crosoft. First released with OFFICE 97, it has
stated above. It is used in LOW-LEVEL LAN- been upgraded several times and the cur-
GUAGES to combine two BYTES or WORDS, rent version is Outlook 2003.
producing a result by performing the OR
operation on each corresponding pair of output 1. The results obtained from a
bits in turn. If 8-bit words are used, then computer system following some process-
for example with operands ing activity. Computer output may be in a
01010001 form that people can understand and use,
11110000 such as words or pictures that are dis-
the outcome of the OR operation is played on a screen or printed or drawn on
11110001 paper. Alternatively, it may be written on,
See also OR gate. say, a magnetic disk or a CD so that it can
be fed back into the computer system – or
OS /oh-ess/ See operating system. into another system. See also output de-
vice.
OS/2 /oh-ess-too/ A multitasking GUI 2. The signal – voltage, current, or power –
operating system created by Microsoft and obtained from an electric circuit.
IBM in the late 1980s. Originally intended 3. To produce a signal or some other form
as the successor to MS-DOS, OS/2 suffered of information.

160
overlay

When a user transfers files or performs any


application 7 network related activities this layer interacts
with the operating system or application

5
Protocols here are
application set

application oriented. Takes the data provided by layer 7 and


They create a presentation 6 converts it to a standard form that all layers
coordinated framework can understand
based on the exchange
of data using the
Communicates with the receiving device by
transport service.
session 5 establishing, maintaining and ending contact
as appropriate

Maintains flow control i. e., it intergrates


transport 4 data from each application into a single

5
stream for the physical network
Protocols here are Maintains flow control i.e., it integrates data
communications from each application into a single stream
network 3
transport set

oriented. They build a for the physical network. Routers work at


uniform data transport this level.
service that is
Defines the type of network and the packet
independent of the
datalink 2 sequence.and assigns the appropriate
characteristics of
protocol to the data. Switches and bridges
specific underlying
work at this level.
facilities.
The hardware level where the network’s
physical 1 physical characteristics e.g., connections
and timing are defined. Hubs work at this
level.

OSI 7-layer model

output device Any device that converts clocked system to be sold without inform-
the electrical signals representing informa- ing the buyer.
tion within a computer system into a form
that can be understood and used by people. overflow The condition arising when
PRINTERS, VDUS, loudspeakers, and PLOT- the result of an arithmetic operation in a
TERS are the most common types of output computer exceeds the size of the location
device. An output device may also convert allocated to it. For example, a number rep-
internal signals into a coded form on, say, resented by 33 bits would not fit in a 32-bit
magnetic disk that can be fed back into a word. If there were no means to detect
computer system at a later date. Compare overflow, results would be unreliable and
input device. might be incorrect. Facilities are therefore
provided to detect overflow: a particular
output medium See media. bit, known as an overflow flag or bit, is
set to 1 when overflow occurs. The over-
overclocking The process of reconfig- flow can then be corrected. See also under-
uring a computer to operate the CPU at a flow.
higher clock speed than specified for.
Overclocking carries risks to the CPU in- overlay 1. Part of a program, i.e. a sec-
cluding the possibility of permanent dam- tion of code, that is loaded into MAIN STORE
age. Successful overclocking is more likely during the execution of that program,
to be achieved if the system has a well- overwriting what was previously there.
designed motherboard with a fast enough The section of code is thus not permanently
bus and a suitable cooling fan and an Intel resident in main store but is held in BACK-
microprocessor. It is illegal for an over- ING STORE until required by the processor.

161
overrun

The parts of the program to be used as 2. A piece of card or plastic placed over or
overlays, and the other parts that these are around a KEYBOARD to indicate what spe-
allowed to overwrite, are determined by in- cial functions have been assigned to partic-
structions to the LINK EDITOR at link time. ular keys.
This has to be done with care: if an overlay
tries to use a procedure in a part of the overrun The loss of data incurred when
code it has just overwritten, then the pro- data arrives at a port faster than it can be
gram will fail. processed.
In general several overlays are loaded
overtype (overwrite) In text entry, the
into the same area of main store at differ-
mode in which characters being typed re-
ent stages of the program, each erasing the
place those under or to the right of the in-
code already there but no longer needed. sertion point.
This process of repeatedly using the same
area of store during program execution overwrite 1. To destroy the contents of
overcomes space limitations in main store. a storage location by writing a new item of
The technique, which is called overlaying, data to that location.
is used mainly in systems that do not have 2. To write a new version of a file on top of
VIRTUAL STORAGE – principally some older the existing version.
mainframes. 3. See overtype.

162
P

package See application package. packet switching A process whereby


information (in digital form) can be sent
packet See packet switching. automatically from one computer on a
NETWORK to any other, the information
packet assembler/disassembler (PAD) being switched from one communication
The device that builds packets of informa- line to another until it reaches its specified
tion in order to transmit them across a destination. The information is transmitted
PACKET-SWITCHING network, and breaks up in units known as packets. A packet is a
incoming packets. group of bits of fixed maximum length. If
the information to be communicated ex-
packet Internet groper See ping. ceeds the packet size it is split up into a

to be transmitted over
e-mail message of a network with a fixed
4300 bits packet length of 1024
bits

message split into 5 packets:


4 packets with 896 bits of e-mail data
1 packet with 716 bits of e-mail data
plus some padding data

packet sender’s IP address 96 bits


header receiver’s IP address

6
protocol
packet number

packet data 896 bits


payload,
body or data 1024 bits
per packet
packet trailer data to show end of 32 bits
or footer packet
error checking
information such as
CRC (cyclic
redundancy check)

Message packet

163
packing

number of packets. Each packet is cording to rules set by the user. However a
switched as a composite whole from one ‘hard’ or ‘manual’ break can be placed in a
communication line to another. At each document to force the following text to be
switching point along its route the packet is printed or displayed on a new page.
checked for errors, stored temporarily, and
forwarded to the next point when the nec- page description language (PDL) A
essary resources become available. The type of programming language in which
packets of a partitioned message, docu- commands are used to describe the layout
ment, etc., are reassembled when they of a complete page of text and graphics, in-
reach their final destination (see packet as- cluding font styles and sizes and picture
sembler/disassembler). Compare message shapes and positions. POSTSCRIPT is a
switching. widely used PDL.

packing The storage of data in a com- page orientation The position of a page
pact form in order to reduce the amount of according to whether the top of the page is
storage space required. The term is used as along the short edge of the paper (portrait)
a synonym for the simpler methods of or along the long edge of the paper (land-
COMPRESSION – i.e. those that remove obvi- scape).
ous redundancies in the data without using
a sophisticated encoding algorithm. For page printer A PRINTER that produces a
example, several BYTES may be stored in complete page at a time, an example being
one WORD, or multiple occurrences of a the LASER PRINTER.
character or word may be replaced by a
single instance of the character or word paging The process of managing VIR-
and an indication of the number of times it TUAL MEMORY by dividing the space into
occurs. The original data can be recovered fixed-size pages, which can then be
from its packed form by unpacking it. mapped onto an available physical ad-
dress. Address translation from physical to
packing density 1. The number of com- virtual is done by memory management
ponents, or LOGIC GATES, per unit area of hardware.
an INTEGRATED CIRCUIT.
2. The amount of information in a given di- paint To infill a part of a drawing on the
mension of a storage medium, for example screen with color or a pattern.
the number of tracks per inch of a magnetic
disk. paint program A simple drawing pro-
gram that allows freehand drawing and
PAD /pad, pee-ay-dee/ See packet assem- also provides tools to facilitate the drawing
bler/disassembler. of lines and curves. Paint programs pro-
duce raster graphics files.
padding The adding of blanks to extend
a string or record to a set length. palette 1. The tools provided in a graph-
ics program, which enable different pat-
page The unit of interchange between terns, colors, brush shapes, and line widths
main store and a backing-store device used to be selected for use.
for SWAPPING. A page contains instructions 2. The set of different colors available in a
or data, or both, and generally the number program.
of words or bytes is fixed for a given com-
puter system. See also virtual storage. palmtop /pahm-top/ A hand-sized com-
puter. Often palmtops have no keyboard
page break The position in a document but the screen serves as both an input and
at which text will move to the top of a new output device. A stylus is used to enter in-
page. Word-processing systems will usu- formation; text can be entered by manually
ally paginate documents automatically ac- writing on the screen with the stylus. A

164
parity check

palmtop is generally used for simple appli- a character) are transmitted at the same
cations such as personal organization and time along different paths. For example, if
note taking. See also PDA. two devices wish to communicate a 16-bit
unit of data, the sending device would
PANTONE /pan-tohn/ Trademark A transmit all the 16 bits at the same time,
system of coding colors used in commercial one bit per wire. More than 16 wires are
color printing. required, however, since control signals are
sent simultaneously, again one bit per wire,
paperless office The (mistaken) idea indicating that data is available (see hand-
that the introduction of computers would shake). The receiving device would then
mean that paper would no longer be neces- signal that the data had been received. See
sary in offices. also serial transmission.

paper tape An obsolete data medium parameter /pă-ram-ĕ-ter/ 1. A quantity


consisting of a continuous strip of paper of whose value is selected according to the ap-
uniform width and thickness on which plication or the circumstances.
data could be encoded by punching pat- 2. Information passed to a PROCEDURE, SUB-
terns of holes; materials of greater strength ROUTINE, or FUNCTION. Different parame-
were also used, such as laminates of paper ters may be provided for each CALL of the
and polyester. All these forms can be re- procedure, subroutine, or function. The ac-
ferred to as punched tape. Punched tape tual parameters (or arguments) are those
was once widely used for the input, output, supplied at the time of a particular call.
and storage of data, especially in scientific The mechanism by which the parameters
and engineering applications, and in fact are supplied is known as parameter pass-
was used for data communications (telex) ing. Normally this involves either passing
before its use in computing. the value of the actual parameter or pass-
ing the address of the location in which the
paper throw A rapid and continuous actual parameter is stored.
movement of the paper in a CHARACTER
PRINTER or LINE PRINTER through a distance parameter passing See parameter.
of several lines without any printing. A
paper throw may be used, for example, to parameter RAM See PRAM.
print the next line on a new page – de-
scribed as throwing a page. parity bit See parity check.

parallel port An interface for PARALLEL parity check A simple CHECK used to de-
TRANSMISSION. tect ERRORS in items of information in bi-
nary form. The item may represent a piece
parallel processing Strictly, the execu- of data or part of a program, and may be a
tion of two or more PROCESSES at the same single CHARACTER, BYTE, or WORD. An extra
time in a single computer system. This im- BIT, called the parity bit, is added to the
plies that two or more PROCESSORS are in leftmost end of the item. There are two
operation at the same time. The term is kinds of parity: even parity and odd parity.
often loosely applied to MULTITASKING, a In the former, the parity bit is used to make
situation in which a number of processes the total number of 1s an even number; in
are potentially active, but only one is actu- the latter, the parity bit is used to make the
ally being run at any particular instant. See total number of 1s an odd number. For ex-
also multiprocessing system. ample, the 7-bit ASCII code for W is
1010111. The number of 1s is 5; the parity
parallel transmission A method of bit for even parity is thus a 1, making the
sending data between devices, typically a number of 1s up to 6 (an even number) and
computer and its peripherals, in which all the 8-bit ASCII code with parity
the BITS associated with a unit of data (e.g. 11010111.

165
park

The parity bit is recomputed after the password A means of verifying the
augmented item – original item plus parity identity of someone wishing to gain access
bit – has been transferred or otherwise ma- to a computer system or to certain parts of
nipulated. The new value is compared with a system. A password is a particular se-
the received value, and most simple bit er- quence of characters (letters, numbers,
rors (certainly all single bit errors) will be etc.) that is allocated to or chosen by an au-
detected. thorized user and is unique to that person.
The same principle can be used to check A potential user must feed his or her pass-
larger blocks of data. In most RAID disk ar- word into the computer to establish iden-
rays, for example, the equivalent bits on all tity. The password entered is checked
but one of the disks generate a parity bit on against the stored version of the password.
the last disk. Only if the two sequences agree will the
person be granted access.
park To lock the read/write heads in a Passwords form part of the LOG ON se-
secure position (over an unused track or quence in most modern computer systems.
beyond the surface of the disk) before shut- They are used, for example, in systems that
ting down the drive, so that data cannot be hold sensitive data (i.e. for security rea-
corrupted when the computer is physically sons) or when charges are made for use of
moved. On all modern drives parking is system resources. Passwords can also be
done automatically but it can also be granted to programs in order to control ac-
achieved by using a disk utility. The disk cess to data.
Methods commonly used to make a
will unpark itself automatically when the
password system more effective are:
power is turned back on.
1. the passwords are stored on the com-
puter in code so that unauthorized people
parsing, parser /par-zing, par-zer/ See
looking at the password file cannot read
syntax analysis.
the passwords;
2. the password does not appear on the
partition A logical division of a hard
screen when it is typed in, thus making it
disk. It enables the user to have different
harder to discover users’ passwords by
operating systems on the same drive (in dif-
watching them log on;
ferent partitions) and can also create the 3. users are urged, and in some cases forced
appearance of having separate drives, by the system, to change their passwords
which can make it easier to organize files frequently.
and provide access for multiple users. 4. users are urged, and in some cases
forced, to use passwords that are not sim-
Pascal /pass-kăl/ A PROGRAMMING LAN-
ple words or predictable numbers (e.g.
GUAGE named after the French philosopher birthdays) but a mixture of letters, num-
and mathematician Blaise Pascal and de- bers, and other characters, sometimes in-
veloped by Niklaus Wirth in the late termingled in a random fashion.
1960s. Pascal was intended to be used for 5. the password must be of a minimum
teaching students the principles and prac- length, often 6 or 7 characters.
tice of programming, and is a relatively
small concise HIGH-LEVEL LANGUAGE with paste To insert information that has
what were at the time a number of novel been cut or copied from a document into a
features. Pascal has certain drawbacks different place in that document or into an-
when it comes to large-scale programming other document.
but is nevertheless popular and has been
implemented on all sizes of computer. patch A small section of code, often pro-
vided by a software supplier, that allows a
passive matrix display An inexpensive user to correct or modify a program. It is
type of low-resolution LCD. See also active used for purposes of convenience and
matrix display. speed of change. The patch may be written

166
Pentium

in MACHINE CODE and introduced into the PCI (peripheral component interconnect)
compiled (or assembled) version of a pro- A local bus developed by Intel Corporation
gram, i.e. the OBJECT PROGRAM. and some other large companies to allevi-
ate problems caused by the slow speed of
path 1. A link between two nodes in a ISA. Introduced in the mid-1990s, it has
network. continued to develop and is still the stan-
2. The route followed by an operating sys- dard expansion bus for PCs.
tem through a disk’s directories and subdi-
rectories to a file. PCL (printer control language) Trade-
mark A control language developed by
pattern recognition The ability of a Hewlett Packard for laser printers.
computer to recognize visual images or
sound patterns that are represented as an PDA (personal digital assistant) Any
array of numbers. small portable hand-held device, possibly a
PALMTOP computer, that provides a com-
pause instruction An instruction that puting capability covering information
specifies that the execution of a program is input, retrieval, and storage for business,
to be suspended. After a pause, a program college, or personal use. A PDA is often
may be continued from where it left off or used as a personal organizer with calen-
was abandoned. For example, a program dars, diaries, and address books. Increas-
might pause to allow the screen to be read, ingly PDAs are combining with cellphones
or so that the paper may be changed on a and paging systems. Data can be trans-
printer. ferred between a PDA and a personal com-
puter.
pause key A keyboard key positioned to
the right of the function keys. When PDF (portable document file) See Acro-
pressed it pauses the execution of a pro- bat.
gram.
PDL See page description language.
payload The part of a VIRUS or WORM
that is intended to damage the infected sys- peer-to-peer Describing the linking of
tem, as opposed to the part concerned with computers together in a NETWORK without
spreading the program to other machines. a dedicated SERVER. Each individual com-
puter acts as a server to other computers
PC See personal computer. (its peers) on the network and is also a
client to all its peers acting as servers. Re-
PCB (pcb) See printed circuit board. sources can be shared and messages passed
between users. All versions of Windows
PC-compatible See IBM-compatible. since Windows 95 have offered limited
peer-to-peer networking.
PC-DOS /pee-see-doss/ Trademark An
OPERATING SYSTEM produced by Microsoft PEM See privacy-enhanced mail.
Corp. for IBM and intended for use on the
IBM Personal Computer. (Its official name pen computer Any computer whose
in IBM documentation was ‘DOS’.) It was primary input device is a stylus (‘pen’). See
essentially the same as MS-DOS, but made palmtop.
assumptions about the underlying hard-
ware that were only fully justified on IBM pen plotter See plotter.
PCs. IBM took over development in the
1990s and PC-DOS diverged from MS- Pentium /pen-tee-ŭm/ Trademark A fam-
DOS. However, its use declined as WIN- ily of processors first introduced in 1993
DOWS became the dominant PC operating by Intel. These had speeds up to 133 MHz.
system. The original Pentium has been succeeded

167
peripheral component interconnect

by the Pentium Pro, the Pentium II, the computer system and containing a ma-
Pentium 3, and the current version, the chine-readable sequence of characters that
Pentium 4. Speeds of 3 GHz are now stan- identifies that person. It may be a card or
dard. Each model has, in its turn, been the badge. The PID must be inserted into a ter-
standard microprocessor for PCs, although minal of the computer system before access
other companies have brought out compet- to the system is granted. In many cases a
itive clones. Since the Pentium II each person must use a PID in conjunction with
model has been marketed in three versions: a PIN (personal identification number) to
the Pentium, aimed at desktop and note- gain access.
book PCs; the Xeon, a high-end version
aimed at servers and high-specification personal identification number (PIN)
workstations; and the Celeron, a reduced A number allocated to an authorized user
specification aimed at the bottom end of of a computer system that is unique to that
the home and small business market. person, and which he or she must feed into
the computer system in order to establish
peripheral component interconnect identity. A PIN is a form of PASSWORD. It is
/pĕ-riff-er-ăl/ See PCI. often used in conjunction with a PID (PER-
SONAL IDENTIFICATION DEVICE). PINs and
peripheral device (peripheral) Any de- PIDs are used, for example, at cash dis-
vice that can be connected to and con- pensers.
trolled by a computer. It is external to the
CENTRAL PROCESSOR and MAIN STORE of the personal information manager See PIM.
computer. Peripherals may be INPUT DE-
VICES, OUTPUT DEVICES, or BACKING STORE. peta- (pet-a) A prefix indicating a multi-
ple of a thousand million million (i.e. 1015)
Perl /perl/ (practical extraction and report or, loosely, a multiple of 250 (i.e. 1 125 899
language) A script programming lan- 906 842 624). In science and technology
guage with a syntax similar to C and in- decimal notation is usually used, and pow-
corporating some popular UNIX features. ers of 10 are thus encountered - 103, 106,
It has good text-handling features and can 109, etc. The symbol P is used for peta-, as
also deal with binary files, making it suit- in PV for petavolt. Binary notation is gen-
able for developing common gateway in- erally used in computing, and so the power
terface software. of 2 nearest to 1015 has assumed the mean-
ing of peta-.
personal computer (PC) A general- The prefix is most frequently encoun-
purpose computer designed for operation tered in computing in the context of stor-
and use by one person at a time. Such a de- age CAPACITY. With magnetic disks, mag-
vice became a reality when MICROCOM- netic tape, and main store, the capacity is
PUTERS became available. All personal normally reckoned in terms of the number
computers are microcomputers, but micro- of BYTES that can be stored, and the
computers are not necessarily personal petabyte is used to mean 250 bytes;
computers. Personal computers range from petabyte is usually abbreviated to P byte,
cheap domestic machines to expensive and Pb, or just to P.
highly sophisticated systems. Often the ab- Peta- is part of a sequence
breviation ‘PC’ is used in a more restricted kilo-, mega-, giga-, tera-, peta-, ...
sense to mean a computer that will run of increasing powers of 103 (or of 210).
Windows, as opposed to an Apple Macin-
tosh computer. phishing An attempt to obtain personal
information from Internet users through
personal digital assistant See PDA. fake Web sites and fraudulent e-mails. A
common tactic is to send an e-mail al-
personal identification device (PID) A legedly from a bank that links to a Web site
device issued to an authorized user of a where users are asked to ‘confirm’ such de-

168
pin header

tails as their online-banking username and PICS /piks, pee-ÿ-see-ess/ (platform for In-
password, credit-card number and expiry ternet content selection) A specification
date, etc. These are then used to steal money of the format conventions used by Internet
from the user’s account or run up bills on rating systems. This was developed to en-
the credit card. Alternatively the user can able parents, teachers, and administrators
be asked for personal information, which to limit the type of material accessed on the
is then used to set up bank accounts, obtain Internet, especially that available to chil-
credit, etc. Such frauds can vary from the dren. It now also includes the protection of
crude to the highly sophisticated: the fake privacy.
Web site, for example, is often identical in
look and feel to the bank’s genuine one. PICT /pikt, pee-ÿ-see-tee/ A Macintosh
The term ‘phishing’ derives from the anal- file format for encoding graphical images,
ogy with fishing: while many people will which can hold both object-oriented im-
ignore the bait (the e-mail), some will bite ages and raster graphics images. Although
and be reeled in. To phish is to engage in now superseded by more sophisticated for-
phishing, and the people who do so are mats, it is still widely used.
sometimes known as phishers.
picture processing See image process-
phono connector /foh-noh/ A connec- ing.
tor used to attach a device such as a micro-
phone or pair of headphones to a computer PID See personal identification device.
peripheral with audio capability.
Pilot (programmed inquiry, learning or
PhotoCD /foh-toh-see-dee/ A Kodak teaching) An early programming lan-
system that can store 35-mm film pictures, guage that was used largely in CAL.
negatives, slides, and scanned images as
digitized images on CD. The images can PIM (personal information manager)
usually be viewed on a computer with a Software that organizes personal informa-
CD drive and the appropriate software or tion, such as addresses, diary notes, and
by using a special player. appointments, in a useful manner.

photo illustration Computer art that PIN /pin/ See personal identification
starts with a digitized photograph that is number.
subsequently manipulated by image-
enhancement software to apply special ef- ping /ping/ (packet Internet groper) 1.
fects. A basic Internet program that verifies that
a particular Internet address exists and can
PHP (Hypertext Preprocessor) An OPEN accept requests. It sends a special signal
SOURCE SCRIPTING LANGUAGE widely used message to the address that the host echoes
for SERVER-SIDE SCRIPTING. First released in back. Ping informs the user not only
1995, its syntax is closely based on C, JAVA, whether the host is available but also how
and PERL. long the signal took to return.
2. The process of sending a message to all
physical record See block; record. the members of a mailing list requesting an
acknowledgment (ACK). It is used in e-
pico- /pÿ-koh-/ A prefix to a unit, indi- mail systems to test which users are cur-
cating a submultiple of one million mil- rent.
lionth (i.e. 10–12) of that unit, as in
picosecond. The symbol p is used for pico- pin header A device similar in form to a
; picosecond can thus be written ps. Pico- is DIP but containing no circuitry. Instead
part of a sequence each leg is extended vertically through the
milli-, micro-, nano-, pico-, … package allowing pins to be connected to-
of decreasing powers of 1000. gether in any configuration by soldering

169
pipe

small pieces of wire across the relevant clude ‘softlifting’ (users sharing software),
pins. A pin header is more flexible but hard-disk loading (the installation of unau-
clumsier than a DIL SWITCH. thorized copies of software on computers
for sale), counterfeiting (making counter-
pipe See pipeline processing. feit copies), and on-line piracy.

pipeline processing (pipelining) 1. (pip- pixel /piks-el/ In computer graphics, the


ing) A technique that allows two or more fundamental graphical element of a VDU or
PROCESSES that would otherwise run se- a raster graphics image. In general it is an
quentially to execute in parallel. Without element in a large ARRAY that is holding
pipeline processing the output of one pro- pictorial information. It contains data rep-
cess would be written to a temporary disk resenting the brightness, the color, or some
file that would form the input for the next other property of a small region of an
process. Instead, the operating system pro- image. The RESOLUTION of a VDU is mea-
vides an area of shared memory that emu- sured in terms of how many pixels there
lates a file, called a pipe, to which the first are across and down the screen. The reso-
process writes its output and which is read lution of an image is measured in pixels per
by the next process as it is filled. The inch. The word is an abbreviated form of
processes can thus be executed in parallel ‘picture element’.
and without the overhead of writing and
reading from disk, which results in a lower PKZIP /pee-kay-zip/ One of the most
overall execution time. widely used shareware compression pro-
2. A technique used to increase the grams. PK stands for Philip Katz, the au-
throughput of a CPU by beginning the exe- thor of the program. PKZIP compresses
cution of the next operation(s) before the one or more files into a single file, called a
execution of the current one is complete. zip file, with the extension zip. The file can
For example, all MACHINE INSTRUCTIONS be decompressed by PKUNZIP. The zip file
must be loaded into the CPU from main format is so widely used that transparent
store before they can be executed, and so support for it is built into Windows XP and
time can be saved by loading the next in- it is used as a standard means of distribut-
struction while the current one is being ex- ing JAVA programs.
ecuted. Further optimizations are possible
because many operations specified by a plaintext /playn-tekst/ Ordinary read-
single machine instruction in fact break able text that has not been encrypted.
down into several sub-operations (see mi-
croprogram). The technique does not al- plain text Text with no formatting or
ways work, for example when the outcome other special information. A plain text file
of an instruction affects an OPERAND of the or text file is a file that contains such text.
next one, or when a conditional JUMP may Plain text has a very simple structure, being
or may not transfer control to a different a series of CHARACTERS, and can generally
part of the program. However, it is suc- be read without special software. It is eas-
cessful frequently enough to bring signifi- ily transferred between different operating
cant performance gains. Formerly a feature systems. Many applications contain op-
only of SUPERCOMPUTERS, pipeline process- tions to save data to or load it from plain
ing is now standard in modern micro- text files. Data saved in this way will lose
processors. any special information the application as-
sociates with it; for example spreadsheets
pipelining See pipeline processing. saved as plain text will contain the num-
bers or words in the cells but will lose the
piping See pipeline processing. formulae that calculate the values of some
cells. Despite these limitations such files
piracy Illegal copying, distribution, or can be useful in transferring data between
use, usually of software. Types of piracy in- otherwise incompatible applications.

170
plug and play

plasma display (plasma panel display) up and down the length of the sheet of
See display. paper or film. The pen can therefore be
moved to any specified point on the surface
platen /plat-ĕn/ The cylinder around of the paper or film to make a mark. It can
which the paper is wrapped in most impact either touch the surface as it moves so that
printers. it makes a line, or it can be lifted off the
surface as it moves.
platform 1. The underlying hardware or In the drum plotter the bar is fixed in
software system on which application pro- position and it is the paper that is moved.
grams can run. Thus one speaks, for exam- The bar is parallel to the axis of a drum.
ple, of a Windows platform as opposed to The paper is wrapped around part of the
a Macintosh platform. surface of the drum; the holes down each
2. Any base technology on which other side of the paper engage with pegs on the
technologies are built. In a computer, drum. Rotating movements of the drum
which is a layered device, the layer at the cause the paper to move, and different po-
bottom is often referred to as a platform. sitions down the length of the paper can be
Once a platform has been defined develop- brought precisely under the pen. As in the
ers can produce appropriate software. flatbed plotter the pen can be moved along
the bar to the required position across the
platform for Internet content selec- width of the paper, and it can be lifted off
tion See PICS. the surface of the paper if necessary. The
drum plotter is used when large numbers of
platform-independent Describing drawings are required; these can be plotted
software that is independent of operating in sequence down the paper and then split
system and hardware. up. Several pens can be mounted on the bar
of a flatbed or drum plotter to provide a se-
PL/I A high-level PROGRAMMING LAN- lection of colors, which can be changed by
GUAGE whose name is derived from Pro- computer control.
gramming Language I (one). It was To control the movement of the pen of
developed by IBM in the late 1960s to a plotter, the plotter is sent a stream of
combine what were considered the best commands from the computer. These tell it
features of FORTRAN, ALGOL, and COBOL, where to move the pen to and whether the
and was intended to replace all three. PL/I pen is to be up or down during the move-
is a very large comprehensive language, ment. Most plotters also have built-in
and although it was used fairly widely in hardware characters, i.e. the plotter will
IBM installations it was never taken up to draw a character at the current pen posi-
any large extent by other manufacturers. tion without being given the detailed
movement required to construct it. Some
plotter An OUTPUT DEVICE that converts plotters can also draw arcs, circles, and el-
coded information from a computer into lipses given only the start and end posi-
graphs or pictures drawn on paper or tions, radii, etc.
transparent film by means of one or more In recent years plotters have adopted
pens. There are many types of plotter, ink-jet technology, and indeed large ink-jet
varying in the accuracy, quality, and speed printers have superseded plotters in many
of production of the graphs or pictures, the situations.
size produced, and the use (if any) of color.
Two basic designs of plotter are the plug See connector.
flatbed plotter and the drum plotter (see il-
lustration overleaf). In both cases the pen is plug and play The ability of an operat-
mounted on a bar that spans the width of ing system to recognize new hardware that
the paper. The pen can be moved to precise has been attached to computer and to con-
positions along the bar. In the flatbed plot- figure the system automatically to use the
ter the bar can be moved on tracks running hardware. If a suitable device driver cannot

171
plug compatible
paper or film bar
fixed in position
track

pen

Flatbed plotter

pen rotatable
drum

paper

Drum plotter

be found the user will be prompted to in- format for compressed raster graphics files
stall one. that may eventually replace the widely
used GIF format. The PNG format was de-
plug compatible See compatibility. veloped to be patent-free by an Internet
committee and does not have the legal re-
plug-in A small program that can be in- strictions then associated with GIF. PNG
stalled as part of other software to increase uses lossless compression and a PNG file
the functionality. It is often used to refer to can be 10–30% more compressed than the
such programs that can be used as part of equivalent GIF file.
a Web browser, allowing animation, video,
and audio files embedded in HTML docu- podcasting The packaging of audio ma-
ments to be recognized. terial for download over the Internet and
playback on a computer or MP3 PLAYER.
PNG (portable network graphics) A file This technique was first widely used with

172
polling

music tracks but has been extended to WAN to which a user can connect with, for
other types of audio content. An item made example, a local telephone call. For exam-
available in this way is called a podcast, the ple, an ISP has a point of presence on the
act of doing so is to podcast, and a person Internet.
or organization that does so is a podcaster.
Many radio broadcasters are making their point of sale (POS) The place where
programs available as podcasts and are ex- goods are paid for in a store, etc., often
pecting podcasting to become an impor- with a POINT-OF-SALE TERMINAL linked to a
tant distribution method. However, pod- computerized transaction system.
casting is not confined to established media
companies: anybody with appropriate point-of-sale terminal (POS terminal)
hardware and software – both of which are A specialized cash register, credit-card
cheap and widely available – can create an recording system, or ticket dispenser that
MP3 file, post it on the Web, and advertise records the details relating to the sale of
its content through a WEB FEED. The term goods, generally using a scanner to read
‘podcasting’ was first used in 2005 and is a bar codes or tags, and feeds the informa-
blend of ‘iPod’ and ‘broadcasting’ – a trib- tion into a central computer. This system
ute to the IPOD’s iconic status as the arche- improves stock, cash, and credit control.
typal MP3 player, although neither an iPod
nor any other MP3 player is essential to lis- point-to-point protocol (PPP) A pro-
ten to podcasts. It is expected that podcasts tocol used by machines that support serial
will soon encompass video as well as audio interfaces, such as modems and ADSL
content. transceivers. PPP is commonly used to pro-
vide and access dial-up services to Internet
point 1. In typography, a unit equal to service providers. PPP can share a line with
just under 1/72 of an inch that is used to other users, and unlike SLIP it can handle
measure the height of a character and the asynchronous as well as synchronous com-
distance between lines of text (leading). In munication and has error detection in-
computer DTP software, fonts, and page cluded.
description languages, a point is usually re-
garded as equalling exactly 1/72 of an inch. policy In policy-based networking, a set
2. A single pixel on a screen, which is iden- of definitions showing how the network’s
tified by its row and column numbers. resources are to be allocated among its
users. Parameters for allocation, which can
point-and-click To select data or an be static or dynamic, include items such as
object on a screen by using a mouse (or time of day, client priority, and resource
similar device) to move the cursor to the availability. Policies are created by net-
object (point) and then pressing a button work managers and used by network-man-
(click) on the mouse to select the object. agement software to make decisions.
The term applies to any pointing device. Policies can also be used to control how
much freedom networked users are permit-
pointer (link) A character or group of ted in other areas, for example to what ex-
characters that indicates the LOCATION of tent they may customize their DESKTOP.
an item of data in memory.
polling A technique whereby a com-
pointing device Any device that identi- puter checks each of a number of input de-
fies a point on a VDU and transmits its lo- vices in rotation to see if any data is
cation to a computer. Examples are waiting to be read. Polling depends for its
CURSOR KEYS, a MOUSE, JOYSTICK, TRACKER- success on each device being checked at
BALL, TOUCH-SENSITIVE DEVICE, or DIGITIZ- least as frequently as the data is arriving; in
ING PAD. addition the time spent processing any data
that has arrived must not be too long so
point of presence (POP) A point in a that data on other devices is missed. Polling

173
pop

can be contrasted with the use of INTER- program. Portable programs are different
RUPTS, where it is the devices that inform from PLATFORM-INDEPENDENT programs in
the processor when they have data avail- that the compiled versions of the latter will
able. In some systems an interrupt will alert run on any supported platform unchanged,
the processor to the fact that one of a num- while a portable program will at least be
ber of devices has data available, and the recompiled for the new platform. See also
processor then polls the devices to find out configure.
which one it is.
portable computer A small computer
pop See stack. that is designed for ease of transportation.
LAPTOPS, NOTEBOOKS, and PALMTOPS are all
POP /pop/ See point of presence. types of portable computer.

POP3 /pop-three/ (Post Office Protocol 3) portable document file (PDF) See Ac-
The version of the Post Office Protocol cur- robat.
rently in use on TCP/IP networks. Most e-
mail applications use this protocol, portable network graphics See PNG.
although some use IMAP (Internet mes-
sage access protocol). portal A gateway to the Internet pro-
vided by a Web site. There are general and
pop-up menu In a graphical user inter- specialized portals. General portals include
face, a menu that appears on screen when Yahoo!, MSN, Netscape, Excite, and
a user performs a certain action and usu- AOL.
ally disappears when the user selects one of
the menu items. portrait The arrangement of printed
matter on a page so that the top of the page
port 1. A point at which a connection is on the shorter side. Compare landscape.
can be made between an input/output de-
vice and the central processor of a com- POS /poss, pee-oh-ess/ See point of sale.
puter system, allowing data to be passed.
On personal computers ports usually have positional notation See number sys-
particular types of socket for connecting tem.
the mouse, keyboard, printer, etc.
2. A point through which data can enter or positive acknowledgment See ac-
leave a computer NETWORK. It forms part knowledgment.
of a NODE.
3. To move a program, usually written in a POSIX /poz-iks/ (portable operating sys-
PORTABLE form, to another computer sys- tem interface for UNIX) A defined set of
tem. operating system interfaces, agreed by the
IEEE, based on the UNIX operating sys-
portable Denoting programs that can be tem.
readily transferred from one computer to
other computers. For maximum portability post To publish a message in an on-line
a program should be written in a HIGH- forum or newsgroup.
LEVEL LANGUAGE possessing an internation-
ally agreed standard, and any extensions or POST /pohst/ (power-on self-test) The
deviations permitted by a particular COM- first task performed by the BIOS when a
PILER should be avoided. Where it is ab- PC is switched on. It checks that all the
solutely necessary to make some reference basic hardware components, such as the
to particular hardware or to include sys- keyboard and display, are running and that
tem-dependent features, then these should the CPU and memory are functioning
be concentrated in a few well-documented properly. If an error is found a message will
routines and not scattered throughout the be displayed or if the monitor is faulty a se-

174
preemptive multitasking

ries of beeps will be heard. After a success- and run visual presentations. Developed by
ful POST, control is passed to the system’s Forethought, Inc., it was first released for
bootstrap. the Macintosh in 1987, then purchased by
Microsoft and released for Windows in
Post Office Protocol 3 See POP3. 1988. It has been upgraded several times
and the current version is PowerPoint
PostScript A page description language 2003. PowerPoint is very widely used for
introduced by Adobe in 1985. PostScript business and other presentations and forms
has a series of instructions for drawing part of Microsoft OFFICE.
graphics and placing text on a page. The
FONTS used (known as type 1 fonts) are de- PPP See point-to-point.
fined as outline fonts and can be embedded
in the PostScript file. PostScript is an inter- PRAM /pee-ram/ (parameter RAM) A
preted language; the interpreter, known as battery-operated form of RAM used in
a RIP (raster image processor), is present in some Macintosh computers in which infor-
all PostScript printers or imagesetters. mation such as date, time, and computer
Most applications, especially word-pro- configuration are stored. Occasionally
cessing or desktop-publishing applications, PRAM gets corrupted and needs to be re-
are able to generate PostScript output. See stored.
also Acrobat.
precedence See order of precedence.
POTS (plain old telephone service) The
basic public switched telephone network precision The degree of exactness to
with no additions. The main differences which a numerical value is stated, usually
between POTS and non-POTS services,
based on the number of digits to which the
such as ISDN and ADSL, are bandwidth
number is represented. The value of some
and speed.
quantity given to 6 digits thus has 6-digit
precision. For example, π to 6-digit preci-
power-fail recovery See recovery.
sion and to 8-digit precision is respectively
3.141 59 and 3.141 5927
Power Macintosh A Macintosh com-
In a computer each item of information
puter based on the PowerPC chip. The
6100/60, 7100/66, and 8100/70 were must fit into a WORD, which contains a
available in 1994. The latest generation, fixed number of bits. This sets a limit on
the G5, has been released in various ver- the precision to which a number can be
sions since 2003. See also iMac. represented.
Many programming languages offer
power on To switch on a piece of com- extended precision (for FLOATING-POINT
puting equipment. NUMBERS). More powerful computers will
perform extended-precision floating-point
power-on self-test See POST. arithmetic in hardware. In the simplest
case two words can be operated as a single
PowerPC A RISC-based microproces- double-length word; this doubles the num-
sor open architecture developed jointly by ber of bits available to represent a number,
IBM, Apple, and Motorola. The name is and leads to what is known as double pre-
derived from Performance Optimization cision. (The use of only one word is then
with Enhanced RISC. PowerPC offers an called single precision.) The increased
alternative to Intel architectures and is number of bits is normally added to the
used primarily in some IBM machines and mantissa section of the word, leaving the
in Apple Macintosh computers. exponent section unchanged in length.

PowerPoint (Microsoft PowerPoint) preemptive multitasking See multi-


Trademark An application used to create tasking.

175
presentation graphics

presentation graphics The use of such with the circuit design; the metal strips are
techniques as bar or line charts and pie conducting tracks. The components, usu-
graphs to present information. Presenta- ally INTEGRATED CIRCUITS, are then soldered
tion-graphics applications usually produce into position between the appropriate con-
high-quality output used principally for ducting tracks to complete the circuit.
presentations on projectors for lectures, Double-sided PCBs are commonly pro-
meetings, etc. duced; these have components and some of
the conducting tracks on one side of the
presentation layer The sixth of the board with additional tracks on the other,
seven layers in the OSI communication ref- interconnections being made through the
erence model, which ensures that the com- board.
munications passing through are in the A PCB connects via an appropriate
appropriate form for the recipient. socket to the internal wiring of, say, a com-
puter system. Smaller modular PCBs may
preventative maintenance MAINTE- be connected to a PCB to augment its func-
NANCE that is performed on a regular basis tion. See also expansion card; edge connec-
and is intended to prevent failures or to de- tor; motherboard.
tect failures that are just about to happen.
When the performance of, say, an electric printer An OUTPUT DEVICE that converts
circuit is suspect, the circuit can be checked the coded information from a computer
by deliberately trying to induce a failure. into a readable form printed on paper.
Compare corrective maintenance. There are many types of printer, varying in
the method and speed of printing and the
preview To display a document in its quality of the print.
printed form on the screen before sending Some printers print a single character at
it to the printer. a time and are thus often referred to as
CHARACTER PRINTERS; the DOT MATRIX
primary color One of a set of three or PRINTER is an example. There are also LINE
four colors that can be mixed to produced PRINTERS, which produce a complete line of
many other colors. There are two sets of characters at a time. Page printers, such as
primary colors: the RGB SYSTEM - red, green, the LASER PRINTER, produce a complete
and blue - used in such video equipment as page at a time.
televisions and computer monitors; and the Printers can produce their printed char-
CMYK SYSTEM - cyan, magenta, yellow, and acters either by mechanical impact or by
black - used for color printing. nonimpact; in some devices different colors
can be printed. With impact printers a
primary store See main store. character is produced by a hammer action
causing an ink ribbon to press against the
print To output information from a paper. In some cases the printed characters
computer to a printer. Application pro- have a solid form, being created by an em-
grams can also output printed information bossed character struck against the ribbon;
to a file for printing at a later date, rather the band printer and barrel printer are ex-
than directly to the printer. This is known amples of this type of impact printer. Al-
as printing to file. ternatively, characters may be built up as a
pattern of closely spaced (or possibly over-
PRINT See Basic. lapping) dots, each dot produced by the
impact of a thin rod. In nonimpact printers
printed circuit board (PCB; pcb) A characters are produced without the use of
thin rigid board of insulating material, usu- mechanical impact; examples include INK-
ally fiberglass, with electronic components JET, THERMAL, and laser printers. The char-
and interconnections on one or both sides. acters are usually composed of fine dots.
A specific pattern of metal strips is chemi- Printers – either impact or nonimpact –
cally formed on the board in accordance that produce characters as a pattern of dots

176
print spooler
DIPs (containing
integrated circuits)

conducting tracks

feedthrough edge connector


to other side

Part of a printed circuit board

are known as matrix printers. Matrix the printed matter itself or the paper sheets
printers can produce a large selection of or stack of CONTINUOUS STATIONERY on
shapes and styles of letters and digits, and which the matter is printed.
may also print Arabic characters or the
ideograms of oriental languages. In addi- print queue Part of a computer’s mem-
tion to characters it is possible to produce ory set aside as a buffer, to hold documents
diagrams, graphs, etc. waiting to be printed. When the printer is
ready the next document will be taken
printer control language See PCL. from the queue.

printer format See format. print screen key A key on PC and com-
patible keyboards that, when depressed,
printer port A port to which a printer will place a raster graphics image of the
can be connected. On PCs this is usually a screen on the Windows clipboard. See also
parallel port and is given the logical name screen dump.
LPT by the operating system. Serial ports
can also be used to connect printers (logi- print server On a network, a SERVER
cal device name COM), but they often re- that makes one or more printers connected
quire configuration. Modern printers to it available to network users. Print
increasingly connect to a computer via a servers are becoming less common as print-
USB port. On Macintosh computers ers increasingly act as their own servers
printer ports were formerly serial and are and connect directly to the network.
now USB.
print spooler Software that takes docu-
printout The output of a PRINTER, either ments to be printed and stores them tem-

177
privacy

porarily in memory or on disk until the procedural languages. Compare nonproce-


printer is ready for them. dural language.
2. A programming language where the
privacy The protection of stored data source code is mainly a set of named PRO-
against unauthorized reading. When pri- CEDURES, FUNCTIONS, and SUBROUTINES.
vacy is required for data stored in a com- Fortran, Algol, Pascal, and C are exam-
puter it implies that the data is confidential ples of procedural languages in both
and that access to it should be limited. The senses.
data may be ‘owned’ in some way by a par-
ticular person or organization, for example procedure A section of a program that
it may be data derived from commercial re- carries out a well-defined operation on
search and development, or it may be data data. The same procedure can be used at
about a particular person or organization. different places in a program. Rather than
Personal data is protected by legislation in repeating the same set of instructions at
many countries (see data protection). each place, the procedure appears only
If a system has poor SECURITY then the once and is brought into effect by CALLS:
privacy of data is at risk. If the INTEGRITY of control is transferred to the procedure and
the data is to be maintained in some way on its completion control reverts to the
by the system, then the privacy is reduced program statement following the call. The
because of the number of copies of the in- actual data values to be used in the opera-
formation that safe operation of a com- tion (or their addresses in memory) are
specified at the time of call; these values or
puter system demands.
addresses are known as PARAMETERS. Dif-
Privacy has become a particular issue
ferent parameters can be provided for each
regarding the Internet. As the sophistica-
call. In some languages a distinction is
tion of computers’ interaction with the In-
made between a procedure and a FUNC-
ternet has grown, it has become
TION, in that a procedure does not return a
increasingly possible for personal informa-
calculated value whereas a function does.
tion stored on a computer or information
Some languages, such as Fortran, use the
about the configuration or use of the com- term SUBROUTINE instead of procedure.
puter to be acquired by Internet sites with- In a large computer system with many
out the user’s knowledge or permission. users, a collection of procedures can be
held on backing store and made available
privacy-enhanced mail (PEM) E-mail for general use. See also program library;
that provides confidentiality and authenti- subroutine library.
cation using various techniques.
process 1. In general, to perform a se-
private key One of two keys used in quence of operations on something in
PUBLIC-KEY ENCRYPTION. It is usually a very order to produce a particular result. In
large integer that is used to decrypt mes- computing, the operations are arithmetic
sages encrypted with the appropriate PUB- calculations and LOGIC OPERATIONS that are
LIC KEY and for encrypting a user’s DIGITAL performed on data in accordance with in-
SIGNATURE. It is vital that private keys be structions in a computer PROGRAM. The
kept secret and secure. data is stored within the computer and is
processed by the PROCESSOR (or processors)
problem-orientated language See high- in the computer.
level language. 2. (task) A sequence of operations or events
defined by the result it produces or by its
procedural language 1. A PROGRAM- purpose. Simple PROGRAMS consist of one
MING LANGUAGE where the programmer process, which performs the necessary se-
must specify in detail the steps (procedure) quence of steps to accomplish the pro-
to be used in solving the problem. All LOW- gram’s purpose. More complex programs
LEVEL and most HIGH-LEVEL LANGUAGES are may divide their work into two or more

178
program

distinct processes that run simultaneously cessing unit. A processor may form part of
and independently with their own re- a unit, as with an intelligent TERMINAL. The
sources (memory, files, etc.), communicat- words processor and computer are often
ing only to coordinate their activities. See used as synonyms. See also front-end
also multitasking. processor; microprocessor.

process control The computer-based program 1. A set of STATEMENTS that


monitoring and control of a manufacturing can be submitted as a unit to a computer
or industrial process. Sensing instruments system, and used to direct the way in which
measure one or more variables. The input that system behaves. Since the program
from these instruments is compared with will be followed slavishly by the computer
the optimum values, and control devices system, it must indicate precisely what is to
are adjusted to maintain the process in an be done, and is thus expressed in a formal
efficient and safe state. Any serious prob- notation. The PROGRAMMING LANGUAGES
lems will cause automatic safety features to used for this purpose can be picked from a
operate and human supervisors will be no- selection of HIGH-LEVEL LANGUAGES or LOW-
tified. LEVEL LANGUAGES (usually ASSEMBLY LAN-
In industries concerned with fluids and GUAGE). Before it can be executed by a
bulk solids, such as chemical manufacture, computer, however, the program must be
petroleum refining, and food processing, converted into the appropriate MACHINE
the variables to be controlled include tem- CODE.
perature, pressure, density, consistency, The major part of any program usually
and composition. If sheeted or webbed ma- consists of one or more ALGORITHMS, each
terials are involved, as in the paper, plas- setting out the steps by which some calcu-
tics, and textile industries, the major lation or other task can be performed.
variables are temperature, thickness, With all but the simplest programs, there
width, length, and weight per area. When are various stages in producing a program
discrete items are handled or manufac- and maintaining it in the desired form. The
tured, as in the car and aircraft industries, first stage is to understand exactly the
then position, dimensions, and other prop- whole task under consideration so that the
erties are controlled. requirements of the program can be clearly
stated. During the process of program de-
processing The performance of ARITH- sign, a description is produced of the pro-
METIC and LOGIC OPERATIONS by the gram itself, the major components of the
PROCESSOR (or processors) in a computer program, the way in which the compo-
on data stored within the system. The op- nents are interrelated, and the main algo-
erations are performed in accordance with rithms employed by the components.
the instructions in a computer PROGRAM. The design acts as the basis from which
a working version of the program is cre-
processing unit See processor. ated. This implementation stage involves
writing the program in the chosen lan-
processor A piece of HARDWARE, or a guage(s) as well as TESTING and DEBUGGING
combination of hardware and FIRMWARE, it. If at any stage the design proves to be in-
whose function is to interpret and execute adequate or wrong, then a return to the
instructions. It may be the principal oper- previous stage is made. Once testing and
ating part of a computer, in which case it is debugging have been satisfactorily com-
also known as the CENTRAL PROCESSOR. In pleted the program can be released for
more powerful computers there may be operational usage, together with its DOCU-
several processors, acting independently, MENTATION. During its working lifetime it
each one performing some of the process- may have to be modified or upgraded, and
ing tasks or possibly having a specialized its documentation suitably amended. This
function. The processor or set of proces- forms part of program maintenance.
sors in a computer is often called the pro- See also stored program.

179
program counter

2. To design, write, test, and debug pro- tinction is often drawn between systems
grams. analysts and programmers. See systems
analysis.
program counter See instruction ad-
dress register. programming error See error.

program crash See crash. programming language Any of a wide


variety of notations designed for the pre-
program design See program. cise description of computer PROGRAMS.
With any programming language, the no-
program file A FILE containing one or tation consists of a set of letters, digits,
more programs or program fragments, punctuation marks, and other CHARACTERS
which may be written in source code or ob- that can be assembled into various combi-
ject code. Compare data file. nations, together with a strictly defined set
of rules describing exactly which combina-
program flowchart See flowchart. tions are permitted. This set of rules is the
SYNTAX of the language. The meaning of
program library An organized collec- text constructed according to the syntax is
tion of computer programs and MODULES also strictly defined – by the SEMANTICS of
held on BACKING STORE. It may be available the language. Programming languages are
for general use by all users of a particular thus artificial languages in that there is no
computer system, in which case it is called freedom of expression characteristic of a
the system library. The individual pro- natural language like English. See also
grams and modules are known as library high-level language; low-level language.
programs. A typical library might contain
COMPILERS, UTILITY PROGRAMS, APPLICATION program module See module; modular
PACKAGES, and PROCEDURES, FUNCTIONS, or programming.
SUBROUTINES. Usually it is only necessary to
make a reference to a particular library program unit (subprogram) A part of a
program, i.e. indicate its NAME, to cause it program that performs a specific task and
to be executed or automatically incorpo- so in some sense is self-contained. A PRO-
rated in a user’s program by the LINK EDI- CEDURE, FUNCTION, SUBROUTINE, and pro-
TOR. gram MODULE are examples of program
units.
program listing A printout of a com-
puter program. Prolog /proh-log/ A PROGRAMMING LAN-
GUAGE whose name is derived from pro-
programmable ROM See PROM. gramming in logic. It was developed in
Europe in about 1970 and is based on sym-
program maintenance See program. bolic logic. It is used in the field of ARTIFI-
CIAL INTELLIGENCE. It is a FIFTH GENERATION
programming The activities involved in LANGUAGE and its structure is not at all like
producing a computer program. In the that of more conventional languages such
broadest sense of the word, this includes as C++ or Basic. It consists mainly of state-
producing an accurate description of the ments about relationships between objects,
requirements that some envisaged program or implications derived from the state-
is expected to meet, and all stages of pro- ments, rather than instructions about how
gram design and implementation (see pro- the objects are to be manipulated.
gram). In a much narrower sense, the
activities involve simply the writing and PROM /prom/ (programmable read-only
testing of a program from some given de- memory) A type of SEMICONDUCTOR
sign. This narrower usage is most common MEMORY that is fabricated in a similar way
in commercial programming, where a dis- to ROM. The contents required, however,

180
PSTN

are added after rather than during manu- tion. These would typically be set at the be-
facture and cannot be altered from that ginning of the program, when the user
time. These contents are fixed electroni- chooses the desired type of automobile,
cally by a device known as a PROM pro- and remain constant thereafter. Software
grammer. It is only outside a computer that components usually have properties whose
a PROM can be programmed. Within a values are set when the program is de-
computer the contents cannot be changed; signed. A clock CONTROL, for example,
they can only be read. See also EPROM. might have properties determining whether
it displays the time in 24-hour or 12-hour
PROM programmer See PROM; format, in analog or digital format, etc.
EPROM.
protection See data protection; file pro-
prompt A short message displayed on a tection; storage protection.
VDU by a COMMAND LINE INTERFACE to in-
dicate that additional data is required from protocol /proh-tŏ-kôl/ An agreement
the user to allow processing to continue. that governs the procedures used to ex-
The prompt frequently has some mne- change information between entities in a
monic content to describe the type of data computer NETWORK. In general, a protocol
expected. Ideally a prompt should be ex- will govern the way in which information
plicit and informative for those unused to is encoded (see code), the generation of
the system, but capable of being shortened checking information (see check), and the
to increase the speed of use for an experi- FLOW CONTROL of information, as well as
enced user. For example, a novice prompt actions to be taken in the event of ERRORS.
may take the form
Enter the name of a file, proxy server An intermediate server be-
1 to 8 characters starting tween a LAN and another network, espe-
with a letter: cially the Internet, that provides security
The equivalent expert prompt could then (e.g. a FIREWALL), administrative control,
be and caching facilities. Performance can be
Filename: improved with a proxy server as its cache
This state of affairs is seldom realized, can serve all users and supply frequently re-
and many operating systems in particular quested data, such as popular Web pages.
prompt with a single character such as >
or $. pseudocode /sew-doh-kohd/ A pro-
gramlike but informal notation consisting
property A data item that forms part of of text in natural language (e.g. English)
a CLASS or software component. Assigning and used to describe the functioning of a
different property values to different in- procedure or a program. The flow of con-
stances of the class or component can alter trol is usually expressed in programming
its behavior to suit the precise circum- terms, e.g.
stances. Some properties are transient, if … then … else …
holding temporary values generated during repeat … until …
the execution of a program. A games pro- while the actions are elaborated in prose.
gram, for example, might contain a class Pseudocode is used mainly as a design aid
called ‘Auto’ that models the characteris- and is an alternative to FLOWCHARTS.
tics of an automobile, with such properties
as ‘current speed’, ‘fuel remaining’, etc. pseudorandom numbers /sew-doh-ran-
These would change in response to user dŏm/ See random numbers.
input and elapsed game time. Other prop-
erties might define more fundamental char- PSN (packet switching network) See
acteristics of the particular type of packet switching.
automobile being modeled, such as maxi-
mum speed and maximum rate of accelera- PSTN (public switched telephone net-

181
public-domain

work) The worldwide public telephone down from the menu bar and remains open
system. The PSTN provides much of the In- until either another menu is pulled down or
ternet’s long-distance infrastructure. ISPs it is closed by the user.
pay long-distance providers for access and
share circuits among many users by packet punched card An obsolete data MEDIUM,
switching. Thus Internet users only pay for consisting of a rectangular paper card on
usage to their ISPs and for local telephone which data could be encoded in the form of
calls. holes punched in columns. Since a hole
could either be present or absent, it could
public-domain Describing any work be used to represent a binary 1 or a binary
that is not copyrighted. Such work can be 0. A pattern of holes and spaces could
copied freely by anyone and used for any therefore represent a sequence of 1s and 0s
purpose. Much of the information on the that in turn represented a character (see bi-
Internet is of this form but note that copy- nary representation). Punched cards were
righted information on the Internet is not employed extensively for the input, output,
in the public domain. and storage of data in early computers.
They were in fact used for data processing
public-domain software Uncopyrighted before computers were available.
software available for anyone to use. See
Each letter, number, or other character
also freeware; shareware.
was represented on a card by holes pro-
duced mechanically – by a card punch – in
public key One of two keys used in PUB-
one or more rows within a column. When
LIC-KEY ENCRYPTION. A value is provided by
some designated authority (the user) and used for the input of data, the card punch
released to the public as a key that can be was operated by means of a keyboard; it
used to encrypt messages to be sent to the was then known as a keypunch. The pres-
user or for decrypting the user’s DIGITAL ence of holes in a column, and their posi-
SIGNATURE. Public keys are usually very tions, was sensed (photoelectrically) by
large integers. another machine – a card reader. The
reader converted the punched data into a
public-key encryption The use of dif- binary coding of 1s and 0s that could be
ferent PUBLIC and PRIVATE KEYS for encryp- fed into a computer. Binary data from a
tion, known as asymmetric cryptography. computer could be punched on to cards –
A public key encrypts data and a corre- again by a card punch – as output.
sponding secret private key decrypts data.
The process is reversed for digital signa- purge To clean up, usually by removing
tures. old or redundant data or files.

public switched telephone network push See stack.


See PSTN.
pushdown list See stack.
pull-down menu A menu of commands
or pointers to other menus that is pulled pushup list See queue.

182
Q

QBE (query by example) A simple data- be used to store requests for access to pe-
base querying technique in which the crite- ripherals, such as disks or printers.
ria are set in a blank database record. This
method is easier than using a query lan- QuickDraw Trademark A graphics dis-
guage. play system for Apple Macintosh comput-
ers that enables programs to create and
quadbit /kwod-bit/ See nibble. display graphical objects. It has been su-
perseded but is still widely used.
quantum computing /kwon-tŭm/ Re-
search into the use of quantum mechanical QuickTime Trademark A standard de-
effects as the basis of computer processors. veloped by Apple Macintosh for displaying
multimedia on computers. QuickTime is
query by example See QBE. built into the Macintosh operating system.
PCs can also run files in QuickTime format
query language A specialized language if they have the appropriate software.
that is used for obtaining information from QuickTime files usually have the file exten-
a database. sion mov.

query processing The retrieval of one quit To exit from a program or system in
or more values from a FILE or DATABASE, a clean and orderly way.
leaving the contents unchanged.
QWERTY /kwer-tee/ Describing the
queue (pushup list) A LIST that is con- standard form of a Latin-alphabet-based
structed and maintained in computer mem- keyboard, laid out in a typewriter style, in
ory so that all insertions are made at one which the first six keys on the upper left of
end of the list and all removals are made at the alphabetic keys are QWERTY. It orig-
the other end. The next item to be removed inated in the 1880s to reduce the jamming
is thus the earliest to have been inserted, of type bars in typewriters by fast typists.
i.e. the queue works on a first in first out Various alternatives have been pro-
(FIFO) basis. In contrast, a STACK works on pounded but QWERTY is so entrenched
a last in first out (LIFO) basis. Queues may that these have had little impact.

183
R

radio button One of a set of small icons no redundancy at all, but is very fast; it is
used to select an option in a graphical user sometimes considered not to be a proper
interface. Typically radio buttons are small form of RAID storage. RAID disk systems
circles. Only one button in any set can be are becoming standard on all but the small-
selected at any one time. est FILE SERVERS.

radix /ray-diks/ See base. RAM /ram/ (random-access memory) A


type of SEMICONDUCTOR MEMORY that can
radix point A symbol, a period (full be read from and written to by the user, i.e.
point) in the USA and UK but often a it is READ/WRITE MEMORY. The basic storage
comma elsewhere, used to separate the in- elements are microscopic electronic devices
tegral part of a number from the fractional fabricated as an INTEGRATED CIRCUIT. These
part. The radix point in decimal notation is elements, often referred to as cells, are
called the decimal point. arranged in a two-dimensional array, i.e. in
rows and columns. A single cell can store
RAID /rayd/ (redundant array of indepen- one bit of information – either a binary 1
dent disks) A method of improving disk or a binary 0. Each cell can be identified
fault tolerance and performance. Several uniquely by its row and column. It can
HARD DISKS are combined in a special unit therefore be accessed directly (and ex-
controlled by a RAID controller, which tremely rapidly), i.e. there is RANDOM AC-
presents them to the rest of the system as CESS to any cell. Since it is read/write
one large disk and stores data by STRIPING. memory, data can be both read from and
However, not all the available space is used written to the cells in the array.
to store genuine data: sectors on at least It should be noted that all kinds of
one disk always store data calculated from semiconductor memory provide random
the contents of the equivalent sectors on access, including ROM (read-only memory).
the other disks, for example PARITY infor- The term RAM is used for random-access
mation. This data is redundant because it is memory that can be written to. Because a
not necessary to store it since it can be cal- computer’s MAIN STORE consists of RAM,
culated; however, the act of storing it the term RAM is often used as a synonym
means that, should any of the other disks for main store.
fail, this redundant data can be used to cal- See also dynamic RAM; static RAM.
culate the contents of the missing disk.
Thus no data is lost when a disk fails and RAM cache Cache memory that is used
the system suffers no DOWNTIME. A new for the temporary storage of data retrieved
disk can be swapped in and its contents from RAM to speed up access.
generated automatically. There are various
types of RAID, called levels. Levels 2 to 6 RAM disk An almost obsolete tech-
use variants of the system just described, nique in which a portion of main store is
typically with from 3 to about 14 disks. set aside to be used in place of a disk to
Level 1 is disk mirroring (see mirror) and provide faster processing. This part of
can be used with only 2 disks. Level 0 uses memory is treated as a logical drive and
all available space for genuine data and has data is stored as though it were a real phys-

184
random access

RAID CONFIGURATIONS

RAID Mode Implementation Security/Performance

RAID 0 Straight data striping No data security but gives


maximum performance.
RAID 1 Duplication This gives the best security
but no performance gain.
It is the most expensive as
2 times the number of disks
is needed.
RAID 2 Not implemented yet. Requires
extra information to be added
to data disks.
RAID 3 Straight parity Gives security against a
single hard drive failure and
is reasonably economical.
RAID 4 Although a dedicated disk is Not used as much as
used for the parity information RAID 3.
data disks are accessed
independently of it, so
performance is not affected.
RAID 5 Parity based data security Gives security against a
where the parity information single hard drive failure
is stored on each of the data with the minimum of
disks. performance loss.
RAID 6 Parity based with 2 disks Gives security agianst
holding parity information. failure of both the 2 main
disks. RAID 1 gives the
same security with more
speed at the same reliability
level.

RAID 10 RAID 0 striping together with Gives both the performance


and RAID 1+0 RAID 1 duplication together. of striping and the security
of duplication. The simplest
implementation is with 4
hard drives grouped into
identical pairs.

RAID 30 RAID 3 plus striping. Parity is Data is recoverable even if


and RAID 3+0 calculated before striping. one of the RAID 0 disks
fails.

RAID 50 RAID 5 parity plus striping of Data is recoverable even if


and RAID 5+0 all the data disks. Parity is one of the RAID 0 disks
calculated before striping. fails.

ical drive. When the computer is switched other stored data to be read first. The stor-
off all the data is lost. This system has been age locations can be accessed (read or writ-
superseded by the use of cache memory. ten to) in any order. There is random
access with MAGNETIC DISK storage. There is
random access A method of retrieval or also random access with main storage, i.e.
storage of data that does not require any with RAM and ROM, but with a much

185
random-access file

shorter ACCESS TIME than with disk storage. RDF Site Summary See RSS.
See also file. Compare serial access.
read /reed/ 1. To sense and retrieve data
random-access file See file. from a storage medium such as MAGNETIC
DISK or SEMICONDUCTOR MEMORY. This
random-access memory See RAM. data can then be transferred to another
storage medium or to an output medium.
random numbers Numbers that are See also readout.
drawn from a set of permissible numbers 2. To sense and interpret data on an input
and that have no detectable pattern or bias. medium such as a document or a BAR CODE,
Any number in the set should therefore and to convert the data into an electrical
have an equal probability of being selected. signal that can be fed into a computer.
Random numbers are required, for exam-
ple, when selecting the winners of a lottery. READ /reed/ See Basic.
In a computer true random numbers are
difficult to obtain. Instead programs are reader An INPUT DEVICE, such as a DOCU-
designed to generate what are known as MENT READER or bar-code reader, that is
pseudorandom numbers. In principle the able to READ data, i.e. sense and interpret
numbers produced depend on their prede- data, on an input medium.
cessors and so are not truly random; in
practice the pseudorandom numbers gen- read head /reed hed/ See tape unit.
erated by a particular program are suffi-
ciently random for the purpose intended. read instruction A MACHINE INSTRUC-
TION that causes an item of data to be READ
raster graphics /rass-ter/ A method of from a specified location in a memory de-
producing pictorial images in which the de- vice and copied into a BUFFER store or into
sired shape is built up line by line. Each line a REGISTER.
is composed of closely spaced elements
that can be any one of a number of colors read-only memory See ROM.
or shades. This is the technique used in
most VDUs, in TV monitors, and also in readout 1. Information retrieved from
some plotters. The term is also used of a MAIN STORE after processing and displayed
type of COMPUTER GRAPHICS image that uses on a screen or copied into backing store.
these principles. Compare vector graphics. 2. The process of reading data from a
memory device. In most types of memory
raster image processor See RIP. this does not alter the actual representation
of the data; the readout is then described as
raw data Data in the form in which it nondestructive.
reaches a computer system from the out-
side world. It is data that has not been vet- read/write head See head. See also disk
ted for correctness, nor sorted into any drive.
particular order, nor processed in any
other way. See also data cleaning. read/write memory A type of memory
that in normal operation allows the user to
ray tracing A technique used mainly in read from or write to individual storage lo-
three-dimensional graphics for showing cations within the memory, i.e. to retrieve
objects with realistic shadows cast by an and store information. It may involve SER-
imaginary light source. In ray-tracing ap- IAL ACCESS or RANDOM ACCESS. RAM is
plications primitive objects (e.g. cubes, read/write memory.
cylinders, spheres, etc.) can be placed in
position, sized, distorted, rendered (see real address The absolute machine ad-
rendering), and illuminated and viewed dress that specifies a physical memory lo-
from different directions. cation.

186
record

RealAudio /ree-ăl-aw-dee-oh/ Trademark response times within the specific toler-


A continuous or streaming sound technol- ances.
ogy from RealNetworks. A RealAudio
player or client program is needed to use reboot To reuse a BOOTSTRAP program
this technology, which may be included in in a computer. An instruction to reboot the
a Web browser or which can be down- system can be given to the system when,
loaded from the Internet. To deliver Re- say, the OPERATING SYSTEM is not running
alAudio from a Web site either the user or properly or has been corrupted in some
the user’s ISP needs to have a RealAudio way. Rebooting loads a new copy of the
server. Real audio files have the extension operating system from backing store and
ra or ram. allows the system a fresh start.

Really Simple Syndication See RSS. reconfiguration /ree-kŏn-fig-ŭ-ray-shŏn,


-fig-yŭ-/ A change or redefinition of the
real number (real) In computing, any configuration of a computer system, i.e. of
number with a fractional part, such as the pieces of hardware making up the sys-
0.75, 57.3654, or 3.141 59… (i.e. π). As tem and in some cases of the way in which
with INTEGERS, reals can be unsigned or can they are interconnected. A reconfiguration
carry a plus or minus sign. Real numbers may be necessary, for example, to bypass a
are represented in a computer in FLOATING- defective unit or to provide a different
POINT NOTATION or sometimes in FIXED- overall function. The software may need to
POINT NOTATION; they are thus represented be reconfigured to reflect a change in the
and manipulated differently from integers. hardware (see configure).
Only a subset of the real numbers can be
represented in a computer. If n bits are re- record A collection of related items of
served to store each real number then only data, treated as a unit. It consists of a num-
2n different real numbers can be repre- ber of parts, called fields, each field holding
sented. (In practice the number will be a particular category of data. In a person’s
smaller than this since not all combinations hospital record, for example, there could
are valid floating-point numbers.) be a field for the person’s name, another
for date of birth, and another for, say, the
real-time clock A battery-powered clock clinic attended; the key field holds a unique
included on a computer motherboard. identifier, for example a number allocated
to the patient for ease of identification, and
real-time processing A method of is used to find the record in a group of hos-
using a computer where the time at which pital records or to sort the group into pa-
the output is produced is of importance. tient order (see sorting). Normally one
The computer must be able to respond to particular field in a record is used as the
some external event (for example, some key field. It is also possible for there to be
movement in the physical world) and be several key fields in a record.
able to perform calculations and control A field may contain either a fixed or a
functions within a specified and usually variable number of CHARACTERS, and hence
very brief time limit. This response time, be of a fixed or variable length. A record
i.e. the lag between input and output time, may thus also be of fixed length or of vari-
can range from a few seconds to less than a able length. Fixed length fields and records
microsecond. are easier to implement (e.g. a given field
will occupy the same part of every record),
real-time system Any computer-based but can waste space if used to hold data
system, such as air-traffic control, PROCESS items of intrinsically variable length, such
CONTROL, or defence systems, that uses as names. Variable length records and
REAL-TIME PROCESSING to implement its fields must be delimited by using specified
core functionality. Often such systems use characters to mark their beginnings and/or
special hardware and software to ensure ends or a separate data structure must be

187
record length

maintained that records their starting posi- wise there would be an endless series of
tions or lengths. calls. Recursion is not allowed in every
This collection of related data items is programming language. Improper use can
considered in terms of its contents or func- cause problems during program execution,
tion rather than on how it is stored and being difficult to detect during compila-
moved in a computer. It is often referred to tion.
as a logical record. In contrast, a physical
record is the unit in which data is trans- reduced instruction set computing See
ferred to and from peripheral devices; it is RISC.
also called a BLOCK. One logical record
may be split up and held in different phys- redundancy The provision of addi-
ical records. Several logical records or tional components in a system, over and
parts of logical records may be located in above the minimum set of components re-
one physical record. quired to perform the function of the sys-
The record is one of the fundamental tem. This is done to increase the reliability
ways of collecting and organizing data. of the system and, in the event of errors oc-
DATA FILES held in backing store are often curring, to increase its ability to recover
treated as sequences of records. Many pro- from such situations. For example, two or
gramming languages permit operations on three identical pieces of hardware may be
an entire record as well as on its individual used in a computer so that if a fault occurs
components. See also database. in one piece that item can be replaced.
Again, additional bits are attached to data
record length The storage space needed when it is transferred from one location to
to contain a record, usually stated in bytes. another, enabling a CHECK to be performed
– a redundancy check – and any errors oc-
recoverable error An error that is not curring in the data during transfer to be de-
fatal, i.e. one from which the program can tected.
recover and continue running.
reentrant program /ree-en-trănt/ A pro-
recovery The procedure whereby nor- gram that uses code that can be shared by
mal operation is restored after the occur- other programs at the same time. Operat-
rence of a FAULT. Power-fail recovery, for ing systems often use reentrant code so that
example, deals with a loss of the incoming only one copy is needed in memory to ser-
power supply to a computer system. The vice many live applications.
system is equipped to detect any long-term
deviation of the power-supply voltage reference file A FILE that contains refer-
from acceptable limits. When such a devia- ence material and thus changes infre-
tion is detected, and before it can cause any quently.
problems, a signal (INTERRUPT) is sent to
the processor: the sequence of instructions reformat To FORMAT a disk that con-
being carried out is suspended, relevant in- tains data. Reformatting will totally re-
formation is dumped in NONVOLATILE move any data on the disk.
MEMORY, and processor activity is halted.
When the voltage is restored the program refresh 1. To recharge a dynamic mem-
or programs that had been running can be ory bank so that information is not lost.
RESTARTED. This is an automatic function of the mem-
ory board. See also dynamic RAM; refresh
recursive routine A PROCEDURE, FUNC- cycle.
TION, or SUBROUTINE that CALLS itself, re- 2. To retrace a video screen after a certain
sulting in a continued repetition of the interval. See also refreshed display; refresh
operation that the procedure, function, or rate.
subroutine is designed to perform. The re-
cursive call must be CONDITIONAL, other- refresh cycle The repeated cycle of elec-

188
regular expression

trical pulses used to renew stored electrical particular REGISTERS or between a specified
charges in DYNAMIC RAM, without which storage LOCATION in main store and a par-
data would be lost. ticular register. For example, loading the
contents of address 10 in main store into
refreshed display A display in which the ACCUMULATOR would involve
the image lasts only a very short time and (1) loading address 10 into the MEMORY
therefore has to be repeatedly redrawn ADDRESS REGISTER,
electronically. An ordinary TV screen is a (2) copying contents at address 10 to
refreshed display. If the same image is re- accumulator.
drawn on a refreshed display then the This can be written in symbolic form:
display appears continuous, without flick- (1) 10 ⇒ MAR
ering. Alternatively different information (2) MEM ⇒ ACC
can be fed to the screen to give the where the arrow symbol means ‘is trans-
appearance of motion in the image. A re- ferred to’.
freshed display can be used for instance to
produce an animated cartoon. registry A database used by Windows
systems to hold hardware and software
refresh rate The number of times a dis- configuration information. When a new
play’s image is redisplayed per second. piece of a program is installed it usually
This is expressed in hertz. The refresh rate writes entries in the registry. When they
for each screen depends on the video card are no longer required they should be un-
used and can be changed in the display set- installed in a proper manner. In this way
tings. However, if an incompatible rate is
the registry entries will also be removed.
chosen the display will go blank or the
The registry can be edited by using the
image will be distorted. The older and
REGEDIT.EXE program provided with
slower refresh rate of 60 Hz caused image
Windows. However care must be taken
flickering and consequently operator tired-
when doing this as the system can be dis-
ness and headaches. Newer rates of 75 to
abled if the registry is altered incorrectly.
85 Hz are commonly used.

register A storage device in the process- regression testing The testing of a com-
ing unit of a computer in which data has to plete program after modification of some
be placed before it can be operated upon by part rather than only testing the modified
instructions. It is therefore a temporary lo- routines, to ensure that the program still
cation, and has a CAPACITY of only a WORD, works in a proper manner.
a BYTE, or a BIT. The registers within a pro-
cessing unit are quite separate from the regular expression A compact method
storage LOCATIONS in main store and back- of specifying more than one character
ing store. Registers are either general-pur- STRING that is often used in searching. For

pose devices or are intended for a special example the regular expression (or pattern)
purpose. Special-purpose registers include ‘abc[def]g’ represents the three strings
the INSTRUCTION ADDRESS REGISTER and IN- ‘abcdg’, ‘abceg’, ‘abcfg’: enclosing the
STRUCTION REGISTER in the CONTROL UNIT. characters ‘def’ in square brackets means
In larger computer systems there may be that they are alternative values for the
several hundred registers. fourth character in the string. It is often
Information must be stored in and re- more useful to perform one search using a
trieved from registers extremely rapidly. regular expression defining a set of strings,
They are therefore high-speed semiconduc- which produces one set of results, than to
tor devices (usually a group of FLIP-FLOPS, search for each string separately. There is
each flip-flop storing one bit). no standard syntax for regular expressions
but some features, such as the use of square
register transfer An operation whereby brackets described above, are universally
information is transferred between two recognized.

189
relational database

relational database /ri-lay-shŏ-năl/ A dress gives an ABSOLUTE ADDRESS. The base


database management system that is a col- address may, for example, be the address
lection of data items organized as a series specified in the INSTRUCTION ADDRESS REGIS-
of tables. The relationships between the ta- TER, or it may be stored in a special-pur-
bles are formally defined together with any pose register, the base address register. See
constraints on the data, and data can be ac- also relative addressing.
cessed or reassembled in many different
ways so that special views of selected data relative addressing An ADDRESSING
can be obtained to suit a user’s needs. A MODE in which a RELATIVE ADDRESS is used
query language, for example SQL, is used in a MACHINE INSTRUCTION in order to iden-
for interactive investigations and also for tify the storage location to be accessed.
gathering information for reports. Such This mode is often used to access the con-
databases can be relatively easy to create tents of complex data structures, with the
and use, but can be highly complex and base address register containing the ad-
powerful. dress of the whole structure and the rela-
tive address being the offset of the desired
relational operator (relational) A sym- item within it. It is also used to control the
bol representing a comparison operation. flow of the program code: an instruction to
skip the next instruction would then
merely cause an extra 1 to be added to
the INSTRUCTION ADDRESS REGISTER (IAR)
RELATIONAL OPERATORS
rather than replacing its contents with an
Comparison Operator explicit new address. A backward jump
could be made in a similar way, by sub-
less than < tracting the relevant amount from the IAR.
less than or equal to <=
equal to = reliability A measure of the ability of a
greater than or equal to >= system – hardware or software – to provide
greater than > its specified services for a given period or
not equal to <>, #, !=, ¬ = when demanded.

reload To load a program into memory


These operations take two OPERANDS and again for running after some system inter-
provide a logical value true or false as their ruption or crash has stopped the program.
result. The operands may be of any type so
long as like is compared with like. The relocatable code The code making up a
common comparison operations are program or part of a program that can be
shown in the table, together with the rela- loaded anywhere in main store. No AB-
tional operators normally used in comput- SOLUTE ADDRESSES are used, except perhaps
ing; ‘not equal’ has many denotations. An those of known operating system or I/O
example of how relationals are used, in functions. All JUMPS are made relative to
Pascal, is as follows: the current instruction, the start of the
if (b<a) then code, or the contents of a REGISTER, exam-
c := b ples being
else jump to the next instruction but one,
c := a; jump to the second instruction of the pro-
See also order of precedence. gram,
call the procedure whose address is in reg-
relative address An ADDRESS expressed ister 5.
as a difference with respect to some nu-
merical value used as a reference. This ref- REM /rem/ See Basic.
erence is known as a base address.
Addition of a base address to a relative ad- remainder check See modulo-n check.

190
resolution

remote Describing a workstation, termi- pear to be working on a single centralized


nal, etc., that is situated some distance database. Lotus Notes was one of the first
from a main computer or network but is systems to make replication a central part
connected by a link. of its design.

remote access The ability to obtain ac- report generator See generator.
cess to a computer or network from a re-
mote location. request for comments (RFC) A formal
Internet document or standard that has
remote procedure call (RPC) A proto- evolved from drafts and reviews by inter-
col using the client/server model that can ested parties. Some RFCs are for informa-
be used by a program to request a service, tion only.
usually a PROCEDURE or FUNCTION call,
from another program located on another requirements description See program.
computer in a network.
rerun 1. To RUN a program again from
rendering The process of converting a the start, usually following a malfunction
wireframe three-dimensional image into a of the computer. See also restart.
solid image. Three-dimensional drawing 2. A repeat run.
programs have a wide range of options for
‘covering’ wireframe structures with differ- reserved character A keyboard charac-
ent textures and colors. See also ray trac- ter, for example an asterisk (*), forward
ing. slash (/ ), or backward slash ( \), that has a
special meaning to a program and cannot
repaginate /ree-paj-ă-nayt/ To rearrange be used for other purposes (such as naming
the pages of a desktop or word-processing files or keyboard shortcuts).
document after editing, to take account of
inserted and deleted data. This is usually an reserved word A word that has a spe-
automatic procedure in the application, cific role in a programming language and
which the user can override if necessary. cannot therefore be used as an IDENTIFIER.
For example, in many languages the words
repeater A device that receives an elec- if, then, and else are used to separate the
tromagnetically or optically transmitted different parts of conditional statements.
signal, amplifies it, and then retransmits it These are thus reserved words.
along the next leg of the medium. Signals
can be sent over long distances by the use reset (restore) 1. To cause a device to
of repeaters. They are used to interconnect take up an earlier value. For example,
segments in LANs and to extend WAN when a program is about to be RESTARTED
transmission. on a processor, the contents of the working
registers of the processor must be reset to
repeat until loop See loop. the values they last held when the program
was previously running.
replace To substitute one set of data for 2. To set the whole computer back to its
another: often used in word processing in initial condition when it was switched on.
search and replace operations. This process is used in smaller computers
to clear faults that have corrupted the OP-
replication The process of creating and ERATING SYSTEM and made further process-
managing duplicate versions of a database. ing impossible.
Changes made in one copy are reflected in
all other copies. These changes are syn- resident Describing a program that is
chronized so that many users can work on present in memory.
their own local copy of the database in ge-
ographically dispersed situations, but ap- resolution /rez-ŏ-loo-shŏn/ In general,

191
resource

the amount of information or detail that 2. The sharing of RESOURCES among the
can be produced by a device such as a VDU users of a computer system to prevent or
or plotter or can be revealed in an image. reduce the unfair use of the system by some
The device or image can be described qual- users at the expense of others. It can be
itatively as having a high resolution (hi res) done, for example, by allocating units of
or a low resolution, etc. The resolution can processor time to each user, depending on
also be given in numerical terms. The reso- their status, work, etc., and by allocating
lution of a display screen, for example, can fewer units at peak time rather than, say, at
be expressed as the number of PIXELS (pic- night.
ture elements) that are available in the hor-
izontal and vertical directions of the resource information file format See
screen, e.g. 1024 by 768 pixels. The reso- RIFF.
lution of a graphics image can be given in
dots (i.e. pixels) per inch, e.g. 300 dpi. The resource sharing See resource alloca-
resolution of a plotter can be given as the tion.
smallest possible pen movement. The reso-
lution of a printer output can be in dots per response time Usually, the time that
inch, e.g. 2400 dpi. elapses from some action by a computer
user to the receipt of some response or
resource Any of the facilities that are feedback from the computer. With a per-
available in a computer system and that are sonal computer, with one user, the re-
required by a processing activity. The re- sponse time depends entirely on the size of
sources in any computer system include the the task to be performed; there is a fast re-
following devices: one or more PROCES-
sponse for simple tasks like displaying the
SORS, some form of memory – MAIN STORE
contents of a file on the screen and a slow
and BACKING STORE – in which to store the
response for, say, compiling a large pro-
instructions for the processor(s) and the
gram. When there are a large number of
data awaiting manipulation, and INPUT/
terminals linked to a mainframe or mini-
OUTPUT DEVICES through which instructions
computer the response time increases as
and data are fed to the computer and in-
the number of users increases; a lightly
formation is fed back to the outside world.
Program instructions and data are held on loaded mainframe responds extremely
backing store as FILES. Files are also re- rapidly. In a network, the response time de-
sources. pends on how heavily the server responsi-
Any facility required from the OPERAT- ble for servicing the requested function is
ING SYSTEM of a computer is regarded as a
loaded, and in extreme cases the loading of
resource. These include programs for the network itself. See also interactive.
scheduling and supervising the running of
users’ programs on the computer. restart The resumption of the execution
of a program after a temporary halt, using
resource allocation (resource sharing) data dumped at a particular point in the
1. The sharing of the RESOURCES of a com- program (see dump). The program is said
puter system between various processing to be restarted. Much of the data from the
tasks. A resource, such as the processor, previous RUN is therefore preserved, and a
that can only be used by one task at a time, restart is often described as a warm start.
is shared by allowing each task in turn a set In contrast, there is a cold start when a pro-
time period. In the case of storage devices, gram has to be rerun from the start. Some
for example magnetic disks, requests from programming languages allow the pro-
tasks are queued and serviced one at a grammer to specify the points at which a
time. Resource allocation is under the con- program can be restarted.
trol of the OPERATING SYSTEM of the com-
puter. restore See reset.

192
RISC

retrieve To locate and return data to the attribute of most VDUS, used to draw atten-
user or program requesting it. tion to a character. The character is dis-
played on the screen in the opposite
return 1. In programming, the transfer contrast to surrounding information. For
of control from a called routine or program instance, with a screen that normally has
back to the calling routine or program. dark characters on a bright background, a
2. See return key. character in reverse video will be a bright
character within a dark character-sized
RETURN See Basic. rectangle.

return instruction See exit. RFC See request for comments.

return key (enter key) A key on a KEY- RGB system A method of defining col-
BOARD that sends a carriage return charac- ors by the proportions of R (red), G
ter to the computer. It is often used to (green), and B (blue) present. See also
signal that the current line of typing is com- CMYK system.
plete and may be processed. In GUI inter-
faces it often initiates the default action of ribbon cable An electric cable in which
the currently selected object, e.g. a pro- a number of similar wires lie side by side in
gram is executed, a word-processing docu- a flat plastic strip and are electrically insu-
ment is opened in the appropriate word lated from each other. A ribbon cable pro-
processor, etc. vides a continuous path along which
electrical signals can be conveyed from one
reverse Polish (RP) A notation used in a point in a system to another. It can be used
computer to evaluate arithmetic expres- for PARALLEL TRANSMISSION of data.
sions. In RP the ARITHMETIC OPERATOR (e.g.
+, –, *, /) is placed after its operands rather Rich Site Summary See RSS.
than between them as in conventional no-
tation. The addition of two numbers, a and rich text format See RTF.
b, would thus be expressed as ab+.
Expressions in RP are scanned from left RIFF /riff/ (resource information file for-
to right and the values of the operands mat) A tagged file-format specification
stored until an operator is encountered. used to cover different types of multimedia
The operator is then applied to the last two files. Tags are used to identify data ele-
values and replaces them by a single result, ments in a file by length and by type. The
which may be used as a value for the next specification can be extended to cover new
operator, and so on. Hence kinds of data elements when necessary
ab–cd+* while still supporting older formats.
would be evaluated as
(a – b) * (c + d) right-justified See justify.
i.e. b would first be subtracted from a; c
and d would then be added together and ring network See network.
the sum would finally be multiplied by
(a – b). RIP (raster image processor) Hardware
The translation of conventional nota- or a combination of hardware and soft-
tion to RP is achieved by an algorithm. A ware that converts vector graphics images
programmer would not have to write ex- into raster graphics images. See also Post-
pressions in RP but a COMPILER producing Script.
machine code from a high-level language
might well generate RP for expression eval- RISC /risk/ (reduced instruction set com-
uation. puter) A design philosophy for CPUs. In
contrast to CISC, RISC processors have a
reverse video (inverse video) A display smaller and simpler INSTRUCTION SET; they

193
RMON

therefore operate more quickly, because it highly robust if it recovers and continues to
takes less time to decode and execute each operate despite numerous error conditions.
instruction, and can be manufactured more
cheaply. Also, research has shown that rogue value See terminator.
many of the missing CISC instructions
were rarely used in practice, and so were roll-out roll-in See swapping.
needless complications. The MACHINE CODE
of programs for RISC processors tends to ROM /rom/ (read-only memory) A type
be longer and more complex, because op- of SEMICONDUCTOR MEMORY that is fabri-
erations that are intrinsic to CISC proces- cated in a similar way to RAM but whose
sors must be performed as a series of contents are fixed during manufacture and
smaller operations. Elements of the RISC cannot therefore be modified. The contents
philosophy have been incorporated into can only be read. As with RAM, ROM is
modern CISC chips, which often work as composed of an array of cells, each of
RISC devices internally through MICROPRO- which can be identified uniquely by its po-
GRAMS. PowerPC chips are the most widely sition in the array. There is thus direct and
used RISC-based chips in computers. extremely rapid access to any cell in ROM,
i.e. there is RANDOM ACCESS to any of the
RMON /ar-mon/ (remote monitoring) A storage locations. Since the contents can-
network management protocol that allows not be altered, ROM is NONVOLATILE MEM-
a single workstation to gather network in- ORY. See also PROM; EPROM.
formation (e.g. usage statistics). The
routers, hubs and switches, and other de- ROM cartridge (ROM pack) A mod-
vices must support RMON for this to ule containing software that is perma-
work. nently stored as ROM. The module can
easily be plugged into and later removed
robot /roh-bot/ A programmable device from a computer, games console, etc. with-
that has been engineered to perform many out the integrated circuitry being handled.
simple repetitive tasks formerly done by
human labor. It consists of one or more ar- root directory The main directory in a
ticulated mechanical manipulators, typi- HIERARCHICAL FILE SYSTEM. It is the direc-
cally an arm and hand, that are linked to a tory that includes all other directories.
computer and have considerable freedom
of movement. In more advanced types ROT-13 /rot th’er-teen/ The encryption
there is also some form of sensory mecha- of a message by exchanging each of the let-
nism, such as a TV camera acting as an ar- ters in the first half of the alphabet with the
tificial eye. Most robots in current corresponding letters in the second half.
industrial use follow a fixed sequence of in- Thus A becomes N, B becomes O and so
structions but can be reprogrammed to on. Other characters are not changed.
carry out another task. They have little if ROT-13 is sometimes used to conceal sen-
any sensory capability. They are designed sitive parts of on-line documents, for ex-
to be flexible and transportable and can be ample offensive words, the ending of a
used, for example, for loading and unload- movie or book, etc.
ing machines, positioning and transferring
parts, and welding pieces of metal or plas- rotate See shift.
tic.
rounding The process applied to a num-
robustness A measure of the ability of a ber whereby its length is reduced to a spec-
system – hardware or software – to recover ified number of significant digits, the
from conditions caused by ERRORS. The er- nearest approximation to its true value
rors may be external to the system or may being taken. For example, rounding the
occur within the system itself. The system number 3.257 69 to 5, to 4, and to 3 digits
can be described as robust or possibly yields 3.2577, 3.258, and 3.26. The REGIS-

194
running head

TERS in a computer can hold only a fixed or between a computer and a printer or
number of binary digits (bits). When the re- some other peripheral device. Although su-
sult of an arithmetic operation requires perseded by the USB interface, RS232C
more than this fixed number of bits, either ports are still supplied as standard on most
rounding or TRUNCATION will take place. PCs.
Since the rounded value is an approxima-
tion to the true value of the number, a RSS (Really Simple Syndication; RDF site
rounding error is introduced; on average summary; Rich Site Summary) Several
this is less than the truncation error. Re- widely-used formats for WEB FEEDS. They
peated rounding can cause a build-up of use XML to provide a standardized concise
such errors and the programmer should try summary of an item on a Web site and a
to minimize this problem. link to the full item. RSS originated in 1999
and has since split into two incompatible
router /rowt-er, root-er/ A hardware de- series of formats; however, most RSS-
vice that routes data from a LAN to a tele- aware software can understand both of
phone line or another connection that them.
leads to another network. It also handles
errors and gathers network statistics. A RTF (rich text format) A file format for
router is connected to at least two net- saving word-processor files in ASCII form
works and decides which way to send each with additional information that retains
information packet according to its ‘under- the formatting, font information, color,
standing’ of the current state of those net-
etc., of the original document. RTF files are
works. Routers will only allow authorized
often used for transferring files between
machines to send data through a LAN so
different word-processing applications.
that private information is kept secure.
They have the file extension rtf.
routine /roo-teen/ A subroutine (in as-
RTS (request to send) A hardware signal
sembly language) or procedure or function
that is often used in serial communications
(in high-level language); the term is usually
and sent over an RS-232 connection re-
used in combinations, as in input routine,
recursive routine, diagnostic routine. questing permission to transmit to a de-
vice.
RP See reverse Polish.
rubber banding In computer graphics,
RPC See remote procedure call. the action of grabbing a point on an an-
chored line of a graphics object and pulling
RS-422, 423, 449 The standards adopted it to a new position to change the shape of
for serial communications over distances the object.
greater than 50 feet. RS-449 incorporates
RS-422 and RS-423. rule-based system See expert system.

RSA (Rivest-Shamir-Adleman) The most run 1. To execute a program, i.e. to


commonly used Internet encryption and carry out the program instructions. A pro-
authentication system. It is a PUBLIC-KEY gram or part of a program that is cur-
ENCRYPTION system developed in 1977 by rently being executed by the processor (or
Ronald Rivest, Adi Shamir, and Leonard processors) is said to be running or active.
Adleman. Only one program or program section can
be running at any one instant on a proces-
RS232C interface An INTERFACE devel- sor.
oped by the Electronic Industries Associa- 2. The act of executing a program, a set of
tion (EIA) in the USA. It can be used for programs, or some part of a program.
making the connection between two com-
puters, between a computer and a MODEM, running head A portion of text that ap-

195
run time

pears in the top margin of each page of a too small to be stored – it would be re-
document. See also header. placed by zero.

run time The period of time during run-time system A collection of PROCE-
which a program is actually being exe- DURES that support programs derived from
cuted, or the time taken for execution. It a high-level language at RUN-TIME, provid-
does not include the time during which the ing services such as STORAGE ALLOCATION,
program is loaded, or is compiled or as- INPUT/OUTPUT, DEBUGGING, etc., but are not
sembled. actually a part of the program code as
stored on disk. This avoids storing large
run-time error (execution error) An
numbers of copies of commonly used pro-
ERROR detected at RUN TIME. The error may
be fatal, in which case execution is termi- cedures, and allows new versions of them
nated; a fatal error would result, for in- to be installed without the need to recom-
stance, from an attempt to divide by zero pile all the programs that might use them.
or read past the end of a file. Alternatively In computer systems where a number of
the error may be nonfatal, in which case a high-level languages are supplied by a com-
warning is generated and execution contin- mon manufacturer, it is often possible for a
ues; a nonfatal error would result, say, single run-time system to service programs
from an attempt to calculate a real number written in any of these languages.

196
S

sampling A process by which the value clines unacceptably as users increase is said
of an analog (i.e. continuous) signal is ‘ex- to be not scalable or to scale badly. It is im-
amined’ at distinct intervals of time. The portant that such types of software as OP-
sampled values can, for example, be con- ERATING SYSTEMS, DATABASE MANAGEMENT
verted into a digital form using an A/D CON- SYSTEMS, and WEB SERVERS scale well. The
VERTER for subsequent processing by a term is also applied to other aspects of
computer. computing, for example hardware.
2. Denoting something that is designed to
SAN See storage area network. work equally well at more than one size.
For example, OUTLINE FONTS and vector
SATA (S-ATA) See Serial ATA. graphics are scaleable, whereas BITMAPPED
FONTS and raster graphics are not.
satellite computer A computer that is
attached to another computer by a com- scalable font Any font that can be
munications link and is controlled by the scaled to produce characters of different
main computer. sizes without any loss in quality. See also
outline font.
save To write data to a storage medium.
Scalable Link Interface See SLI.
SAX (Simple API for XML) A de facto
standard for software that processes an scale See scalable.
XML file in discreet units, contrasted with
software that constructs a representation scanner A device for capturing diagrams
of the whole file in the computer’s memory and photographs and converting them into
before beginning processing. SAX-based electrical signals, so that the image can be
programs are generally faster and use less stored in digital form. Scanners are also
memory but cannot perform some com- used as optical character readers. For very
plex types of processing. SAX was first re- high-quality work, as in the reproduction
leased in 1998 and the current version is of photographs for book and magazine
version 2 (SAX2). printing, drum scanners are used. In these
the image to be scanned is wrapped around
scalable 1. Denoting something that a cylindrical drum. FLATBED SCANNERS are
works as well at large sizes as it does at suitable for many applications, and HAND-
small sizes. A piece of software, for exam- HELD SCANNERS are also in use.
ple, will generally run very efficiently if it
only has a small number of simultaneous scheduling The method by which the
users. Software that can handle an unpre- use of a PROCESSOR is controlled, i.e. by
dictably large number of simultaneous which time on the processor is allocated.
users with a minimal decline in perfor- Scheduling is necessary in a system where
mance is said to be scalable, to scale well, the processor has to be shared between a
or simply to scale. Any software that either number of programs; this occurs for exam-
has a fixed, and relatively small, maximum ple in a MULTITASKING system. The choice
number of users or whose performance de- of which processing activity should be

197
schema

granted access to the processor, and can a variable or other element is normally in-
safely be granted access, is determined by dicated by the positioning of or a qualifica-
the scheduling algorithm. This is designed tion within its DECLARATION.
to ensure that the computer is used as effi-
ciently as possible. scrapbook A Macintosh file used to
hold text and graphics images for later use.
schema 1. In XML, a file that defines the See also clipboard.
structure of a document or a set of similar
documents. It details such matters as which scratchpad A temporary storage area in
ELEMENTS are allowed in the document, in a computer.
what order they must appear, how many of
each type can be used together, what type screen The front surface of a VDU or
of data they can contain (STRING, INTEGER, monitor on which computer text or graph-
FLOATING-POINT NUMBER, etc.). Documents ics can be displayed. See display.
that are correctly structured are said to
conform to their schema, and schemas can screen dump A way of transferring the
be used to create software that will cor- entire graphical or textual contents of a
rectly process any conforming document. VDU screen to a printer or to a raster
Schemas thus perform the same role as graphics file. See also dump; print screen
DTDS but in a more sophisticated and flexi- key.
ble way, and they use normal XML syntax
rather than the special syntax (inherited screen editor See text editor.
from SGML) used by DTDs. However, there
are currently several varieties of schema screen saver A utility program that dis-
whereas the syntax for DTDs is standard- plays a moving image on the screen after a
ized. set time interval if no keyboard or mouse
2. Any abstract model that describes the actions have been performed. On older
structure of data, operation of hardware or monitors this stopped the possibility of a
software, etc. permanent static image being burned onto
the screen. Modern monitors do not suffer
Schottky TTL /shot-kee/ See TTL. from this problem.

scientific notation A method of repre- screen turtle See turtle graphics.


senting real (floating-point) numbers that
is much simpler for very large or very small script See scripting language.
numbers. Instead of writing the full num-
ber, scientific notation shows values as a scripting language A language that al-
number between 1 and 10, multiplied by lows the user to execute a sequence of op-
10 to some power where the 10 is usually erations automatically that would
replaced by E. For example, 1.234E6 is normally be invoked individually, by spec-
equivalent to 1 234 000 and –1.234E–6 is ifying them in a text file called a script. For
equivalent to –0.000 001 234. example, COMMAND LANGUAGES are script-
ing languages by which users can automate
scope The range of program code over a series of commands to the operating sys-
which a VARIABLE or some other element of tem. Applications, such as word proces-
a program is defined. The element can be sors, spreadsheets, etc., often have their
described as local, nonlocal, or global. A own scripting languages. As well as speci-
local element is accessible only in a re- fying operations, scripting languages usu-
stricted part of the program, typically in a ally contain features of programming
PROCEDURE or FUNCTION. By contrast, non- languages, such as CONTROL STRUCTURES,
local elements are accessible in a wider VARIABLES, and ARITHMETIC and LOGIC OP-
scope and global elements are accessible ERATIONS, that allow sophisticated pro-
from all parts of the program. The scope of grams to be written with them.

198
searching

scroll To move the information dis- on data being predominantly transferred in


played on a screen or in a window in a one direction. See also VDSL.
vertical or horizontal direction. As infor-
mation disappears at one edge of the win- search engine An ENGINE that searches
dow, new information can become visible for specified data in a file or database. The
at the other edge or alternatively space is term is used particularly of Internet search
provided for the entry of new data. engines. Large Web sites usually have their
own search engine, which allows the user
scroll bar A horizontal or vertical bar to search the whole site for documents con-
shown at the bottom or side of a display taining certain key words. More generally,
area, such as a window, containing con- a number of search engines exist that allow
trols that can be used to SCROLL the text or the user to find Web pages on any topic
image in the area. and have become important Web sites in
their own right. Examples of these are
SCSI /skuz-ee/ (small computer systems in- Google, Yahoo!, AltaVista, Lycos, and Ex-
terface) A standard high-speed parallel cite. They actually search the World Wide
interface used to attach such devices as Web (and also FTP archives, Gopher lists,
hard disks, scanners, and CD writers to a etc.) using a CRAWLER (spider) program to
PC. Up to 15 devices can be connected to a accumulate a very large index of Web
SCSI interface. There are several different pages, etc., by key word. When a user uses
SCSIs available giving different perfor- such a search engine, he or she is not
mance levels; the fastest supports data- searching the Web but rather the index that
transport speeds of 320 Mbps. There are the provider has generated.
now versions of SCSI that operate over se-
rial links and TCP/IP networks. searching The process of locating infor-
mation held in a FILE. In the case of data
SDLC (synchronous data link con- files or database TABLES this is done by ref-
trol) The communications protocol used erence to a particular field of each RECORD
by a network conforming to the IBM sys- in the file or table. This field holds a key by
tems network architecture (SNA). which the record can be identified. The
goal of the search is to discover all records
SDRAM /ess-dram/ (synchronous dy- (if any) with a given key value. Many dif-
namic RAM) A type of DYNAMIC RAM that ferent ALGORITHMS can be used for search-
operates synchronously, i.e. its activities ing.
are coordinated with those of the rest of The most simple search is a sequential
the system by the CLOCK. This synchroni- search, in which the keys in the file or table
zation enables it to use features that make are searched sequentially from beginning
it much faster than (asynchronous) to end and records with matching keys ex-
DRAM. DDR SDRAM (Double Data tracted. (If each record has a unique key,
Rate SDRAM) and its successor, DDR2 the search can stop at the first match.) In a
SDRAM, are faster still, the latter typically binary search the records in the file or table
running at over 400 MHz. must be arranged with their keys in as-
cending order. The middle key is examined
SDSL (symmetric digital subscriber line) and, depending on whether this is less than
A variant of DSL technology that transfers or greater than the sought-for key, the top
data at high speed over an ordinary copper or bottom part of the file or table is exam-
telephone wire. Unlike ADSL it uses the ined. Again the middle key is checked
same speed in both directions – up to 2.3 against the desired key, and a smaller sec-
Mbps, which is between the two speeds tion – top or bottom – is indicated and re-
employed by ADSL – and cannot share the examined. The process continues until the
wire with a telephone. It is suitable for desired records are found or their absence
businesses and other organizations requir- discovered. Other searching algorithms use
ing high-speed data links that do not rely HASHING or various types of INDEX.

199
secondary store

When a record is to be inserted in a track: each sector has a unique ADDRESS


table or file, with its own unique key, then that contains the track location and sector
a search must first be made to ensure that number. The disk is divided into sectors
no existing record has the new key. prior to any recording of data; the disk
For unstructured data, e.g. text, the op- may be hard-sectored, in which case the
tions are more limited. Either a full-text sector positions are set at the time of man-
index can be used, which indexes the posi- ufacture, or soft-sectored, when sector
tion of every word in the file, or else the file lengths and positions are set by control in-
must be searched sequentially from the be- formation written on the disk by computer
ginning. program. Once divided into sectors, the
address plus other control information can
secondary store See backing store. be added to each one. This initial prepara-
tion of a disk is known as formatting.
second generation computers Com-
puters designed in the mid- and late 1950s security Prevention of or protection
and early 1960s, i.e. after the FIRST GENER- against (a) access to information by unau-
ATION, and characterized in particular by thorized recipients or (b) intentional but
the increasing use of discrete TRANSISTORS unauthorized alteration or destruction of
in addition to valves in their electronic cir- that information. The measures taken to
cuitry. A wider range of INPUT/OUTPUT provide security in a computer system in-
equipment became available in the period, clude the use of PASSWORDS when logging
together with higher performance MAG- on and the classifying of information in
NETIC TAPE and the first forms of on-line order to restrict the users who can access it.
storage – MAGNETIC DRUMS and early MAG- The security provided may guard against
NETIC DISKS. Magnetic CORE STORE was in- accidental access to sensitive information
troduced for main store. Initial efforts were as well as deliberate access attempts. See
made at HIGH-LEVEL programming lan- also firewall; integrity; privacy.
guages, the earliest versions of FORTRAN,
for example, being issued in 1956 and seek time See access time.
1958.
During the 1950s several companies, select To choose certain data, which be-
including IBM, had become active in devel- comes the target for formatting or content
oping computer systems and peripherals. changes until it is deselected. Selection is
In the late 1950s IBM designed and built a often accomplished using a mouse; for ex-
monster computer, called Stretch, which ample, in word-processing applications
had very advanced hardware. It became dragging the mouse across text selects that
available commercially in 1961 as the IBM text. Selected data is usually HIGHLIGHTED.
7030. The IBM 1401 (1959) and 1410
(1960) included early on-line disk storage. self-extracting file An executable file
Another important machine designed in that contains one or more compressed files.
this period was Atlas, which incorporated When the file is run, the compressed files
many features now considered standard. are uncompressed and stored on the user’s
Its design was begun in 1956 by T. Kilburn hard drive. Self-extracting files are a com-
at the University of Manchester and it be- mon way of downloading programs from
came commercially available, from Fer- the Internet.
ranti Ltd., in 1963.
See also third, fourth, fifth generation self-test A set of diagnostic tests per-
computers. formed by a device on itself. For example,
most printers have a self-test option avail-
sector A subdivision of a track on a able, which will print a test page.
MAGNETIC DISK. The computer records data
on a disk one sector at a time. The sector is semantics /sĕ-man-tiks/ Part of the de-
thus the smallest addressable portion of the scription of a PROGRAMMING LANGUAGE,

200
server

concerned with specifying the meaning of sequential flow See control structure.
various constructs – STATEMENTS, CONTROL
STRUCTURES, etc. These constructs must serial access (sequential access) A
conform to the SYNTAX, or grammar, of the method of retrieval or storage of data that
language; if they do not then they are must be used for example with magnetic
meaningless. Most programming lan- tape. Blocks of data are read from the stor-
guages have their semantics defined by de- age medium in the actual order in which
scriptions in English or some other natural they occur until the required item or stor-
language. Because natural language is im- age location is found. The ACCESS TIME thus
precise and hence ambiguous, different in- depends on the location of the item. Com-
terpretations of the semantics are possible pare random access.
in the early stages of development of a lan-
guage. Serial ATA (SATA; S-ATA) A develop-
ment of and the successor to the ATA disk
semiconductor memory /sem-ee-kŏn- INTERFACE standard. Developed in the early
duk-ter/ (solid-state memory) Any of var- 2000s and a formal specification since
ious types of compact memory composed 2003, it offers greater data-transfer speeds
of one or more INTEGRATED CIRCUITS fabri- by using a serial rather than a parallel BUS
cated in semiconductor material, usually and is now used in most new PCs.
silicon. The integrated circuit is composed
of an array of microscopic electronic de- serial port An interface used for SERIAL
vices, each of which can store one bit of TRANSMISSION. When used of microcom-
data – either a binary 1 or a binary 0. puters, the term denotes an RS232C INTER-
There may be millions of these storage lo- FACE, not a USB interface.
cations within a single integrated circuit
measuring only a few square millimeters in serial printer A printer that connects to
area. Data can be accessed extremely a SERIAL PORT on a computer. Formerly
rapidly from these locations. standard on Macintoshes and sometimes
The categories of semiconductor mem- used on PCs, they are being superseded by
ory include RAM (which is read/write mem- printers that connect to a USB port.
ory), ROM (read-only memory), PROM
(programmable ROM), and EPROM serial transmission A method of send-
(erasable PROM). There is RANDOM ACCESS ing data between devices, typically a com-
to all these types of semiconductor mem- puter and its peripherals, in which the
ory. Semiconductor RAM has been used to individual BITS making up a unit of data
build the MAIN STORE in computers since (e.g. a character) are transmitted one after
the early 1970s. another along the same path. For ex-
ample, if two devices wish to communicate
sentinel See flag. an 8-bit unit of data, the sending device
will transmit the 8 bits in sequence (per-
separator A symbol that separates haps with a start bit preceding them and a
STATEMENTS in a program. The symbol stop bit following to aid synchronization).
used depends on the programming lan- The receiving device can then reassemble
guage. A semicolon is the separator in sev- the stream of bits into the original 8-bit
eral languages, including Pascal: unit. See also parallel transmission; hand-
begin read (x); y := x*x; write (x,y) end shake.
Note that the final statement needs no
semicolon. Compare terminator. server A program that provides services
to other programs, called clients. Usually a
sequential access /si-kwen-shăl/ See ser- server and its clients run on different com-
ial access; file. puters attached to a network. There are
many types of server. For example, a file
sequential file See file. server – the original type of server – allows

201
server-based application

clients to access its computer’s hard disks stock market prices) and/or user selection
and read or store files; a database server of content (e.g. online shopping). See also
runs a DBMS and handles requests from ASP; PHP.
clients to query the database, update its
contents, etc.; a mail server implements an session A recording made on a CD-R or
e-mail system for the network, usually with CD-RW at a particular time. The session
an external connection to the Internet; and has lead-in and lead-out information on
so on. The computer running a server pro- the CD. Multisession recordings can be
gram is often dedicated, i.e. it does nothing made on a single CD at different times, one
else. It is called the host, the server com- session following on from another.
puter, or, simply, the server.
Session Initiation Protocol See SIP.
server-based application An applica-
tion program that is installed on a server set-top box See Web TV.
and is shared over a network.
seven-segment display A simple dis-
server-side scripting A technology that play in which the numbers 0–9 and some
allows the content of WEB PAGES to be var- letters can be formed from a group of seven
ied each time they are accessed. It operates segments (see diagram). The segments can
on the Web server rather than the user’s be individually darkened or illuminated to
machine (compare dynamic HTML). A form the different characters. The figure
normal (or static) Web page is written in eight for instance uses all seven segments;
HTML and must be edited to change its con- the figure one uses only two segments. See
tent or appearance. Server-side scripting also LCD; LED display.
embeds fragments of program written in a
SCRIPTING LANGUAGE in the Web page; SGML (standard generalized markup lan-
when processed by the Web server, this guage) A METALANGUAGE used to define
program produces HTML that varies in re- MARKUP LANGUAGES adopted by the Inter-
sponse to choices made by the user or to national Organization for Standardization
changing external data. Such pages are (ISO) in 1986 that allows documents to be
known as dynamic Web pages and are independent of any particular application.
widely used for any purpose that requires The text in such a document has ‘tags’
either up-to-date information (e.g. current defining the type of information. For ex-

Characters in a seven-segment display

202
shift instruction

ample, in this book the basic text is tagged that provides a COMMAND-LINE INTERFACE.
as follows Some operating systems, in particular
UNIX, have a choice of shells.
<en><hw>SGML</hw>
<vg>(<var>standard generalized shift 1. A concerted movement of some
markup language</var>)</vg> or all of the bits held in a storage location
<def>A form of…</def></en> in a specified direction, i.e. to the left or to
the right. Shifts are performed in SHIFT REG-
Here <en> and </en> enclose the whole ISTERS. A left (or right) shift of, say, 3 bits
entry; <hw> and </hw> enclose the head- means that 3 bits are removed from the left
word; and <def> and </def> enclose the de- (or right) end of the register. The bits are
finition. Also <vg> and </vg> denote a said to be shifted left, right, out, etc.
group of variant‘s of the headword. In this There are three kinds of shift. In a logi-
case there is only one variant, which is cal shift the bits shifted from the end of the
tagged using <var> and </var>. Note that register are lost, and 0s are shifted in at the
the tagging is for information content opposite end. In a circular shift (or rotate)
rather than typeface, although often tags the bits shifted from the end are reinserted
such as <b> and <i> are used for bold and at the opposite end, in the order in which
italic type. Another feature of SGML is the they were shifted out. In an arithmetic shift
use of ASCII characters only. Nonstandard the bit pattern is regarded as representing a
characters are represented by strings, as in binary integer, and only the bits represent-
&eacute; for acute e (é), &aacute; for acute ing the magnitude of the number are
a (á), &deg; for degree sign (°), and so on. moved; this preserves the positive or nega-
The rules for SGML are quite complex. A tive sign (see complement). If the bits
particular feature, which makes the data shifted out are all zero, a left shift of n bits
portable, is the use of a document type de- is equivalent to multiplying by 2n and a
finition (DTD), defining the way the tags right shift of n bits is equivalent to integer
are used in a document or class of docu- division by 2n.
ments. For example, HTML is defined in The effects of different kinds of 3-bit
SGML with a DTD detailing the structure shift on the same 8-bit word are shown in
of Web pages. See also XML. the table; the left arithmetic shift is equiva-
lent to multiplication by 23 (i.e. 8), the
SGN See Basic. right arithmetic shift to division by 23.
2. On a keyboard, a movement with a SHIFT
share See shared folder. KEY.

shared folder (share) The term used for shift instruction A MACHINE INSTRUC-
a NETWORK DIRECTORY on Windows- and TION specifying that the contents of a SHIFT
Macintosh-based networks. REGISTER are to be shifted either to the left
or to the right by a specified number of po-
shareware /shair-wair/ Software that is
available for use for a trial period, after
which a decision is taken not to use it or it original word 00010111
must be registered and paid for. Shareware
logical left 10111000
programs are less expensive than commer-
logical right 00000010
cial software but may be more error-prone
and not supported. circular left 10111000
circular right 11100010
sheet-fed scanner A SCANNER with a
single-sheet feeding mechanism that can arithmetic left 10111000
automatically scan multipage documents. arithmetic right 00000010

shell The part of an operating system Effects of different 3-bit shifts on an 8-bit word

203
shift key

sitions. The bits that are introduced as re- signature 1. A set of bytes that can be
placements at the opposite end of the regis- used to identify a virus.
ter depend on the kind of SHIFT. In the case 2. A set of characters used for identifica-
of a circular shift, the bits shifted off one tion.
end of the register are reintroduced at the
other end. With a logical shift and an arith- sign bit A single bit used to represent the
metic shift, zeros are introduced and the sign of a number; normally 0 represents +
bits shifted out are often discarded. (plus) and 1 represents – (minus). See com-
plement; sign-magnitude notation.
shift key A keyboard key that when de-
pressed at the same time as another key ei- significant digits (significant figures)
The digits in a number that make a contri-
ther gives an upper-case letter or the
bution to the value of that number. The
character marked on the upper part of the
number 0.1234 has four significant digits:
second key. The shift key is also used in
the zero does not contribute to its value.
combination with other keys to perform The number of significant digits can be re-
special functions. duced by TRUNCATION or ROUNDING.
shift register A REGISTER in which SHIFTS sign-magnitude notation A notation
are performed. that can be used to represent positive and
negative integers in a computer. Normally
Shockwave /shok-wayv/ A technology the leftmost bit in a WORD is used to denote
developed by Macromedia that enables the sign (0 for +, 1 for –) and the remaining
Web pages to include multimedia objects. bits are used to represent the magnitude of
In order to see a Shockwave object with a the integer; the leftmost bit is called the
Web browser a plug-in is usually needed, sign bit. It is more usual, however, for a
which is freely available on the Internet. computer to use two’s complement nota-
tion to represent signed integers. See com-
shortcut key See accelerator key. plement.

short filename See long filename. sign off See log off.

signal A means of conveying data sign on See log on.


through, say, an electric circuit, a com-
puter, or a communications system. A sig- Silicon Valley A nickname for an area
nal is usually a sequence of values of an of west California, south of San Francisco,
electric voltage recorded against time. The that contains an unusually high proportion
value – the amplitude – varies either con- of computer companies.
tinuously or discretely (i.e. in steps). It is
the amplitude that represents the data: the
SIMM /sim/ (single in-line memory mod-
ule) A small slim circuit board contain-
data can therefore be represented in dis-
ing surface-mounted memory chips, used
crete form (e.g. as integers) or in continu-
as an extension to main store. SIMMS have
ous form (as ‘real’ numbers). The now largely been superseded by DIMMS.
amplitude can be recorded or displayed
over a continuous period of time or it can simple mail transfer protocol See
be sampled, i.e. examined at discrete inter- SMTP.
vals. Discrete representations of both am-
plitude (i.e. data) and time are required by simple network management protocol
DIGITAL COMPUTERS. ANALOG COMPUTERS See SNMP.
employ continuous representations. See
also digital signal; digitized signal; analog simplex transmission /sim-pleks/ One-
signal. way transmission of data between two

204
SMTP

endpoints. There is no possibility of data A technology for linking two graphics


traveling in the opposite direction. Simplex cards (see expansion card) so they the act
transmission could be used to drive an out- like one double-speed card. SLI was intro-
put device such as a printer when it is duced in 2004 by NVIDIA Corporation.
known that the output device is faster than
the transmission line and can therefore al- SLIP /slip/ (serial line Internet protocol)
ways keep up. Compare half-duplex trans- The older protocol, now replaced by PPP,
mission; duplex transmission. for the transmission of TCP/IP data pack-
ets over serial communication lines.
simulation /sim-yŭ-lay-shŏn/ The imita-
tion of the behavior of a system, or of some small computer systems interface See
aspect of that behavior, by another system. SCSI.
The imitation may be in the form of a
model, possibly quite abstract, that can be Smalltalk /smawl-tawk/ An object-ori-
manipulated by a computer. Again, the im- ented language that was developed by
itation may be achieved by a device under Xerox Palo Alto Research Center (PARC)
the control of a computer and often em- in the 1970s. Many of the ideas used are
ploying components from the system being now incorporated in other programming
simulated – such as the controls in the languages. See also object-oriented pro-
flight deck of an aircraft. Any computer de- gramming.
vice or program that performs a simulation
is called a simulator. smart card A plastic credit card that
Simulation is widely used as a design contains a microprocessor and memory. It
aid for both large and small computer sys- offers greater security and can be interro-
tems and for computer networks. It can gated by automatic cash machines.
also be used for more specific purposes, for
example in weather forecasting to predict smart terminal See terminal.
likely developments in the weather pattern.
Simulators are extensively used in the SMDS (switched multimegabit data ser-
training of airline pilots, military comman- vices) An extremely high-speed connec-
ders, etc. Simulation is an important appli- tionless packet-switched data-transport
cation of digital computers and is also the service that connects LANs and WANs.
major application of ANALOG COMPUTERS.
Compare emulation. smiley /smÿ-lee/ See emoticon.

single in-line memory module See smoothing /smooth-ing/ The removal of


SIMM. JAGGIES from a curved line to make the line
look smoother. See also anti-aliasing.
single precision See precision.
SMP (symmetric multiprocessing) A
SIP (Session Initiation Protocol) A pro- computer architecture that provides fast
tocol, defined in RFC 2543 (1999) and processing by using multiple CPUs sharing
RFC 3261 (2002), for initiating and con- the same memory to complete individual
trolling an exchange of data over the Inter- processes in parallel (multiprocessing). An
net. It is particularly used to provide VOIP idle processor can be allocated any task
services and is becoming the de facto stan- and more CPUs can be added to improve
dard protocol for this purpose. performance. UNIX and Windows both
support SMP.
sleep Of a computer, to run on low
power with all activity suspended until re- SMT See surface-mount technology.
quired.
SMTP (simple mail transfer protocol) A
SLI (Scalable Link Interface) Trademark protocol for sending e-mail messages be-

205
SNMP

tween servers. An e-mail client can then re- can be run on a computer system, as dis-
trieve the messages using POP or IMAP. tinct from the physical components – the
HARDWARE – of that computer system.
SNMP (simple network management pro- There are two basic forms: SYSTEMS SOFT-
tocol) A TCP/IP protocol. Hardware or WARE and APPLICATIONS programs. Systems
software SNMP agents can monitor net- software, which includes the OPERATING
work device activity and report to a work- SYSTEM, is an essential accompaniment to
station. the hardware in providing an effective
overall computer system; it is thus nor-
snowflake curve See fractal. mally supplied by the computer manufac-
turer. The applications programs relate to
SOAP A protocol that uses XML and the role that the computer system plays
HTTP to send REMOTE PROCEDURE CALLS and within a given organization. The DOCU-
other structured communications between MENTATION associated with all these pro-
programs running on different computers grams is also considered part of the
linked by the Internet. It was initially de- software.
signed in 1998 with support from Mi-
crosoft and is now controlled by the W3C. software engineering The entire range
SOAP initially stood for ‘Simple Object of activities involved in the design and
Access Protocol’, but this meaning has development of software. The aim is to
been dropped. produce programs that are reliable and ef-
ficient by following standards of quality
soft font A FONT where the instructions and adhering to specifications, as is done in
that define the shape of each character are other engineering disciplines.
held as data, separate from the software
and hardware in a VDU, printer, etc., and software house A commercial organi-
are used to interpret the font data and ren- zation whose main business is to produce
der the character. Soft fonts may be held in software or assist in the production of soft-
the ROM of a particular output device, but ware. Software houses may offer a range of
they are more often stored as data files in a services, including consultancy, the hiring
computer’s backing store. In the latter case out of suitably qualified personnel to work
the same data is used to create the font on within a client’s team, and a complete sys-
each output device, ensuring compatible tem design and development service.
results. See also downloadable font.
software interrupt See interrupt.
soft keyboard A KEYBOARD in which the
meaning of each key, i.e. the code to be software package See application pack-
generated by each key, can be allocated age.
and possibly changed by program control.
Generally, not all the keys are ‘soft’; some software piracy See piracy.
are permanently wired so that they have a
fixed meaning. software tool One of a set of programs
that are used in the development, repair, or
soft return A line break inserted in a enhancement of other programs or of the
document by a word processor or text edi- computer’s hardware. All the programs in
tor to prevent a line exceeding the maxi- the tool set have a common mode of use
mum length allowed. The positions of soft and employ files and other facilities in a
returns are adjusted automatically as the well-defined standard way. A typical set of
text is edited. tools might consist of a TEXT EDITOR, COM-
PILER, LINK EDITOR, and some form of
soft-sectored disk See sector. DEBUG TOOL. See program.

software /sôft-wair/ The programs that SOHO /soh-hoh/ (small office home of-

206
speech recognition

fice) The market for computers and soft- source program A program that is
ware composed of home computer users written by a programmer in a PROGRAM-
and small businesses. MING LANGUAGE, but cannot be executed
directly by a computer. It must first be con-
solid-state memory See semiconductor verted into a suitable form by a specialized
memory. program. This program may be a COM-
PILER, INTERPRETER, or ASSEMBLER. See also
sorting The process of rearranging in- object module; high-level language.
formation into a desired order. This is
achieved by means of sort keys that are as- space character A member of a CHAR-
sociated with each RECORD of information. ACTER SET that is usually represented by a
Sorting is achieved by comparing sort keys blank site on a screen, printout, etc. It
and rearranging the records accordingly. causes the print or display position to move
The sort keys are derived from the values forward by one position without produc-
stored in the fields of the records in such a ing any mark. Within the computer a space
way that by ordering the sort keys in as- is treated in exactly the same way as any
cending or descending sequence, the asso- other character.
ciated records will be placed in the desired
order. For instance, if the sort key were to spam /spam/ Junk mail on the Internet.
be derived from date of birth and surname, The volume of spam has increased hugely
then the result of a sort would be to place in recent years. While such countermea-
the records in order of age, with those born sures as KILL FILES used to be adequate, to-
on the same day in alphabetical order.
day’s avalanche of spam requires more
There are many methods of sorting. For
sophisticated solutions and anti-spam fil-
example, in the straight insertion sort each
ters are now a standard part of e-mail sys-
sort key in a collection of records is
tems.
checked in turn, and the record associated
with the key is repositioned (if necessary)
special character A symbol in a CHAR-
with respect to all previous sort keys. In a
ACTER SET that is a GRAPHIC CHARACTER but
bubble sort a pair of records is inter-
is not a letter, nor a digit, nor (usually) a
changed if their sort keys are not in the cor-
SPACE CHARACTER. Punctuation marks,
rect order, different pairs being checked on
different passes through the collection of brackets, and arithmetic symbols are spe-
records. This continues until no further in- cial characters. The special characters on
terchanges are necessary. the keyboard vary from one country to an-
other, and would include, for instance, the
sort key See sorting. national currency symbol. Compare al-
phanumeric character; control character.
SoundBlaster /sownd-blass-ter/ A range
of sound cards manufactured by Creative specification /spess-ă-fă-kay-shŏn/ See
Technology and its subsidiaries; it has be- system specification.
come the de facto standard.
speech generation device A means of
sound card An expansion board giving producing spoken messages in response to
the capability of playing sound from CDs, signals from a data processing or control
DVDs, MIDI files, or other sound files. system. The selection of messages are pro-
duced by assembling speech sounds from a
source code See source language. set of fundamental sounds that may be ar-
tificial in origin or may have been extracted
source language The programming by processing human speech.
language in which a SOURCE PROGRAM is
written. The program is in the form of speech recognition The process whereby
source code. a computer interprets spoken words in

207
speech synthesis

order to determine their data content. See on to the array of cells; if there are more
also voice input device. rows and columns than will fit on the
screen, then the spreadsheet can be scrolled
speech synthesis The production of ar- horizontally or vertically to bring into view
tificial speech by a computer, usually from previously hidden rows or columns. To
textual input. The technique involves stor- change a value it is only necessary to move
ing prerecorded words or sounds, or artifi- the CURSOR into the required cell displayed
cially generated versions of such sounds, on the screen and type in the new value.
and using software that analyzes text and Spreadsheets can be used for storing
joins the sounds together for output. and amending accounts, ‘what if?’ finan-
cial projections, and many other applica-
speech understanding The process of tions involving tables with interdependent
using SPEECH RECOGNITION in order to per- rows and columns. A spreadsheet is often a
form some task making use of speech, such component of an INTEGRATED OFFICE SYS-
as voice input. TEM.

spider See crawler. sprite /sprÿt/ A small animated image on


a computer screen. Sprites are often used in
spool To transfer information intended computer games.
for a slow peripheral device into an inter-
mediate store on magnetic disk. This spyware A piece of software that sub-
process of spooling allows information to verts the operation of a computer in some
be sent to the peripheral (such as a printer) way, usually by sending unauthorized in-
at a more convenient time: programs that formation to a third party over the Inter-
produce printed output can then run even net. This may be a record of Web sites
when the printer is busy or unavailable. visited, the user’s personal details, or even
Without spooling, the program would a complete record of all keys typed; it is
have to slow down so that its speed used for purposes ranging from marketing
matched that of the slow peripheral. For- to fraud. Spyware is usually concealed in
merly this was undesirable because it Web pages or software downloaded from
wasted valuable processor time; today, in the Internet. It has become a significant se-
an age of cheap interactive computing, it curity risk to Internet users and several
would waste the user’s time. programs have been developed to detect
and remove it. See also adware; malware.
spreadsheet /spred-sheet/ (spreadsheet
program) A program that manipulates SQL (structured query language) A stan-
tables consisting of rows and columns of dardized programming language provided
cells, and displays them on a screen. The in a database management system to en-
cells contain numerical or textual informa- able queries to be set up and processed.
tion or formulae. Each cell has a unique Most DBMSs implement a version of SQL.
row and column identifier; different However, proprietary extensions to the
spreadsheets use different conventions so standard are common, so a complex SQL
the top left-hand cell may be A1, 1A, or program from one system might need ex-
1 1. The value in a cell is either typed in or tensive adjustment to run on another.
is calculated from a formula in the cell; this
formula can involve other cells. Each time SQL Server A relational DATABASE MAN-
the value of a cell is changed by typing in a AGEMENT SYSTEM from Microsoft Corpora-
new value from the keyboard, the value of tion. Originally developed by Sybase, Inc.,
all other cells whose values depend on this it was launched in 1989 for the OS/2 oper-
one are recalculated. ating system as Ashton-Tate/Microsoft
A common characteristic of all spread- SQL Server. The current version, SQL
sheets is the way in which the display 2000, is an exclusively Microsoft product
screen of the computer acts as a WINDOW and runs on Windows. (Sybase markets its

208
storage

own development of the earlier product star network See network.


called Adaptive Server Enterprise.)
startup disk /start-up/ (system disk) A
SQR See Basic. disk that contains an operating system and
can be used to boot a computer.
SRAM /ess-ram/ See static RAM.
statement The basic building block of a
stack (pushdown list) A LIST that is con- programming language, HIGH-LEVEL or
structed and maintained in computer mem- LOW-LEVEL, and used in a PROGRAM for a
ory so that data items can only be inserted particular purpose or function. It may be
at or removed from one end of the list an executable statement and thus specify
(called the top). The most recently inserted some operation to be performed by a com-
item is thus the first to be removed, i.e. the puter. Alternatively it may give informa-
stack works on a last in first out (LIFO) tion about the structure of the program, for
basis. The operations push and pop refer example a DECLARATION, in which the
respectively to the insertion and removal of names and types of variables are defined.
items at the top of a stack. Stacks are fre- A program consists of a sequence of
quently used in computing, especially in statements. It is translated into a sequence
connection with subroutine CALLS and IN- of MACHINE INSTRUCTIONS by a COMPILER,
TERRUPT handling. See also queue. ASSEMBLER, or INTERPRETER. In the case of a
high-level language, one executable state-
stand-alone system A computer or a ment is translated into many machine in-
computer program whose operation is in- structions, sometimes hundreds. An
dependent of any other device or program. executable statement in an ASSEMBLY LAN-
A stand-alone microcomputer, for exam- GUAGE is usually translated into one ma-
ple, is capable of operation without being chine instruction.
connected to any other piece of equipment
or network. A diagnostic program that static 1. Not changing or incapable of
runs alone in a computer system without being changed over a period of time, usu-
even the operating system is also termed ally while a system or device is in operation
stand-alone. or a program is running. For example, a
static allocation of a resource cannot be
standard deviation A measure of the changed while processing is taking place,
amount of variation within a group of nu- and static RAM is a type of semiconductor
merical values, such as measurements of a memory that retains its contents until writ-
quantity. If the values are represented by ten to.
x1, x2, x3, …, xn 2. Unable to take place during the execu-
so that there are n values in all, their stan- tion of a program. For example, a static
dard deviation is given
_ by the _formula dump is usually taken at the end of a pro-
√[1/n ((x1 – x )2 +
_ (x
2
2 – x) + … gram run.
(x – x ) 2)] Compare dynamic.
_ n
where x is the MEAN of the group. This for-
mula is usually given in the _form static RAM (SRAM) A type of semi-
√[1/n Σ (xi – x )2] conductor memory, using flip-flops and
where i ranges from 1 to n and Σ is read as needing no refresh memory signals, nor-
‘the sum of’. The square of the standard de- mally seen in caches, where the informa-
viation (i.e. the above formulae without tion is retained as long as there is sufficient
the square root) is called the variance. power. It is faster but more expensive than
DRAM.
standard generalized markup language
See SGML. STOP See Basic.

standard interface See interface. storage 1. (store; memory) A device or

209
storage allocation

medium in which data or program instruc- 2. The minimum period of time required
tions can be held for subsequent use by a between successive accesses (read or write)
computer. The two basic types of storage to a storage device.
in a computer are MAIN STORE (or main
storage) and BACKING STORE (or backing storage device A device that can receive
storage). See also storage device; media. data and retain it for subsequent use. Such
2. The retention of data or program in- devices cover a wide range of storage CA-
structions in a storage device or storage PACITIES and speeds of ACCESS. The semi-
medium. conductor devices used as MAIN STORE have
3. The act of entering data in a storage de- very fast speeds of access but the cost of
vice or storage medium. storing each bit is relatively high. In com-
parison the devices – MAGNETIC DISKS, CDs,
storage allocation The allocation of DVDs, etc. – used as BACKING STORE have a
specified areas of storage to the various lower cost per bit and a greater storage ca-
processing tasks that are active in a com- pacity, but take much longer to retrieve
puter. This controlled use of storage is nec- data.
essary in a computer system in which
several individual processes may be run- storage location (store location) See lo-
ning. Each process is allocated sufficient cation.
WORKING SPACE in a way that does not in-
terfere with another process’s allocated storage medium See media.
working space. The allocation, and the
amount of storage allocated, is controlled
storage protection Any of many facili-
ties that limit and hence control access to a
by the OPERATING SYSTEM of the computer;
storage device or to one or more storage lo-
with some operating systems the amount
cations. The intention is to prevent inad-
can be changed while a program is run-
vertent interference by users and/or to
ning. Storage allocation is one form of RE-
provide system SECURITY. It is achieved by
SOURCE ALLOCATION.
prohibiting unauthorized reading or writ-
ing of data, or both. In storage devices that
storage area network (SAN) A high- operate at high speed, protection is imple-
speed device connected to a network’s mented by hardware (to maintain speed).
servers, on which their data is stored rather For slower devices it may be done entirely
than on local hard disks. It typically con- by software.
sists of a network of RAID disk arrays and
supporting hardware. This consolidation store 1. See storage.
of data storage and its separation from 2. To enter or retain data or instructions
other server functions simplifies both net- for subsequent use by a computer.
work management and the addition of new
storage capacity. A SAN is faster but less stored program A set of instructions
flexible than NETWORK-ATTACHED STORAGE that can be submitted as a unit to some
and is usually found on large networks. computer system and stored in its memory,
The two technologies can be combined, in advance of being processed. It is then
with an NAS device using a SAN to store possible for instructions to be extracted au-
its data. tomatically from memory at the appropri-
ate time. This is done, without human
storage capacity See capacity. intervention, by the CONTROL UNIT of the
computer.
storage cycle 1. The sequence of events The data to be manipulated by the com-
occurring when a unit of a storage device puter, in accordance with the program in-
goes from one inactive state through a read structions, is also stored in the computer
and/or write phase, and back to an inactive memory. Instructions and data are both
state. represented in binary form within the com-

210
string

puter – i.e. as sequences of the binary dig- streaming files, meaning the user can
its 0 and 1 – and cannot be distinguished watch a video or listen to a sound file while
(see binary representation). As a result a it is still being downloaded from, say, the
program and the data handled by that pro- Internet.
gram can be stored together, sharing the
same storage space. Stretch See second generation comput-
The idea of program and data sharing ers.
the same memory is fundamental to the
great majority of modern digital comput- string One form in which a collection of
ers. The concept of the stored program data items can be held in computer mem-
was documented in 1946 by John von ory. A string is a list of letters, digits, or
Neumann, forming the basis of his design other CHARACTERS, examples being
of EDVAC (see first generation comput- cat
ers). The concept was also considered 735
by John W. Mauchly and J. Presper Eckert Sue Jones
at about the same time. The first opera- COMP
tional stored-program computers were It is therefore an item of textual data.
the Manchester Mark I and EDSAC. All Strings are in fact used mainly for handling
digital computers since then have been text. The length of a string, i.e. the number
stored-program computers, and stored of characters in it, is not fixed. There may
programs have long been called, simply, be only one character. An EMPTY STRING is
programs. also a possibility. Any sequence of charac-
The storage of programs and data in ters within a string is called a substring; bc
READ/WRITE MEMORY allows the stored data
and abc are possible substrings of abcde.
to be modified by the operations per-
A string is represented in memory as a
formed on it, and if necessary the program
line of adjacent LOCATIONS; either the first
itself to be modified by the program in-
location holds a number that gives the
structions. Modifying a running program
string length and the remaining locations
is normally avoided since it is a major
hold the characters in correct order, or the
source of error. The opportunities for pro-
string is terminated by a location contain-
gram modification in present-day comput-
ing a special noncharacter code. A string is
ers are reduced by dividing the program
into two parts: one part must not be mod- denoted in a program by various means,
ified, and is therefore either stored in a pro- depending on the programming language.
tected area of memory or is permanently In Basic, for example, a dollar sign ($) as
resident in read-only memory (ROM, PROM, the final character of a VARIABLE name de-
or EPROM); the other part may be modified, clares it to be a string. In many languages
and is stored in an area of read/write mem- the characters making up a string are
ory. placed in quotation marks. An example in
See also program. Basic would be
PET$ = ‘HORSE’
storm A sudden excessive increase in Various operations can be performed
traffic on a network. on strings in addition to input/output and
storage. They can be joined together (see
straight insertion sort See sorting. concatenation); they can be compared to
find out if they differ; they can be searched
streamer See tape streamer. to see if they contain a given sequence of
characters; a given substring can be ex-
streaming The movement of data from tracted and replaced by another sequence
one computer to another in such a way that of characters. The operations that can be
it does not have to be completely trans- performed are known collectively as string
ferred before the receiving computer can manipulation, the choice of operations de-
start using it. Often multimedia files are pending on the programming language.

211
string manipulation

string manipulation See string. combined with the library file by the LINK
EDITOR, the library is searched for the re-
striping A method of improving HARD quired routines, and only they are ex-
DISK performance. Several disks are tracted. If searching is not used, all the
grouped together and act as one large disk, library routines would be combined with
with the data being distributed across all the user program whether they were re-
the disks in a way designed to minimize ac- quired or not. See also program library.
cess times. RAID systems use striping.
subscript /sub-skript/ (index) A value,
structured programming An approach usually an integer or integer expression,
to producing an actual program in a high- that is used in selecting a particular element
level language in which only three struc- in an ARRAY. In computing, subscripts can-
tures need be used to govern the flow of not be put in a subscript position (e.g. xi),
control in the program. These three struc- as the name suggests, and some other nota-
tures – CONTROL STRUCTURES – allow for se- tion must be used. This usually involves
quential, conditional, and iterative flow of brackets, as in x(i) or x[i].
control. Arbitrary transfer of control – in
the form of the GOTO STATEMENT – is ex- substring /sub-string/ See string.
pressly forbidden. As a result, for each
statement or group of statements in a struc- suitcase A Macintosh file containing
tured program there is precisely one entry fonts or desk accessories.
point and one exit point. The program is
thus (in theory) easy to follow, to debug, suite /sweet/ A set of PROGRAMS or pro-
and to modify. gram MODULES that is designed so as to
meet some overall requirement, each pro-
structured query language See SQL. gram or module meeting some part of that
requirement. For example, an accounting
StuffIt /stuff-it/ A Macintosh program suite might consist of separate programs
for compressing and decompressing files. It for stock control, inventory, payroll, etc.
is now commercially available for both
Macintoshes and PCs. Sun Microsystems A US company
founded in 1982 that builds computer
subprogram /sub-proh-gram/ See pro- hardware and software. It is best known
gram unit. for developing workstations and operating
environments for UNIX operating systems
subroutine /sub-roo-teen/ 1. A section and also for the development of JAVA.
of a program that carries out a well-defined
operation on data. Subroutines function supercomputer /soo-per-kŏm-pyoo-ter/
like PROCEDURES except that they cannot A computer that is capable of working at
have PARAMETERS. They are found in AS- very great speed, and can thus process a
SEMBLY LANGUAGE and a few HIGH-LEVEL very large amount of data within an ac-
LANGUAGES, particularly Basic. ceptable time. Supercomputers are in fact
2. The term used for a procedure in such now purpose-built to manipulate numbers,
languages as Fortran. and are the most powerful form of NUMBER
CRUNCHER. Advanced supercomputers can
subroutine library A collection of SUB- handle tens of billions of floating-point op-
ROUTINES, PROCEDURES, and FUNCTIONS erations per second. These machines are
kept in the form of object code in a single used, for example, in meteorology, engi-
file on BACKING STORE. A subroutine library neering, nuclear physics, and astronomy.
will often consist entirely of routines con- The main manufacturers of supercomput-
nected with a common subject area, such ers are Cray Inc., IBM, and NEC.
as graphics or numerical analysis. When a
user program requiring library routines is superuser See administrator.

212
symbolic logic

supervisor 1. (executive) The part of a nection for a communications link. In a


large OPERATING SYSTEM that resides per- communications network messages are
manently in main store, as opposed to switched (routed) along a path of interme-
other sections of the operating system that diate stations.
are brought into main store when required.
The supervisor is responsible for the super- switching speed A measure of the rate
vision during some time period of many at which an electronic LOGIC GATE or LOGIC
unconnected processing tasks running on CIRCUIT can change the state of its output
the computer. Through the KERNEL, it con- from high to low or vice versa in response
trols the use by these processing tasks of to changes at its inputs. It is extremely fast
the physical components of the computer but does depend on the fabrication tech-
system. The supervisor calls the routines it nology; TTL and ECL devices have much
needs to perform a particular task, such as higher speeds than CMOS devices.
to display a dialog box or open a file.
2. See administrator. switch statement A conditional CON-
TROL STRUCTURE in certain programming
surf To browse for information on the languages (e.g. Algol, C) that allows a se-
Internet. lection to be made between three or more
choices. It is equivalent to the CASE STATE-
surface-mount technology (SMT) A MENT that appears, for example, in Pascal.
PCB manufacturing technology in which
chips are attached directly to the surface of symbol A string of one or more letters
the board rather than being soldered into or characters used to represent an object,
predrilled holes. Such boards are more
operation, quantity, relation, or function.
compact and can accommodate densely
See the appendix for a list of mathematical
packed interconnections on both sides of
symbols.
the board. See also DIP.
symbolic addressing A method of ad-
SVGA (super VGA) A video graphics
dressing in which reference to an ADDRESS
standard introduced by VESA in 1989,
is made in an instruction by means of some
which gives higher resolutions, such as 800
convenient symbol chosen by the program-
× 600 or 1280 × 1024, than VGA. Up to
16.7 million colors can also be achieved. At mer. The symbol may be one or more let-
the larger resolutions SVGAs are slower ters or other characters (appropriate to the
and objects appear smaller. These resolu- programming language), generally bearing
tions appear better on larger monitors and some relationship to the meaning of the
are improved by the use of GRAPHICS AC- data expected to be located at that address.
CELERATORS. This symbolic address is replaced by some
form of computed or computable address
swapping (roll-out roll-in) A method of (such as the MACHINE ADDRESS) during the
handling MAIN STORE in which the contents operation of an ASSEMBLER or COMPILER.
of an area of main store are interchanged See also addressing mode.
with the contents of an area of BACKING
STORE. The contents are written to backing symbolic logic (formal logic) The
store during periods when they are not re- branch of logic in which arguments, the
quired by the processor, and are read back terms used in them, the relationships be-
into main store when needed. Swapping is tween them, and the various operations
controlled automatically by the OPERATING that can be performed on them are all rep-
SYSTEM of the computer and is used in sys- resented by symbols. The logical properties
tems where VIRTUAL STORAGE is available. and implications of arguments can then be
more easily studied strictly and formally,
switching The use of a temporary using algebraic techniques, proofs, and
(rather than a dedicated permanent) con- theorems in a mathematically rigorous

213
symbol table

way. It is sometimes called mathematical tor’s baton), and thus take place at regular
logic. and predictable times.
The simplest system of symbolic logic In synchronous transmission between
is propositional logic (sometimes called two devices, the devices can operate con-
propositional calculus) in which letters, tinuously and each bit of data is transmit-
e.g. P, Q, R, etc., stand for propositions or ted at a fixed and predictable time.
statements, and various special symbols Compare asynchronous.
stand for relationships that can hold be-
tween them. syntax /sin-taks/ Part of the description
of a PROGRAMMING LANGUAGE, akin to the
symbol table A list kept by a COMPILER grammar of English or some other natural
or an ASSEMBLER of the IDENTIFIERS that language. The syntax of a language is the
have been used in a program. An identifier set of rules defining which combinations of
consists of a string of characters chosen by letters, digits, and other characters are per-
the programmer to identify a VARIABLE, an mitted in that language. The rules allow a
ARRAY, a FUNCTION, a PROCEDURE, or some valid sequence of characters to be distin-
other element in the program. The proper- guished from an invalid, i.e. a meaningless
ties of these identifiers, such as their ad- combination. They determine the form of
dress, value, or size, form part of the table. the various constructs – STATEMENTS, CON-
As the translation of the source pro- TROL STRUCTURES, etc. – but say nothing
gram proceeds, the compiler or assembler about the meaning of the constructs. The
recognizes occurrences of identifiers – or syntax of a language can be expressed pre-
symbols – in the text and looks them up in
cisely and unambiguously, allowing SYN-
the table. If a symbol is already in the table,
TAX ERRORS to be detected. It is often
then the associated value is used by the
expressed in a symbolic notation called
compiler or assembler instead of the sym-
Backus-Naur form (BNF) or some deriva-
bol. If the symbol is not in the table, then it
tive of BNF. See also semantics.
is entered and eventually, when a defini-
tion of the symbol is found, the correct in-
formation is also entered. The compilation
syntax analysis (parsing) A phase in the
COMPILATION of a program during which
or assembly will terminate with errors un-
less all symbols are defined. the program is checked for compliance
with the SYNTAX of the programming lan-
symmetric digital subscriber line See guage that has been used. If syntax errors
SDSL. are found then the compilation process is
stopped and the errors can be corrected.
symmetric multiprocessing See SMP. Syntax analysis follows the process of LEX-
ICAL ANALYSIS, and is achieved by means of

synchronous /sink-rŏ-nŭs/ Involving or a program known as a syntax analyzer or


requiring a form of timing control in which parser. The input to the syntax analyzer is
sequential events or operations take place a string of tokens from the lexical analyzer.
at fixed and predictable times, usually de-
termined by an electronic signal generated syntax error A programming ERROR in
by a CLOCK. This means that the length of which the grammatical rules of the pro-
time required by each set of events or oper- gramming language are broken, i.e. the
ations must already be known. program fails to obey the SYNTAX of the
Digital computers operate as synchro- programming language. Syntax errors are
nous machines: the start of every basic op- generally detected at COMPILE TIME. The
eration is under the control of the signal compiler would then normally produce in-
from an internal clock. The operations are formation indicating both the location of
therefore kept in synchrony – in step – with the error(s) in the program and the kind of
the clock signal (rather as the players in an error(s) involved – e.g. an unrecognized
orchestra are kept in time by the conduc- statement or an undeclared identifier.

214
systems software

sysop /siss-op/ The administrator of a scribed as either systems analysts or pro-


BBS or forum. The word is a contraction of grammers. Systems analysts are responsi-
‘system operator’. ble for identifying a set of requirements
and for producing a design that meets
system A set of related components that those requirements. The design is con-
can be regarded as a collective entity. In cerned with the main components of the
computing the word is most widely used to system and their roles and interrelation-
mean a related set of hardware units, or ships, and sometimes with the internal
programs, or both. For example, the hard- structure and operation of individual com-
ware units may make up a working com- ponents. The procedures detailed in the de-
puter installation, or one under design, as sign by the analysts are then encoded by
in the terms computer system, system de- the programmers using a suitable program-
sign. The programs making up a system ming language. The programmers are thus
may, for instance, be those jointly control- responsible for the production of the work-
ling the operation of a computer, i.e. the ing version of a system, i.e. its implementa-
OPERATING SYSTEM, or may be a group of tion.
programs used or required for a particular
application. In the case of hardware units systems analyst See systems analysis.
the word system may be broadened in
meaning to include basic software, such as system specification A precise and de-
operating systems, associated with the tailed statement of what a computer system
hardware. – hardware or software – is to do, generally
without any commitment as to how the
system crash See crash. system is to do it. A good system specifica-
tion defines only the externally observable
system design See systems analysis. behavior of the system, treating the system
itself as a ‘black box’ whose internal
system disk See startup disk. makeup need not be considered. It is nor-
mally produced once the set of require-
system file 1. Any file that is part of a ments to be met by the system has been
computer’s operating system. identified. It is then used as a basis for the
2. A Macintosh operating system resource design of the system.
file that contains such items as fonts, icons,
default dialog boxes, etc. systems programming See systems
software.
system flowchart (data flowchart) See
flowchart. systems software The software re-
quired to produce a computer system use-
system library See program library. ful to end-users, providing a software
environment in which they can work ef-
systems analysis The analysis of the fectively and on which they can build. It
role of a computer system in, for example, includes programs that are essential to the
fulfilling a particular job in a business, and effective use of the system. OPERATING
the identification of a set of requirements SYSTEMS, COMPILERS, UTILITY PROGRAMS,
that the system should meet. This can then DATABASE MANAGEMENT SYSTEMS, and COM-
be used as the starting point for an appro- MUNICATION SYSTEMS are examples of sys-
priate system design, from which a work- tems software. Systems software is often
ing version of the system is eventually bought together with the computer. It can
produced. also be produced or modified by compe-
In commercial programming, where the tent users. The production, documenta-
term systems analysis is most commonly tion, maintenance, and modification of
used (with a variety of meanings), those in- systems software is known as systems pro-
volved in developing software can be de- gramming.

215
t

tab key A key positioned toward the top tape cassette See cassette.
left of the keyboard and marked with two
opposing arrows. It is used for inserting a tape deck See tape drive.
tab character into a document. Generally,
the tab key will also move the FOCUS from tape drive (tape transport; tape deck) A
place to place in a GUI system. mechanism for moving MAGNETIC TAPE and
controlling its movement. A tape drive to-
table A collection of data values, each gether with magnetic read and write heads
one of which can be identified by some and associated electronics is known as a
method. The values may be arranged in an TAPE UNIT. The term tape drive is often used
ARRAY and a particular item is then identi- however as another name for the whole
fied by one or more subscript values. Alter- tape unit.
natively the data may be stored in the form
of RECORDS; one or more fields in each tape format See format; magnetic tape.
record form a unique KEY, and the key is
the means of identification. tape streamer (streamer) A type of TAPE
Values can be extracted from tables UNIT specifically designed for the rapid
using the method of table look-up (TLU). BACKUP of magnetic disks using TAPE CAR-
The subscript or key in the table is then the TRIDGES. The tape streamer is an efficient
value to be looked up. The table may, for way of backing up the fixed disk systems.
example, be a list of square roots. The 4th
entry in the table would then be the square tape transport See tape drive.
root of 4, i.e. 2. Again, the table may con-
sist of prices of numbered items on a menu. tape unit (magnetic tape unit, MTU) A
Entering the number of a particular dish peripheral device containing a mechanism
gives its price; the table can thus be used to for moving MAGNETIC TAPE and controlling
calculate the bill for a particular selection its movement, together with recording and
of dishes. sensing HEADS (and associated electronics)
that cause data to be written to and read
table look-up (TLU) See table. from the tape. Magnetic tape is held in
TAPE CARTRIDGES, CASSETTES, or, in older
tag See SGML; XML. systems, on reels. The reel, cassette, or car-
tridge is mounted in the tape unit, and the
tape See magnetic tape. tape is driven past the heads.
Data is recorded on the tape by the
tape cartridge Usually, a casing con- write head: the head receives an electrical
taining MAGNETIC TAPE and from which the signal coded with the data and converts it
tape is not normally removed. The casing into patterns of magnetization on the tape.
therefore protects the tape. The cartridge Data on the tape can be sensed by the read
can be loaded in a suitable TAPE UNIT with- head: the patterns of magnetization induce
out the tape being handled. Cartridges are a coded electrical signal in the read head,
similar to CASSETTES but are faster and have and this signal can be fed to the computer.
larger storage capacities. Data is stored on and retrieved from mag-

216
terminal

netic tape by the method of SERIAL ACCESS, users to participate in a conference or some
i.e. by first reading through all previous other joint activity despite being at differ-
items of data on the tape until the required ent places and/or communicating at differ-
location is reached. ent times. Users typically have access to
Tapes are nowadays no longer used as computers or terminals interconnected by
on-line backing store. However, they are communication lines. A contribution made
still an important backup medium because by any member of the conference will be
they are relatively cheap and their main brought to the attention of each of the
disadvantage – long access times – is unim- other members when they next use their
portant. computers or terminals. Sophisticated tele-
conferencing systems use audio and video
tar A UNIX shell command that makes a equipment.
single file (called an archive) from a set of
files or extracts files from such an archive. television monitor See monitor.
The files are not compressed and the ex-
tension of the archive file is tar. Tar is a teleworking /tel-ĕ-wer-king/ The use of
contraction of ‘tape archive’. computers and communications technolo-
gies to interact with customers and busi-
target language The language into ness colleagues. See also SOHO.
which source code is compiled.
Telnet /tel-net/ A high-level communica-
task See process. tions protocol that lets a user log on to a re-
mote computer.
task bar A bar containing the start but-
ton, which appears at the foot of a Win- tera- (ter-a) A prefix indicating a multi-
dows screen. Icons representing active ple of a million million (i.e. 1012) or,
applications or documents are also shown loosely, a multiple of 240 (i.e. 1 099 511
here and can be selected with the mouse. 627 776). In science and technology deci-
mal notation is usually used, and powers of
T-carrier A long-distance digital com- 10 are thus encountered – 103, 106, 109,
munications line used for voice communi- etc. The symbol T is used for tera-, as in TV
cation and Internet connection using for teravolt. Binary notation is generally
pulse-code modulation and time-division used in computing, and so the power of 2
multiplexing. The T-carrier service has sev- nearest to 1012 has assumed the meaning of
eral different capacity levels, from T1 to tera-.
T4. The prefix is most frequently encoun-
tered in computing in the context of stor-
TCO See Total Cost of Ownership. age CAPACITY. With magnetic disks, mag-
netic tape, and main store, the capacity is
TCP/IP /tee-see-pee-ÿ-pee/ (transmission normally reckoned in terms of the number
control protocol/Internet protocol) A set of BYTES that can be stored, and the ter-
of protocols developed originally by the US abyte is used to mean 240 bytes; terabyte is
Department of Defense, which has become usually abbreviated to T byte, Tb, or just
the de facto standard for communications to T.
between computers and networks. Tera- is part of a sequence
kilo-, mega-, giga-, tera-, peta-, ...
telecommuting /tel-ee-kŏ-myoot-ing/ The of increasing powers of 103 (or of 210).
use of telecommunications and computer
networks to work outside the normal of- teraflop /te-ră-flop/ See flop.
fice or workplace.
terminal An input/output device that is
teleconferencing /tel-ee-kon-fĕ-rĕn-sing/ used for communication with a computer
A computer-based system enabling its from a remote site. (Some terminals are re-

217
termination

stricted to the output of data or to the testing Any activity that checks whether
input of data.) The terminal may be linked a system – software or hardware – behaves
by cable to the computer, which may be in in the desired manner. It is achieved by
the next room or a nearby building, or the means of a test run in which the system is
two may be connected over a telephone supplied with input data, and the system’s
line. In larger computer systems there may responses are recorded for analysis. The
be many terminals linked to one computer input data is referred to as test data. Test-
(see multiaccess system). ing can be performed on individual com-
The most common type of terminal is ponents of the system in isolation; when
the VDU paired with a KEYBOARD: the user the components are brought together, fur-
of the VDU types information to the com- ther testing can be performed to check that
puter and information from the computer the components operate together correctly.
is received on the VDU screen. Terminals Alternatively the behavior of a system can
can be designed for a particular applica- be investigated without concern for indi-
tion; examples include POINT-OF-SALE TER- vidual components and their internal inter-
MINALS and cash dispensers at banks. If a faces. Testing can never absolutely prove
terminal has a built-in capability to store the correctness of a program. It can only
and manipulate data – i.e. it contains a mi- show that the program works under cer-
crocomputer – then it is classed as an intel- tain circumstances. See also debugging.
ligent (or smart) terminal; without this
capability it is described as dumb. test run See testing.

termination The end of execution of a TeX /tek/ A large and complex typeset-
ting system available as freeware for most
program or some other processing task. A
operating systems, including Windows,
processing task that reaches a successful
UNIX, and Macintosh. It was created by
conclusion terminates by returning control
Donald Knuth for the production of high-
to the OPERATING SYSTEM; this is described
quality scientific, mathematical, or other
as a normal termination. If the processing
technical documents. See also LaTeX.
task reaches a point from which it cannot
continue, it ABORTS itself, or is aborted by texel /teks-ĕl/ The smallest graphical
the operating system or the user; this is re- element in a two-dimensional texture map-
ferred to as an abnormal termination. ping used in the rendition of a three-di-
mensional object. Pixels and texels are
terminator 1. A character or group of similar, but not the same, as although there
characters used to mark the end of a pro- may be a one-to-one correspondence in
gram STATEMENT, CONTROL STRUCTURE, or some parts of a rendition, they cannot usu-
some other item of data. For example, in ally be paired off in this way.
Fortran every statement is terminated by
an end of line while in the language C every text box A type of CONTROL on a GUI
statement must have a semicolon at the FORM. The user types in content, which
end. Compare separator. may be validated in some way but is not re-
2. (rogue value) A value that is added at the stricted to a set list of choices. Compare list
end of a list of data values and that is rec- box; see also combo box.
ognized by the computer as a signal to ter-
minate some operation on the data. It must text editor A UTILITY PROGRAM used
not be possible for the terminator to ap- specifically for input and modification of
pear in the list of data values. If the data information in textual form. For example,
values consist of, say, numbers from 0 to a document in English can be keyed into a
50, then 99 could be selected as the termi- computer and a text editor used to create a
nator. FILE. The same applies to a program in a
high-level programming language. A text
test data See testing. editor can also be used to inspect the con-

218
third generation computers

tents of a file, and if necessary to modify thermal printer A type of nonimpact


them by inserting, deleting, or reordering PRINTER – either a LINE PRINTER or a CHAR-
data. Text editors are an essential means of ACTER PRINTER – in which the printing
communication between user and com- mechanism contains tiny heating elements.
puter in an INTERACTIVE system. There is a Localized heating of special heat-sensitive
considerable overlap between text editors paper by the printing mechanism causes
and WORD PROCESSING systems. visible marks to appear on the paper in the
A screen editor is a text editor that en- shapes of the required characters. The ther-
ables a particular portion of a file to be dis- mal transfer printer is a later development
played through a WINDOW on a screen. The in which localized heating causes special
screen cursor can then be positioned at ‘thermoplastic’ ink to be transferred to the
points where insertions, deletions, and paper from a ribbon or film, producing an
other editing functions are to be per- image that is more permanent and of better
formed. Since the window is movable, any quality; this printer is either a character or
portion of the file can be examined. a page printer. Thermal and thermal trans-
A line editor is a text editor that works fer printers are quiet in operation com-
with a single line at a time exclusively pared with impact printers.
through keyboard commands. Line editors
are normally used only when hardware or thin client (network computer) A net-
software limitations make a screen editor work device in a client/server system that
impractical. can process information independently,
but relies on the server for storage and ap-
text file See plain text. plications and is centrally managed. See net
PC.
TFT display (thin film transistor dis-
play) See active matrix display. third generation computers Comput-

custom protocols are used


to link thin clients to
remote application servers
LAN/WAN infrastructure

application server
capable of hosting
many consecutive user
sessions and where
most of the processing
work is done

thin clients only have to


handle the local GUI and
they are quite often cheap
devices used in task-
oriented workplaces with
single application
requirements

Thin client

219
thrashing

ers designed in the 1960s or thereabouts. ing to an original newsgroup or forum


Since computer design is a continuous message that continue on from each other.
process by different groups in several coun- 2. See multitasking.
tries, it is difficult to establish when a gen-
eration starts and finishes. One feature throughput /throo-pût/ A measure of
regarded as characterizing the third gener- the overall performance of a computer sys-
ation is the introduction of INTEGRATED tem, i.e. of the amount of work performed
CIRCUITS, although discrete transistors were in a given period. It can, for example, be
still used in most of this generation. Main measured in terms of instructions per sec-
store was almost exclusively magnetic ond.
CORE STORE.
In general, SECOND GENERATION COM- thumbnail /thum-nayl/ A small version
PUTERS were limited to what the engineers of an image or document page, which is
could put together and make work. Ad- much quicker to display on a screen or
vances in electronic technology now made download from a Web site. Thumbnails
it possible to design a computer to suit the make it quicker and easier to view or man-
requirements of the tasks envisaged for the age a group of larger images. They are
machine: the concept of computer ARCHI- often used in image catalogs.
TECTURE thus became a reality with this
generation. Most manufacturers intro- thunk A code in an operating system
duced at least three members of a computer that allows 16-bit code to call 32-bit code
and vice versa. For example, Windows can
family, architecturally similar but differing
run programs written in both 16-bit and
in price and performance. The IBM 360 se-
32-bit instruction sets.
ries, first introduced in 1964, is an impor-
tant example.
TIFF /tiff/ (tagged image file format) A
Comprehensive OPERATING SYSTEMS be-
common format for scanning, storing, and
came, more or less, part of third generation
interchanging raster graphics images. The
machines. MULTITASKING was facilitated
files have the file extension tif.
and much of the task of control of storage,
input/output, and other resources became time division multiplexing (TDM) See
vested in the operating system or the ma- multiplexer.
chine itself. In addition new programming
languages were introduced, such as COBOL, timeout A condition that occurs when a
and later versions of existing languages, process waiting for an external event
such as FORTRAN, came into use. reaches the end of a preset time interval be-
See also first, fourth, fifth generation fore the external event has been detected.
computers. If, for example, the process has sent a mes-
sage and no ACKNOWLEDGMENT has been
thrashing 1. Excessive hard-disk use detected at the end of the preset time pe-
that occurs when a large number of short riod, then the process may take appropri-
files scattered over the disk are being re- ate action, such as retransmitting the
trieved. Performance will be degraded. message.
2. The situation in which a VIRTUAL STOR-
AGE system is continually swapping pages timer See counter.
in and out of memory rather than running
applications. Very little progress is made time sharing A technique, similar to
under these circumstances as memory or TIME SLICING, whereby the time of a com-
other resources have become exhausted or puter can be shared among several JOBS or
too limited to perform the necessary oper- users in such a way that each one appears
ations. to have sole use of the computer.

thread 1. A sequence of postings relat- time slice See time slicing.

220
trace

time slicing A technique whereby the quired of the program or system. This is
time of a computer can be shared among broken down into a succession of different
several PROCESSES, a brief period being allo- levels that are progressively more detailed.
cated (by the OPERATING SYSTEM) to each At each level more basic elements are in-
process in turn. During such a period – troduced to describe exactly what is re-
known as a time slice – the process is per- quired. These elements are then defined in
mitted to use the resources of the com- the next stage by introducing even more
puter, i.e. the processor, main store, etc. basic elements. The process stops when
Time slicing differs from TIME SHARING in there is sufficient detail for the elements to
that it disregards which jobs or users own be written in the chosen programming lan-
the processes and so makes no effort to guage or to be brought together to form the
share the available time evenly between desired system.
jobs or users. See also multitasking.
Total Cost of Ownership (TCO) A
TLU (table look-up) See table. method of calculating the cost of software,
hardware, etc., that takes into account not
token See lexical analysis. only the purchase price but also all pro-
jected subsequent costs over the item’s life-
token ring network A LAN in which time: upgrades, repair, support, user
the nodes are connected together in such a training, etc. For example a low-price soft-
way that each node can only communicate ware application that is difficult to use and
with its neighbors on either side, leading to requires extensive user training and sup-
a logical ring. In practice star clusters of up port might have a higher TCO that a rival
to eight workstations can be connected up high-price application that can be config-
to a multiaccess unit that acts as a node on ured easily and used intuitively.
the ring. The single token is a series of bits
sent around the ring from node to node, touchpad /tuch-pad/ See touch-sensitive
and it is used to arbitrate who has access to device.
the ring at any one time. When a node
wants to communicate it must grab the touch screen See touch-sensitive device.
token when it is empty, and then it can
send data to any other node; this data must touch-sensitive device A flat rectangu-
be delivered successfully before any other lar device that responds to the touch of,
node can grab the token. Originally devel- say, a finger by transmitting the coordi-
oped by IBM and mainly used on IBM sys- nates of the touched point (i.e. its position)
tems, the use of token ring networks has to a computer. The touch-sensitive area
declined in recent years in favour of ETHER- may be the VDU screen itself, in which case
NET. See also network. it is called a touch screen; alternatively it
may be part of the keyboard or a separate
toolbar A block of icons showing in an unit that can be placed on a desk. In the
application window, often in a row or col- first case the computer user can, for exam-
umn, that, when clicked on with the ple, make a selection from a number of op-
mouse, activate functions within the appli- tions displayed on the screen by touching
cation. For example, a drawing toolbar one of them; in the latter two cases move-
could contain icons to draw a circle, pick ment of the finger across the so-called
up a paintbrush, shade an object, and so touchpad can cause the CURSOR to move
forth. Toolbars can often be customized by around the screen. See also mouse.
the user and moved and resized on the
screen. TP See transaction processing.

top-down design An approach to the trace A report of the sequence of actions


design of a program, or a computer system, carried out during the execution of a pro-
that starts with a statement of what is re- gram. It is produced by a trace program. A

221
track

trace program records – or traces – the se- tions that must be treated as a unit; in par-
quence in which the statements in the pro- ticular, they must all be processed success-
gram are executed, and usually the results fully or not processed at all. This means
of executing the statements. It is thus pos- that, in the case of failure, any updates to
sible to follow changes in data values at data, etc., made by previous instructions in
each stage of the program. There may be the transaction must be undone (rolled
additional options offered by a trace pro- back). For example, making an entry in an
gram, for example it may trace changes to accounting system typically involves cred-
the value of a specific variable in the pro- iting one account with an amount and deb-
gram. The trace information is stored in a iting another account with the same
trace table. A trace program can be used in amount; were the credit to be carried out
DEBUGGING a program. but the debit to fail, or vice versa, the data
files would be left in an inconsistent state.
track The portion of a magnetic storage Grouping the credit and debit as a transac-
medium along which data is stored. In tion ensures that this cannot happen.
MAGNETIC DISKS the tracks are concentric Transactions are used especially with data-
circles along which data is recorded as a bases.
stream of bits. There are several thousand 2. A request for computer action that must
tracks on a hard disk and 80 on a floppy be treated as such a transaction. Examples
disk. The tracks are subdivided into SEC- include making a booking or purchase on-
TORS for the purposes of reading and writ- line, getting cash from a cash dispenser,
ing items of data. etc.

trackerball /trak-er-bawl/ (trackball) A transaction file A collection of TRANS-


device for generating signals that can cause ACTIONS assembled prior to the automatic
the CURSOR or some other symbol to be updating of a MASTER FILE or DATABASE. See
moved about on a display. It consists of a also file updating.
ball supported on bearings so that it is free
to rotate in any direction. The ball is held transaction processing (TP) A method
in a socket with less than half its surface of organizing a DATA PROCESSING system in
exposed, and can be rotated by the opera- which TRANSACTIONS are processed to com-
tor’s fingers. The direction of rotation pro- pletion as they arise, rather than being col-
duces a corresponding movement of the lected together for subsequent processing.
cursor. Trackerballs were used on laptop An ON-LINE computer is therefore required.
computers instead of mice, but have now Transaction processing is used, for exam-
been replaced by touchpads (see touch-sen- ple, in travel agents to check the availabil-
sitive device). ity of airline seats, accommodation, etc.: if
acceptable a booking can be made and the
tractor feed A technique for advancing booking record updated on the spot. See
CONTINUOUS STATIONERY through a PRINTER. also on-line transaction processing.
The mechanism used to achieve this is
called a tractor or forms tractor, and con- transfer To send data from one point to
sists of a pair of loops that can be rotated another point. The process is known as a
in steps by the printer. The continuous sta- transfer or data transfer, and more specifi-
tionery has a row of regularly spaced holes cally may be a FILE TRANSFER. The word
down each side, which engage with pegs or transfer is used to describe the movement
pintles on the loops and allow the paper to of data within a computer system – i.e. be-
be accurately registered and advanced. See tween storage LOCATIONS – or over a long-
also cut sheet feed; friction feed. distance TRANSMISSION LINE.

train printer See line printer. transfer rate See data transfer rate.

transaction 1. A set of computer opera- transistor /tran-zis-ter/ An electronic de-

222
tree

conventional current gram written in assembly language into


machine code.
collector
n transmission The sending of data from
electrons

p one place for reception elsewhere. The data


base
is said to have been transmitted. The data
n
emitter may be analog or digital measurements,
encoded characters, or information in gen-
eral, and is carried as an encoded signal.
The words transmission and transmit are
Transistor usually restricted to use in telecommunica-
tions, describing the movement of data
over, say, a telephone line.
vice constructed from semiconductor ma-
terial and used for amplification and transmission channel See communica-
switching purposes. Various types can be tion channel.
produced with different characteristics. In
computer hardware, transistors are used transmission line (communication line)
for their switching properties, especially in Any physical medium used to carry infor-
LOGIC CIRCUITS and SEMICONDUCTOR MEM- mation between different locations. It may,
ORY. Invented in 1948, the transistor was for example, be a telephone line, an electric
used at first in discrete form. Compared cable, an optical fiber, a radio beam, a mi-
with the electronic valve it was much crowave beam, or a laser beam. Compare
smaller, consumed very little power, and data link.
was both cheap and reliable. From about
1959 it could be fabricated as part of an IN- transmit See transmission.
TEGRATED CIRCUIT. In both forms it has
made a great impact on computer develop- transport layer The fourth of the seven
ment (see second, third, fourth generation layers in the open systems interconnection
computers). (OSI) communications model. It ensures the
reliable arrival of messages and provides
transistor-transistor logic See TTL. error detection and correction, and data-
flow controls.
translation table A table of informa-
tion that is stored within a processor or a tree One form in which a collection of
peripheral device and is used to convert en- data items can be held in computer mem-
coded information into another form of ory. It is a nonlinear structure, similar in
code with the same meaning. There are a form to a family tree (see diagram). The set
wide variety of codes used in computing, of locations at which data items are stored
and sometimes more than one code may be are called nodes. One particular item of
used within a single computer system. For data (at the root node) has LINKS to one or
example, the Macintosh uses a different more other items, which in turn may possi-
character set to Windows. Appropriate bly have links to one or more other items,
translation tables allow documents created and so on. There is thus a unique path from
on one to be used on the other. the root node in a tree to any other node.
For instance, the data item C in the dia-
translator A program that converts a gram can be accessed from the root node F
program written in one language into the via D and B.
equivalent program in another language. The diagram shows an example of a bi-
COMPILERS and ASSEMBLERS are examples: a nary tree. This is a tree in which each node
compiler translates a program written in a has links, or arcs, to no more than two
high-level language, such as C++, into ma- other nodes. Each node therefore consists
chine code; an assembler translates a pro- of a data item and two links, left and right.

223
trojan
F root node

D H
arcs

B E G
J

A C I K
leaf nodes

Binary tree

The leaf nodes at the bottom of the dia- because the REGISTERS in a computer can
gram have empty links. Note that trees are hold only a fixed number of binary digits
drawn upside down with the root at the (bits). When the result of an arithmetic op-
top and the leaves at the bottom. eration requires more than this fixed num-
ber of bits, either truncation or ROUNDING
trojan /troh-jăn/ (trojan horse) A small will take place. The truncated value is an
destructive program disguised as a game, approximation to the true value of the
application, or utility, which when acti- number, and leads to a truncation error.
vated causes damage although appearing Repeated truncation can cause a build-up
to be of use. of such errors and the programmer should
try to minimize this problem.
true color The specification of the color
of a pixel on a display screen using a 24-bit truth table A table of values that de-
value, 8 bits for each of the three primary scribes a particular LOGIC OPERATION or
RGB colors, giving the possibility of LOGIC GATE. Truth tables were first used in
16 777 216 colors. connection with statements in logic that
could be assigned one of two truth values –
TrueType /troo-tÿp/ A scalable font true or false. They can be used in comput-
technology introduced first by Apple and ing to describe the logic operations, such as
then by Microsoft to enable high-grade AND, OR, and NOT, that are performed
fonts to be used in their operating systems. for example in the ARITHMETIC AND LOGIC
To view and print a TrueType font it is
necessary to have the font file itself and
TrueType raster graphics, which is inbuilt P Q P AND Q NOT (P AND Q)
in Windows and Macintosh operating sys-
tems. TrueType fonts can be embedded in 0 0 0 1
Web pages or word documents and viewed 0 1 0 1
by users who do not have the font installed 1 0 0 1
on their machines. Windows and Macin- 1 1 1 0
tosh versions of TrueType fonts are not
compatible. See also font.
P Q P OR Q NOT (P OR Q)
truncation /trunk-ay-shŏn/ The process 0 0 0 1
applied to a number whereby all digits 0 1 1 0
after a specified number of significant dig- 1 0 1 0
its are ignored. For example, truncation of 1 1 1 0
the number 3.257 69 to 4 or to 5 digits
yields 3.257 or 3.2576 respectively. In
computing, truncation is usually required Truth tables for AND, OR, and NOT operations

224
turnkey operation

UNIT of a central processor. The truth table ized by fairly high SWITCHING SPEEDS.
of a particular operation lists all possible Schottky TTL has higher switching speeds
combinations of the two truth values of the and lower power requirements than the
quantities on which the operation is to be standard TTL. Both versions have a lower
performed (the operands), together with PACKING DENSITY than CMOS. See also ECL.
the truth value of the outcome of each of
the possible combinations. If there are 2 tunneling /tun-ĕl-ing/ A method of trans-
operands, P and Q, there are 22, i.e. 4, pos- mitting data over connected networks
sible outcomes. Truth tables for AND, OR, using different protocols. The packet based
and NOT operations are shown in the dia- on one protocol is wrapped in the packet of
gram. The truth values are represented as 1 another protocol so that it can travel over
(for the value true) and 0 (for the value the network using the second protocol.
false). Tunneling is used in virtual private net-
Truth tables are also used to describe or works (VPNs).
determine the function of a logic gate. The
truth table of a particular gate lists the out- Turing machine /tew-ring/ An abstract
put obtained for all the possible combina- model of a computer, put forward by Alan
tions of inputs. With 2 inputs, each of Turing in 1936, that consists of a control
which can be at one of two voltages, there or processing unit and an infinitely long
are 4 possible output voltages. With 3 in- tape divided into single squares along its
puts there are 8 possible outputs. The truth length. At any given time each square of
tables for AND and OR GATES with two in- the tape is either blank or contains a single
puts are identical to those shown in the symbol s1, s2, …, sn. The Turing machine
table for P AND Q and P OR Q. The truth moves along the tape square by square and
table for a NOT GATE (which always has one reads, erases, and prints symbols. At any
input) is identical to that for NOT P. given time the Turing machine is in one of
a fixed finite number of states represented
truth value Either of two values, true or by q1, q2, …, qn. The ‘program’ for the ma-
false, that can be assigned to a logical ex- chine is made up of a finite set of instruc-
pression or conclusion in BOOLEAN ALGE- tions of the form qisjskXqj, where X is
BRA. The values are symbolized by T and F. either R (move to the right), L (move to the
When used in computing these so-called left), or N (stay in the same position). Here,
logical values can be represented by and qi is the state of a machine reading sj, which
stored as a single bit (usually 1 for true and it changes to sk, then moves left, right, or
0 for false). Larger units, such as a byte or stays and completes the operation by going
word, are also used to store logical values into state qj.
since this is simpler and quicker, although The Turing machine is considered the
less efficient in storage space. See also truth theoretical model for digital computers. It
table. is still important in computer science.

TSR (terminate and stay resident) De- turnaround time 1. The time that
scribing MS-DOS programs that stay in elapses between the submission of a job to
memory at all times. Such programs can be a computer facility and the return of the re-
instantly accessed from within other pro- sults. This is the only time that really mat-
grams. TSRs are not needed in Windows ters to someone using a computer in this
but are still supported for BACKWARD COM- way.
PATIBILITY. 2. The time taken to reverse the direction
of transmission on a one-way (SIMPLEX) or
TTL (transistor-transistor logic) A fam- a HALF-DUPLEX communication channel.
ily of LOGIC CIRCUITS that are all fabricated
with a similar structure by the same INTE- turnkey operation /tern-kee/ The deliv-
GRATED-CIRCUIT techniques. The circuits ery and installation of a complete com-
are bipolar in nature and are all character- puter system plus applications programs so

225
turtle graphics

that the system can be placed into immedi- scanner or digital camera. Nearly all such
ate operational use. This operational sys- devices contain a TWAIN driver, which
tem is called a turnkey system. hides the detailed operation of the device
behind the standard interface. A TWAIN-
turtle graphics A method by which in- aware application can thus use any device
formation from a computer can be turned with a TWAIN driver.
into pictures or patterns. The original
drawing device was a simple pen-plotter tweening /tween-ing/ A technique used
known as a turtle, a small motorized car- in computer animation that enables
riage carrying one or more pens and con- smoother animation to be achieved by the
nected to the computer by a flexible cable.
automatic insertion of extra frames be-
The carriage wheels could be precisely con-
tween the originally created frames.
trolled, enabling the turtle to be steered by
commands from the computer in any di-
twisted pair An electric cable consisting
rection across a floor or other flat surface
of two similar wires that are each electri-
covered in paper or similar material; the
pens could be raised or lowered by control cally insulated by a plastic sheath and are
signals to produce the drawing. twisted around one another to improve the
The action of the turtle can now be sim- transmission of signals. Bundles of tens or
ulated by graphics on the VDU screen: the hundreds of twisted pairs are commonly
screen turtle is usually a triangular arrow encased in an outer protective sheath to
that may or may not produce a line as it is make large cables.
made to move across the screen. See also
Logo. two’s complement See complement.

TWAIN /twayn/ A standard for inter- type See data type.


facing code that allows graphics manipula-
tion programs to obtain an image from a typewriter terminal See teletypewriter.

226
U

UART /yoo-art/ (universal asynchronous puter systems. Originally systems software


receiver–transmitter) A module, usually was included in the purchase without addi-
consisting of only one circuit, that can both tional charges since it was minimal and
receive and transmit asynchronous com- thus represented a small part of the total
munications. It is commonly used in cost of the system. Unbundling was
modems. See USART. brought about by hardware becoming less
expensive while systems software became a
UDP (user datagram protocol) A TCP/IP larger proportion of the total cost. Many
connectionless protocol that offers a lim- microcomputer systems, however, reverse
ited amount of service when messages are
the process by including a number of ap-
exchanged using Internet protocol. UDP
plication programs, such as WORD PROCES-
does not split data into packets nor re-
SORS or SPREADSHEETS, in the purchase price
assemble at the other end; this has to be
done by application software. Neither does as an incentive to buy. This can be attrac-
UDP provide sequencing of the packets tive since the computer manufacturer buys
that the data arrives in. It is equivalent to many copies of the software at a large dis-
the transport layer in the ISO/OSI reference count and passes much of the saving on to
model. It is less reliable, but more efficient, the customer. This practice is known as
than TCP, the reliability depending on the bundling and the included software is de-
applications generating and receiving the scribed as bundled.
message; UDP is therefore suitable for ap-
plications dealing with small data units UNC (Universal Naming Convention) A
and for SNMP. method of identifying the location of a re-
source, such as a shared printer or NET-
UI See user interface. WORK DIRECTORY, on a network. For
example a file called ‘ComputingDic-
ULA See uncommitted logic array. tionary.xml’ in network folder called ‘Dic-
tionary’ on a Windows computer called
unary minus /yoo-nă-ree, -nair-ee/ The ‘EdmundXP’ could be accessed from the
arithmetic operation that takes only one rest of the network by specifying the UNC
OPERAND (hence the word ‘unary’) and that
name ‘EdmundXP\Dictionary\Computing-
makes a positive operand negative and a
Dictionary.xml’. Unix networks and the
negative operand positive. The OPERATOR
for unary minus is the minus sign, –. It is Internet also use UNC names, but with for-
usually highest in the ORDER OF PRECE- ward slashes rather than backslashes.
DENCE.
uncommitted logic array (ULA) A
unary operator (monadic operator) See semiconductor CHIP on which sets of LOGIC
operator. GATES have been fabricated in a standard
form but are not yet connected. The inter-
unbundling /un-bun-dĕl-ing/ The sepa- connections are made after manufacture so
ration of SYSTEMS SOFTWARE charges from that a required circuit pattern can be
hardware charges in the marketing of com- achieved.

227
unconditional jump

unconditional jump (unconditional universal asynchronous receiver–


branch) See jump. transmitter See UART.

undelete /un-di-leet/ To restore a deleted Universal Naming Convention See


file. This is possible because the data in a UNC.
deleted file is normally not erased immedi-
ately (see deletion). UNIX A multiuser multitasking operat-
ing system developed by AT&T Bell labo-
underflow The condition arising when ratories in 1971 for use on minicomputers.
the result of an arithmetic operation in a Over its long evolution it has become a
computer is too small to be stored in the lo- powerful and complex operating system. It
cation allocated to it. For example, a frac- has been adapted to run on many plat-
tion represented by 32 leading 0s before forms, for example Linux on Intel and
the significant bits could not be stored in a other chips and A/UX for the Macintosh,
32-bit word. If there were no means to de- and is used extensively as a network oper-
tect underflow, results would be unreliable ating system. There are many freeware ver-
and might be incorrect. Facilities are there- sions available.
fore provided to detect underflow. It can
then be corrected. Normally the offending unpack See pack.
number is replaced by 0. See also overflow.
unrecoverable error An error that
undo To reverse an action and return to causes a program to terminate or a system
to crash, so that continuation is impossi-
the previous state. For example, an editing
ble. It is often called a fatal error.
action in word processing can be reversed.
Many applications have several levels over
unzip To uncompress a file that has
which one can backtrack.
been previously compressed by PKZIP.
Unicode /yoo-nı̆-kohd/ An encoding upgrade /up-grayd/ A newer version of
standard developed by the Unicode Con-
an existing application, usually offering
sortium since the late 1980s, in which one greater functionality, or a patch to an ex-
or more bytes are used to represent each isting application.
character. This gives Unicode the capabil-
ity of representing a huge number of char- uplink The transmission link from a
acters, although the current limit is ground station to a communications satel-
1 114 112; over 90 000 have been defined, lite. Compare downlink.
many of them being used for Chinese ideo-
graphs. upload /up-lohd/ To transfer a copy of a
file from a local to a remote computer,
Uniform Resource Indicator See URI. such as a larger central system or an FTP
site. Compare download.
uninstall /un-in-stawl/ To completely re-
move software from a computer, including upper case The capital form of an al-
any references to files or components held phabetic character, as distinct from lower
on system files, such as the Windows reg- case.
istry. All applications should be supplied
with a suitable uninstaller program. UPS (uninterruptible power supply) A
battery-powered device connected between
uninterruptible power supply See a computer or other electronic equipment
UPS. and a power source that automatically pro-
vides backup power in the event of power
UNIVAC /yoo-nı̆-vak/ See first genera- failure of the source. A UPS is activated
tion computers. when it detects a loss of power from the

228
user port

source; it provides enough running time to which new peripherals can be automati-
cover short breaks and then, if necessary, cally detected and configured without
for the system or device to be shut down in shutting the computer down and without
an orderly fashion so that data is not lost. the need for an adapter card. All modern
The device also protects against sudden microcomputers support USB.
power surges.
Usenet /yooz-net/ A worldwide network
uptime /up-tÿm/ The amount of time a of UNIX systems with thousands of sub-
system has been powered up and running. ject-based newsgroups. It has now become
part of the Internet and has set the stan-
upward compatibility (forward compat- dard for other bulletin-board systems.
ibility) The ability of a computer system
or software to work beside or on more ad- user datagram protocol /day-tă-gram/
vanced equipment or versions. See also See UDP.
backward compatibility.
user-friendly Denoting a piece of hard-
URI (Uniform Resource Indicator) An ware or software that a user should find
identifier for a physical or abstract object easy to use, convenient, or helpful, i.e. that
that follows the syntax laid down in RFC a user who is not a computer specialist
3986 (2005). Internet URLS form one subset should not find confusing or intimidating.
of URIs: in ‘http://www.microsoft.com’,
the part before the colon (’http’) is call the user group A group of people with an
scheme and the remainder of the URI fol- interest in a particular application or com-
lows the syntax specified for the http
puter system. Some user groups are large
scheme. Other schemes include the ‘tel’
and provide forums in which ideas can be
scheme for telephone numbers: the URI
exchanged, problems aired, and help pro-
‘tel:+1-800-123-4567’ represents the US
vided.
telephone number 800-1230-4567. The
use of such standardized names makes
user interface The means of communi-
their manipulation be computer easier.
cation between a person and a computer
system, referring in particular to the use of
URL /yoo-ar-el/ (uniform resource loca-
tor) The address of a resource on the In- input/output devices with supporting soft-
ternet, which specifies the protocol to be ware. The operating system provides the
used in accessing the resource, the name basic facilities in the form of a GRAPHICAL
USER INTERFACE and/or a COMMAND LINE IN-
of the server where the resource is to be
TERFACE, which individual applications
located, and if necessary the path to the
resource. An example address is adapt to suit their requirements. A good
http://www.microsoft.com user interface is important to the success of
indicating a WWW page on the commer- an application.
cial server microsoft.com. See also URI.
username /yoo-zer-naym/ The name by
USART /yoo-sart/ (universal synchronous/ which a user is recognized on a computer
asynchronous receiver–transmitter) A or network system. When logging on a user
module that can send and receive both must enter a username and, usually, a valid
asynchronous and synchronous communi- password.
cations. See also UART.
user port An electrical socket in a mi-
USB (universal serial bus) A serial bus crocomputer that with associated circuitry
used to connect up to 127 peripherals to a allows the computer user to connect addi-
microcomputer through a single general tional peripheral devices. The individual
port, by daisy-chaining peripherals to- pins of the port may be set or tested from a
gether. It is a plug-and-play INTERFACE in user’s program. The port can be used to

229
user program

control or acquire data from external de- UTF-16 See UTF-8.


vices.
UTF-32 See UTF-8.
user program Usually, a program writ-
ten by a user of a computer system for his utility program Any of a collection of
or her own use. Such programs may be programs that forms part of every com-
shared among, say, members of a work- puter system and provides a variety of gen-
group, but are not intended for wide distri- erally useful functions. Examples of utility
bution or commercial sale. See also programs are LOADERS, TEXT EDITORS, LINK
application. EDITORS, programs for copying FILES from
one storage device to another, for file dele-
UTF-8 (8-bit Unicode Transformation tion and FILE MAINTENANCE, for SEARCHING
Format) A method of encoding UNICODE and SORTING, and for DEBUGGING of pro-
characters so that they take up less space. grams.
Unicode currently allows for over one mil-
lion different characters, so each character UUCP (UNIX-to-UNIX copy) A group
would theoretically need to take up three of software programs used to help the
bytes in a computer file or memory; in transmission of data between UNIX sys-
practice, computer architectures dictate tems using serial data connections.
that this would be extended to four bytes.
UTF-8 reduces this space requirement uudecode /yoo-yoo-dee-kohd/ See uuen-
drastically by allowing ASCII characters – code.
character numbers 0 to 127, which include
nearly all the keys found on a computer uuencode /yoo-yoo-en-kohd/ A pro-
keyboard – to represent themselves and oc- gram, originating on UNIX systems, that is
cupy one byte, while all other characters used to translate an 8-bit binary file into a
are encoded using between two and four 7-bit ASCII text file without loss of data. It
bytes. UTF-8 was invented in 1992 and is produces a file about 4/3 the original size.
defined in RFC 3629 (2003). It is used mainly for sending images or ex-
There are other varieties of UTF encod- ecutable code by e-mails or newsgroups
ing. UTF-16 uses either two or four bytes over links that do not support the trans-
and is more efficient then UTF-8 for text mission of 8-bit data. The reverse process,
that uses, e.g., Chinese ideographs. UTF- conversion back to 8-bit, is effected by the
32 uses four bytes for all characters; it is program uudecode. Modern e-mail appli-
thus the simplest representation but offers cations perform these operations automat-
no compression. UTF-8 is the default en- ically when required.
coding used by XML and all programs that
process XML data must be able to handle UUPC The DOS, Windows, and OS/2
files that use UTF-8 or UTF-16. version of UUCP.

230
V

V.90 A standard for 56 K modems ap- VAN See value-added network.


proved by the International Telecommuni-
cations Union in 1998. It resolved variable /vair-ee-ă-băl/ A CHARACTER or
incompatibilities between rival technolo- group of characters that is used to denote
gies and was intended to be the final 56 K some value stored in computer memory
modem standard. However, the subse- and that can be changed during the execu-
quent V.92 standard has added a few new tion of a program. Each variable used in a
features. program is associated with a particular LO-
CATION or group of locations in memory.
V.92 See V.90. The variable can take any value from a
set of specified values of the same kind.
vaccine /vak-seen/ A utility program to The values may, for example, be INTEGERS
check for computer viruses. It is often resi- from the set 0 to 99, they may be the REAL
dent in memory to perform different levels NUMBERS that a computer is able to handle,
of virus checking according to program they may be the logical values true or false,
settings. or they may even be colors from the set red,
green, blue. The particular value taken by
validation /val-ă-day-shŏn/ The check- the variable can be changed by means of an
ing of data for correctness, or for compli- ASSIGNMENT STATEMENT. The NAME selected
ance with the restrictions imposed on it. by the programmer to identify the variable,
The checks are known as validity checks. together with the SCOPE of the variable and
They are done by computer, and an error the type of data involved (e.g. integers,
message will be produced if an error is de- reals, etc.), is stated in the program in a DE-
tected. For example, a validity check is per- CLARATION.
formed after the input of data to ensure
that the value of each item of data lies variance /vair-ee-ăns/ See standard devi-
within the acceptable range, that the item is ation.
of the right type, etc. If the values are
meant to lie between, say, 0 and 500, the VAX /vaks/ (virtual address extension) A
validity check would detect any number range of 32-bit processor computers intro-
exceeding 500 or any negative number. It duced in 1978 by DEC (Digital Equipment
would also detect that a letter had been Corporation). Development ceased in the
input when a digit was intended. A validity early 1990s, but many VAX systems are
check ought to be written into a program still in use.
by the programmer. See also data cleaning.
VBScript /vee-bee-skript/ (Visual Basic
validity check See validation. scripting) A scripting language based on
the Visual Basic language but much sim-
value-added network (VAN) A net- pler, developed by Microsoft and sup-
work that gives increased functionality, ported by Internet Explorer. Similar in
such as message routing and conversion fa- many ways to JavaScript, it enables au-
cilities, to users communicating at different thors to include controls, such as buttons
speeds and using different protocols. and scrollbars, on their Web pages.

231
vCard

vCard /vee-kard/ A specification for cre- universal set, E, is shown as a rectangle. In-
ating an electronic business card for the ex- side this, other sets are shown as circles. In-
change of information in e-mails and tersecting or overlapping circles are
teleconferencing. intersecting sets. Separate circles are sets
that have no intersection. A circle inside
VDSL (very high bit-rate digital subscriber another is a subset. A group of elements, or
line) A variant of DSL technology that a subset, defined by any of these relation-
transfers data over an ordinary copper tele- ships may be indicated by a shaded area in
phone wire at very high speeds, but only the diagram.
over short distances. Like ADSL it can share
the wire with a telephone and transfers verification /ve-ră-fă-kay-shŏn / The
data at different speeds in the two direc- checking of the accuracy of data after it has
tions: up to 52 Mbps downstream (i.e. been transcribed. It is done most com-
when downloading) and 16 Mbps up- monly when data has been encoded by an
stream (i.e. when uploading). It is expected operator at a keyboard reading from a doc-
that VDSL will become more widely used ument. The document is subsequently
as copper wires are replaced by fiber-optic rekeyed by another operator, and the two
cables, which overcome the distance prob- sets of input data compared by machine.
lem. See also SDSL. Any differences are indicated and suitable
action is taken.
VDU (visual display unit) A device that
can display computer output temporarily Veronica /vĕ-ron-ă-kă/ (very easy rodent-
on a screen. The information can be com- oriented network index to computerized
posed of letters, numbers, or other charac- archives) A GOPHER searching service de-
ters, or can be in the form of pictures, veloped by the University of Nevada, simi-
graphs, or charts. The information can be lar to ARCHIE, which is used on FTP servers.
changed or erased under the control of a
computer; this computer may be at a re- vertical application A specialized ap-
mote site or may be a microcomputer of plication designed for use in a particular
which the VDU forms a part. The VDU is area of business or by a particular type of
usually paired with a KEYBOARD, by which user; for example, insurance, government,
information can be fed into the computer. or hospitals.
A VDU plus keyboard is now the most
commonly used computer TERMINAL. very high bit-rate digital subscriber
Modern GUI-based operating systems line See VDSL.
treat all output to VDUs as graphics. How-
ever, VDUs also have a facility for HARD- VESA /vee-să/ (Video Electronics Stan-
WARE CHARACTER GENERATION that allows dards Association) An organization de-
simple text-only output; this is normally voted to the improvement of standards for
used only for low-level maintenance or video and multimedia devices.
compatibility.
VESA local bus (VL bus; VLB) A local-
vector /vek-ter/ A one-dimensional ARRAY. bus architecture used in the early 1990s on
computers with an Intel 80486 CPU. It was
vector graphics A method of producing superseded on Pentium-based machines by
pictorial images in which the image is the PCI local bus.
stored as mathematical instructions that
define curves, lines, etc., rather than pixels. VFAT /vee-eff-ay-tee/ (virtual file alloca-
See also computer graphics. Compare tion table) An extension of the FAT FILE
raster graphics. SYSTEM, introduced in Windows 95, that
allowed long file names.
Venn diagram /ven/ A diagram used to
show the relationships between sets. The VGA (video graphics array) A computer

232
video conferencing

A B

B⊂A

Venn diagram showing B as a subset of A

A B

A∩B

Venn diagram showing the intersection of two sets

A B

A∪B

Venn diagram showing the union of two sets

display system introduced in 1987 in adapters usually contain a GRAPHICS ACCEL-


which the maximum resolution depended ERATOR.
on the number of colors displayed; for ex-
ample, 16 colors at 640 × 480 pixels or 256 video capture board An expansion
colors at 320 × 200 pixels. See also SVGA. board that is used to convert analog video
signals to a digitized form from a plugged-
video adapter The components used to in video cassette recorder. Some video cap-
provide the output to a computer monitor. ture boards can also perform the reverse
It is included on the motherboard or is on action.
an expansion board, called a display
adapter or video display board. Video video conferencing A virtual meeting

233
video display board

between two or more participants in differ- and during execution parts of the program
ent locations achieved by using computer not currently needed remain on backing
networks. Each participant has a video store.
camera and speakers attached to his or her Data and instructions are divided by the
computer, and audio and video data is operating system into blocks of fixed
transmitted over the network. Participants length; these blocks are called pages. When
can use a virtual conference room and ap- a reference to a virtual address is made, the
pear as if they were sitting in a room next system hardware detects whether or not
to each other. Hardware cost has made the required address is physically present in
video conferencing too expensive for the main store. If it is not, an INTERRUPT is gen-
small user in the past, but now inexpensive erated and the page containing the re-
video conferencing software and digital quired location is transferred, by the
cameras are available. operating system, from backing store to
main store. A page is thus the unit of inter-
video display board See video adapter. change between backing store and main
store. Once in main store, special hardware
video graphics board A video adapter or software maps the relevant virtual ad-
that generates the signals for displaying dresses onto the actual physical addresses.
graphical images on a video screen. The When a page held in main store is no
term has fallen into disuse because nearly longer required by the processor, it may be
all modern video adapters have a graphics transferred back to backing store. The
capability. backing-store device is known as a swap-
ping device.
videophone /vid-ee-oh-fohn/ A tele-
phone that also has a camera and screen at- virtual network The connection of sev-
tached and is capable of transmitting and eral LANs together so that they appear as
receiving video as well as audio signals. one network or as a part of a network. For
With conventional telephone lines, the example, workstations on several sites can
only video that can be transmitted is freeze be grouped in the LAN definition in terms
frame. of department or type of user, rather than
by geographical location, making the con-
video RAM (VRAM) The RAM in- trol and management much easier.
cluded on a video adapter board. All types
of video RAM are special arrangements of virtual reality The use of a computer
dynamic RAM and act as a buffer between system to simulate a three-dimensional en-
the CPU and the display. Most forms of vironment and allow the user to experience
video RAM are dual ported, which enables and interact with a realistic set of condi-
the processor to write a new image to the tions, provided by sound, real-time motion
RAM while the display is reading from the effects, and sometimes with tactile feed-
RAM to refresh its current content. back. It is used in such applications as
flight simulation, the design of buildings,
virtual address See virtual memory. medical teaching, and computer games. See
HMD.
virtual memory (virtual storage) The
use of BACKING STORE, especially a hard virtual reality modeling language
disk, as if it were part of the MAIN STORE of (VRML) A language for creating interac-
a computer. In virtual memory systems, tive three-dimensional image sequences
programs can be written requiring more and possible user interaction with them.
main store than is physically present in the Links to VRML files can be embedded in
computer (or more than the OPERATING SYS- HTML documents, but a VRML-enabled
TEM is prepared to allow them). The pro- browser is needed to view such Web pages.
grams can address areas of main store that
do not in fact exist using virtual addresses, virtual storage See virtual memory.

234
VoIP

virus /vÿ-rŭs/ A program or macro code mailbox and can copy, store, or forward
that attaches itself to other programs or the messages as appropriate.
files and can cause data corruption or
hardware failure when activated, usually voice output The ability of a computer
when the program is started or the file to produce spoken messages. Software can
opened. Viruses can be transmitted as at- achieve this by either producing the sounds
tachments to e-mails, by downloading an that make up words or assembling together
infected program, or by using a file from an prerecorded words. See also speech gener-
infected portable disk. See vaccine; worm. ation device.

Visual Basic A programming language Voice over IP See VoIP.


and environment developed by Microsoft
and launched in 1990. It is based on the voice recognition The ability of a com-
Basic language and is particularly used for puter to understand speech, usually in the
developing user interfaces. A programmer form of commands or data input from a
can produce code by dragging and drop- user. Systems are limited to basic use at the
ping such controls as text boxes, buttons, moment because of the difficulty in recog-
etc. and then defining their characteristics. nizing accents, speech patterns, and differ-
Visual Basic is sometimes called a ‘rapid ing syntaxes.
application development language’ (RAD)
because it enables programmers to develop VoIP (Voice over IP; Internet Voice) The
prototype software quickly. transmission of verbal conversations over
an IP-based network, especially the Inter-
visual display unit See VDU. net. Sound is converted to digital form by
an A/D CONVERTER, transmitted over the
VLAN /vee-lan/ (virtual local area net- network, and converted back to sound at
work) A network of computers that be- the destination. In its simplest form two
have as if they are connected to the same computer users at machines equipped with
wire although they are physically located microphones and loudspeakers can talk to
on different segments of the LAN. They are each other as if on the telephone. Adaptors
configured by software, which makes them are available that connect telephone hand-
very flexible. For example, when a com- sets to computers and emulate dialing
puter is moved to a different location it can tones, etc., as are special VoIP handsets
stay on the same VLAN without any hard- that do not require a computer. For VoIP
ware reconfiguration. on the Internet, users must have a BROAD-
BAND Internet connection and an account
VLSI (very large scale integration) See with a provider of VoIP services; they can
integrated circuit. then contact other subscribers to the same
provider and often traditional telephones
voice input device A device in which as well. VoIP has several advantages over
speech is used to feed data or system com- the telephone network: it makes more effi-
mands directly into a computer system. cient use of the available bandwidth; it is
Such equipment involves the use of SPEECH more flexible and VoIP can easily be inte-
RECOGNITION processes, and can replace or grated with other Internet services, such as
supplement other input devices. Some CHAT and data transfer; and the same VoIP
voice input devices can recognize spoken account can be used anywhere in the
words from a predefined vocabulary; other world. Above all it is currently significantly
devices have to be trained for a particular cheaper than the telephone, especially for
speaker. international calls, and often completely
free of charge. However, since VoIP is a
voice mail A computer system that can comparatively new service there are still
store telephone messages in memory for problems to be overcome; for example a
later retrieval by a user. Each user has a user’s Internet connection can run slowly

235
volatile memory

and affect the reliability of VoIP, and it can then used to produce a true three-dimen-
be difficult to trace the geographical loca- sional image. Voxel imaging is used in
tion of emergency calls. Nevertheless, it is magnetic resonance imaging to produce ac-
expected that VoIP will be major growth curate models of the human body. It is also
area in the next few years. See also ENUM; used in computer games.
SIP.
VPN (virtual private network) The use
volatile memory /vol-ă-tăl/ A type of of encryption techniques and tunneling
memory whose contents are lost as soon as protocols by a group of users on a public
the power supply to the memory is network, especially the Internet, to ensure
switched off. Compare nonvolatile mem- that their messages are secure. The net-
ory. work nodes appear to be connected by pri-
vate lines and so form a virtual private
voxel /voks-el/ A volume pixel, i.e. the network. The effect is to give companies
smallest distinguishable box-shaped part the same capabilities as on a dedicated
of a three-dimensional image. Depth is communications system, but at much
added to an image using voxelization. The lower cost.
image is divided into two-dimensional
slices each made up of pixels, and a volume VRAM /vee-ram/ See video RAM.
is produced by stacking slices together in
memory. Opacity transformation, which VRML /vee-ar-em-el, ver-măl/ See vir-
gives voxels different opacity values, is tual reality modeling language.

236
W

wafer /way-fer/ A thin flat piece of semi- W3C /dub-’l-yoo-three-see/ (World Wide
conductor crystal on which multiple copies Web Consortium) A group of industrial
of a circuit are formed, and then cut out, in organizations seeking to promote stan-
the manufacture of integrated circuits. dards for the evolution of the Web and in-
teroperability of Web products. It is
wait state The state in which a program responsible for various standards crucial to
or system or part of a system is inactive the Web, e.g. HTML, XML, etc.
while waiting for some event or process to
finish. For example, a CPU has to enter a WDM (wavelength division multiplex-
wait state if requested data cannot be ing) A type of multiplexing that modu-
transferred from main store quickly lates each of several data streams onto a
enough to match its processing speed. different part of the light spectrum. It was
developed for use with optical fibers and is
wallpaper A pattern or picture, chosen the optical equivalent of frequency division
by the user, that is displayed as a screen multiplexing.
background.
Web See World Wide Web.
WAN /wan/ See wide area network.
Web address See URL.
wand /wond/ A hand-held penlike de-
vice that is connected to a computer and is Web browser A program developed to
used to read printed BAR CODES or OCR allow users to browse documents on the
characters. It is moved steadily over the WWW. A Web browser can also provide
surface of the printing, and an audible access to documents on a network, an in-
and/or visual signal is produced if the data tranet, or a local hard drive. Web browsers
has been sensed satisfactorily. interpret HTML documents and can use
hyperlinks to allow the user to jump from
WAP /wap/ (wireless application proto- document to document in any order. They
col) A specification for the protocol used are also capable of downloading and trans-
by wireless devices, such as cellular tele- ferring files, providing newsgroup access,
phones and radio transceivers, to commu- playing audio and video clips associated
nicate with the Internet. with a document, displaying graphics files,
and running small programs, such as Ac-
warm boot To restart a computer with- tiveX controls. See also Internet Explorer.
out turning the power off, usually by com-
manding the operating system to restart or webcam A digital camera that provides
by pressing the reset button combination. live images to a WEB SERVER, from where
they can be viewed by anybody browsing
warm start See restart. the Web. Webcams do not provide contin-
uous video but rather a stream of still im-
WAV /wayv/ A Windows file format for ages taken at predefined intervals, usually
sounds stored as waveforms. These sound a minimum of about a second. Many web-
files have the file extension wav. cams remain in place for long periods

237
Webcasting

showing panoramic views, for example of WWW and the ability to send and receive
weather conditions on volcanoes in the e-mails on a television set by the use of a
Cascade mountain range or of Times modem contained in a set-top box. A user
Square, New York. Webcams are also used must subscribe to a Web TV network and
in VIDEO CONFERENCING. also have an Internet Service Provider
(ISP).
Webcasting /web-kass-ting, -kahss-/ The
broadcasting of information on the World Webzine /web-zeen/ An electronic mag-
Wide Web. It is received automatically by azine available at a Web site.
all subscribers to the relevant broadcast
service. while loop (while do loop) See loop.

Web feed (feed; channel) A notification whiteboard An area on a display screen


of new or updated items on a Web site. that can be written to, or drawn on, by sev-
Web feeds typically contain the item’s title, eral users. These are used in teleconferenc-
a short summary of its content, and its URL. ing to provide visual as well as audio
They are used particularly for Web sites communication.
that provide news, stock market informa-
tion, BLOGS, podcasts (see podcasting), and white space Any character that does not
other content that changes frequently. Web have a visual form and is displayed as a
feeds are in one of several standard for- blank space on the screen or printer.
mats, such as RSS, and are read by special
programs or extensions to Web browsers whois /hoo-iz/ A service provided at
called news aggregators. Because Web some Internet domains for finding e-mail
feeds are small they are downloaded addresses.
quickly; they are then reviewed as a list and
users can follow the link to any item that wide area network (WAN) A com-
interests them. Users can select which Web puter NETWORK that is distinguished from a
sites they wish to monitor and many news LOCAL AREA NETWORK because of its longer-
aggregators will notify them when a new distance communications. The network
item is available on these sites. may cover, say, a whole country or may in-
clude the sites of a large multinational or-
weblog See blog. ganization. The communications between
sites are usually provided by one or more
Web page A document on the World national or international entities rather
Wide Web, identified by its URL. It can than by the operators of the WAN.
contain text, images, sound, and links to
other pages. wideband /wÿd-band/ See broadband.

Web server A program that serves the wiki (wee-kee) 1. A WEB SERVER applica-
files that form Web pages to Web users. tion that allows Web users to alter the con-
Every computer on the Internet that con- tents of the WEB PAGES it manages and to
tains Web pages must run a Web server. create new ones. Wikis facilitate the col-
They are often included in a larger package laborative authoring of large Web sites, for
of Internet and intranet programs. example Wikipedia, an online encyclope-
dia. The term ‘wiki’ derives from the
Web site A group of Web pages that are Hawaiian ‘wiki wiki’ (‘fast’ or ‘quick’).
usually connected by hyperlinks and have a 2. A WEB SITE created and managed by such
home page as their starting point. A Web an application. The first wiki was created
browser and an Internet connection are in 1995 for the Portland Pattern Reposi-
needed in order to access a Web site. tory.

Web TV The provision of access to the Wikipedia Trademark See wiki.

238
Wintel

wildcard character /wÿld-kard/ A sym- system in the early 1990s, but suffered
bol used to represent any character or char- from problems of stability and perfor-
acters. The asterisk (*) is commonly used mance. Windows 95 and its successors,
for this purpose for any number of charac- Windows 98 and Windows ME, were true
ters, and the question mark (?) is used to operating systems, but had to make design
represent a single character. Wildcard compromises for BACKWARD COMPATIBILITY
searches are available in many applica- with their MS-DOS and Windows 3.x her-
tions. For example, in word processing itage. A completely different line of Win-
searching for d*g would find all words (of dows development, begun with Windows
any length) starting with ‘d’ and ending NT (Windows new technology) in 1993,
with ‘g’. Searching for d???g would find all was independent of MS-DOS and provided
such words with five letters. better stability, security, and multitasking;
however, it required more expensive hard-
WIMP /wimp/ (windows, icons, mouse, ware and was too slow for some uses, es-
and pointers) A GUI (graphical user in- pecially computer games. It was succeeded
terface) as used in the Macintosh and Win- by Windows 2000 and then by the current
dows operating systems. It was first version, Windows XP, which finally uni-
developed in the 1970s at PARC (Xerox fied the two lines of development. Win-
Palo Alto Research Center).
dows CE is a smaller version of Windows
for use on hand-held and palm computers.
Winchester disk drive /win-chess-ter/ A
See tables overleaf.
type of DISK DRIVE introduced by IBM in the
early 1970s. It was adopted by many man-
Windows 3.x See Windows.
ufacturers and used in large and small com-
puters. It uses one or more hard MAGNETIC
DISKS – known as Winchester disks – that
Windows 95 See Windows.
are mounted inside a hermetically sealed
container together with the read/write
Windows 98 See Windows.
heads and their supporting mechanism. All
modern fixed hard disk units are Winches- Windows 2000 See Windows.
ter disk drives.
Windows CE See Windows.
window 1. A rectangular area on a dis-
play screen inside which a portion of a Windows ME See Windows.
stored image or file can be displayed. The
window can be of any size up to that of the Windows NT See Windows.
screen; more than one window can usually
be displayed at once. The process of mak- Windows open services architecture
ing a portion of an image or file visible (WOSA) A set of application program-
through the window is called windowing. ming interfaces in Microsoft Windows to
The visible window formed by the process enable Windows applications from a vari-
can be moved to allow examination of the ety of sources to communicate with each
different portions making up the entire other.
stored image or file.
2. In a GUI, a similar area on a display Windows XP See Windows.
screen used to display a FORM.
Winsock /win-sok/ The programming
Windows Trademark A Microsoft GUI interface in a Windows operating system
operating system introduced in 1983. Early that handles input and output requests for
versions were in fact MS-DOS applications Internet applications. A comparable inter-
that extended its capabilities and increas- face exists for Macintosh computers.
ingly bypassed its limitations. Windows
3.x became the dominant PC operating Wintel /win-tel/ An Intel-based PC run-

239
WinZip

WINDOWS VERSIONS

Version Date Main technologies


Windows 1 November Windows dialogs, task switching, CGA and EGA
1985 graphics. A very basic mouse-driven GUI; resizable
windows were not standard, windows could only be
tiled not overlapped and most of the functionality was
in drop-down menus. There were very few Windows
programs.
Windows 2 November Data sharing for applications through dynamic data
1987 exchange, extended memory support, icons for
programs and files, Word and Excel made their debut.
Windows/286 May 1988 Windows 2.1 giving extended memory support.
Windows/386 May 1988 Windows 286 with true multitasking, achieved by
using the memory addressing capabilities of the Intel
80386 processor.
Windows 3 May 1990 More consistent and streamlined with support for
VGA. Support for 16MB of RAM and virtual memory.
1991 Support for CD-ROM drives and audio hardware.
Windows 3.1 April 1992 OLE drag and drop operations, support for SVGA
and XGA graphics, and scalable True Type fonts.
Windows for June 1992 Peer-to-peer workgroups and domain-network support.
Workgroups Applications could be scheduled, user file and printer
3.1 sharing and a simple e-mail client were implemented.
Version 3.11(needed a 386/SX processor to run on)
introduced security features and a remote access server.
Windows May 1993 A 32-bit operating system providing more stablility
NT 3.1 and security with integrated networking and pre-
emptive multitasking. It introduced the NTFS filing
system and the Win 32 API.
Windows 95 August An updated GUI bringing in the start button, the
1995 taskbar and the Desktop. A central Registry was used
to control operations. Various releases gave the FAT32
file system and USB support.

ning a Microsoft Windows operating sys- number of triangular faces. See also ren-
tem. dering.

WinZip A Windows program equiva- wireless LAN (WLAN) A LAN that


lent to the MS-DOS-based PKZIP and communicates using radio signals, infrared
PKUNZIP, which compresses and uncom-
optical signals, or microwaves.
presses zip files.

wireframe model /wÿ-er-fraym/ The wizard /wiz-erd/ An interactive help util-


representation of a three-dimensional ob- ity that provides step by step help to install
ject by a set of lines resembling a wire software or to perform a particular task.
frame. For example, a sphere can be repre-
sented as a polygon made up of a large WLAN /dub-’l-yoo-lan/ See wireless LAN.

240
word

WINDOWS VERSIONS

Version Date Main technologies


Windows NT4 August This had a Windows 95 interface but with much
1996 improved network and security handling. The server
version provided the capability for good TCP/IP and
network management.

Windows 98 June 1998 This integrated Internet Explorer with the operating
system, gave improved USB support and introduced
ACTIVE desktop.

Windows 2000 February Support for dynamic plug-and-play, IEEE-1394, Direct


Professional 2000 X 6. Proper ACPI power management with hibernation
and suspend modes.

Windows ME September Easier for users to maintain with system restore and
2000 auto update. A fully functional media player and
scanner and camera wizards.

Windows XP October Professional and home versions. A unified NT codebase


2001 with a new start panel that changed to reflect the
applications being used. A good Windows for mobile
users with 802.1b Wi-Fi support and better offline
folder synchronization. A 64-bit version was also
released.

Windows September The living room PC. Windows XP with a different


Media Center 2002 GUI, giving a remote-control-driven interface for
Edition playing music, showing DVDs and watching/recording
live TV.

Windows XP November A pen-based ‘ink’ input system, with voice recognition


Tablet PC 2002 and handwriting analysis. A 2005 edition included
Edition several enhancements making it easier to use the ‘ink’
interface with standard Windows applications.

Windows Vista Autumn A media-friendly interface with virtual folders,


2006? translucent Windows, XML metadata emphasis and
a new Start menu.

word (machine word; computer word) What the contents of a word signify is
A collection of bits that is treated as a sin- determined entirely by its context. A given
gle unit by the hardware of a computer. bit sequence could represent a MACHINE IN-
The number of bits in a word is called the STRUCTION in one part of main store, while
word length. The word length is fixed in in another part it might represent an IN-
most computers, and in present-day ma- TEGER number, a REAL NUMBER, or per-
chines is usually 32 bits. Main store is di- haps one or more CHARACTERS, depending
vided into either words or BYTES. In the on word length. A 32-bit word, for ex-
former case, each storage location holds ample, could hold integers between
one word, and the word is thus the small- –2 147 483 648 and +2 147 483 647, or
est addressable unit in the computer sys- up to four characters, or a FLOATING-POINT
tem, i.e. the smallest unit to be identified by NUMBER with a PRECISION of about seven
an ADDRESS. digits, or a machine instruction.

241
Word

Word (Microsoft Word) A WORD-PRO- other, scheduling meetings, and so on. In


CESSING application developed by Mi- sophisticated workgroup systems work-
crosoft. First released for MS-DOS systems flows can be defined so that information is
in 1983, versions followed for the Macin- automatically forwarded to the appropri-
tosh in 1985 and Windows in 1989. It has ate people at the appropriate time.
been upgraded several times and the cur-
rent versions are Word 2003 (Windows) working space (workspace; working
and Word 2004 (Macintosh). The most store; working area; scratchpad) A por-
widely used word processor in the world, it tion of MAIN STORE that is used for the tem-
forms part of Microsoft OFFICE. porary storage of data during processing,
including intermediate results needed dur-
word length See word. ing a calculation. The contents of the
working space will not be preserved after
word processing (wp, WP) Using a the program has finished. It is the responsi-
computer program to compose letters, re- bility of the programmer to ensure that the
ports, and other documents and to edit, re- working space does not overlap the pro-
format, store, and print them. The gram code, although in many high-level
document is automatically displayed on languages and operating systems this is
the screen as it is typed on the keyboard, made difficult or impossible.
and words can be corrected, inserted, and
deleted. The program allows the user to workspace /werk-spayss/ See working
specify left and right margins between
space.
which text is automatically justified and
hyphenated (if desired) as it is typed in. It is
workstation /werk-stay-shŏn/ 1. A posi-
possible to reposition blocks of text in the
tion in, say, an office or factory where an
document, to search for and replace strings
operator has access to all the facilities re-
of text in the document, to add text from
quired to perform a particular task that in-
other files, to specify FONTS, typesize, bold-
volves a computer in some way.
face, italics, and other typographic attrib-
utes, and to include tables, pictures or 2. A powerful desktop computer, usually
other graphics, etc. Spelling and grammar part of a network.
can usually be checked. The document can
be stored for future use and/or printed any World Wide Web (Web; WWW) A
number of times. Variable information part of the INTERNET consisting of a very
such as names, addresses, or prices can be large number of documents (Web pages)
substituted when printing the document linked by hyperlinks.
for easy production of form letters, con-
tracts, etc. World Wide Web Consortium See
W3C.
word processor (wp, WP) A computer
program that provides a WORD PROCESSING worm A program that is introduced into
facility. a host and replicates itself to other com-
puters across a NETWORK. Like a VIRUS, a
work file A FILE held very briefly on worm can carry a malicious PAYLOAD.
backing store and used to overcome space
limitations in main store or to carry infor- WORM /werm/ (write once read many
mation between one job and the next. times) An optical disk that, once
recorded, can be read over and over again
workgroup computing The comput- but cannot be written to again. See CD;
ing that occurs when all the individuals in DVD.
a workgroup have computers connected to
a network that gives them such functional- WOSA /wo-să/ See Windows open ser-
ity as sharing files, sending e-mail to each vices architecture.

242
WYSIWYG

wp (WP) See word processing; word write protection A system for the pre-
processor. vention of recording (writing) information
usually on a disk.
wrap-around A feature of a VDU or
printer, allowing it to output lines of text
write-protect notch A small opening in
that would otherwise be too long to be dis-
played or printed in their entirety. The line the jacket of a FLOPPY DISK that is used to
appears as two or more successive lines on prevent the disk from being written to.
the screen or paper. There is a tab in a hole in the corner of the
disk that, when removed, means the disk is
write To record data in some form of write-protected.
storage, usually either in a magnetic
medium or in semiconductor RAM. WWW See World Wide Web.
write head See tape unit.
WYSIWYG /wiz-ă-wig/ (what you see is
write instruction A MACHINE INSTRUC- what you get) What is seen on a screen is
TION that causes an item of data to be an accurate representation of how text,
recorded on some form of storage. graphics, etc., will appear when printed.

243
X

X25 A network protocol that allows on RELATIONAL DATABASES. XML Query


computers on different public networks to was released by the W3C as a working draft
communicate over long distances by means in 2003 and is being regularly updated.
of an intermediary computer at the net-
work level layer. Xmodem /eks-moh-dem/ An error-cor-
recting modem protocol developed in
x86 The generic name for the Intel series 1978, which has become the de facto stan-
of processors that includes the 8086, the dard. Data is sent in 128-byte blocks. See
80286, the 386, the 486, and PENTIUM fam- also Ymodem; Zmodem.
ilies.
XON/XOFF /eks-on eks-off/ See flow
X500 A standard way to develop an control.
electronic directory service of employees in
an organization. Many companies have XOR gate /eks-or/ (exclusive-OR gate)
created an X500 directory and these are or- See nonequivalence gate.
ganized into a single global directory avail-
able to anyone on the Internet. XPath A language for addressing and
selecting parts of an XML document. For
x and y coordinates The horizontal example, when applied to an XML file
and vertical address of any pixel on a com- containing a list of books the XPath ex-
puter screen. pression ‘Book[Title[‘Facts On File Dictio-
nary of Computing’]]’ might select the
xDSL A term referring collectively to all Book ELEMENT describing this dictionary.
types of digital subscriber lines (DSLs). XPath is used in other XML technologies,
such as XML QUERY and XSL. The XPath
Xeon /zee-on/ See Pentium. specification was released as a recommen-
dation in 1999 and is maintained by the
XHTML See HTML. W3C.

XML (extensible markup language) A XQuery See XML Query.


simpler and easier to use version of SGML.
Introduced for Web development, it allows X series A set of recommendations
customized tags to be created and gives adopted by the International Telecommu-
greater flexibility than is possible with nications Union Telecommunication Stan-
older HTML document coding systems. dardization Sector (ITU-T) and ISO. These
standardize equipment and protocols for
XML Query (XQuery) A language for use in public-access and private-computer
querying and extracting data from XML networks.
documents. XML Query uses XPATH ex-
pressions to isolate the required parts of XSL (extensible stylesheet language) A
the document(s) and provides facilities for set of languages for transforming and for-
manipulating the retrieved data. It thus matting XML documents. XSL consists of
performs a similar function to that of SQL three parts. XSLT (XSL Transformations)

244
XSL

is used to specify rules that manipulate and used to select which parts of the input doc-
restructure all or selected parts of an XML ument are subject to each transformation
document. The output can be an XML or formatting rule. The specification of all
document, but can also be PLAIN TEXT, the rules necessary to achieve a particular
HTML, etc.: a common use of XSLT is to transformation and/or presentation is con-
change XML to HTML so it can be down- tained in a separate file called an XSL
load over the Web. XSL-FO (XSL Format- stylesheet, which is itself a valid XML doc-
ting Objects) is used with XSLT to specify ument. XSL was first proposed in 1997
presentational details (typeface, type size, and was released as a W3C recommenda-
color, page layout, etc.) for the various tion in 2001. XSLT was quickly adopted
parts of an XML document. XSL-FO because its transformation capabilities met
processors typically use these specifications a need among XML developers. XSL-FO,
to produce output in a format that can be however, was taken up much more slowly
viewed on screen or printed, such as POST- and is still not widely used because were al-
SCRIPT or PDF (see Acrobat). The third part ready other methods of formatting XML,
of XSL is the XPATH language, which is e.g. CASCADING STYLE SHEETS.

245
Y

Yahoo! A Web PORTAL that began as a Y2K See millennium bug.


hierarchical directory of Web sites orga-
nized by category. Yahoo! links to several Ymodem /wÿ-moh-dem/ A modem pro-
other popular Web search sites if a search tocol based on XMODEM, which sends data
is unsuccessful on Yahoo!. in 1024-byte blocks.

246
Z

zap /zap/ 1. In programming, a correc- are more expensive than conventional


tion for a computer code problem. Incor- sockets.
rect compiled code can be overlaid with a
fix, which is called a zap. zip The file extension of a file that has
2. To erase or remove something. For ex- been compressed using PKZIP.
ample a Macintosh PROM can be zapped,
i.e. erased, so that the system can rebuild Zip drive Trademark A small portable
its contents. disk drive supplied by Iomega Corpora-
tion. Disks come in three sizes, 100 Mb,
zero wait state The situation in which a 250 Mb, and 750 Mb. A Zip drive is
processor is used with no WAIT STATE needed to read and write 3.5-inch Zip disks.
pauses.
Zmodem /zee-moh-dem/ A modem pro-
ZIF socket /ziff/ (zero insertion forces tocol based on XMODEM, which sends data
socket) A chip socket in which a chip in 512-byte blocks.
can be inserted and removed without
using special tools. The ZIF socket con- zoom /zoom/ An enlarged or diminished
tains a lever that opens and closes, or a view of an image or part of an image.
screw, thus securing the microprocessor in Many applications include a zoom feature
place. ZIF sockets take up more space and to enable editing at a more detailed level.

247
APPENDIXES
Appendixes
Symbols and Notation

Arithmetic and algebra


equal to =
not equal to ≠
identity ≡
approximately equal to ⬄
approaches →
proportional to ∝
less than <
greater than >
less than or equal to ≤
greater than or equal to ≥
much less than <<
much greater than >>
plus, positive +
minus, negative –
plus or minus ±
multiplication a × b
a.b
division a ÷ b
a/b
magnitude of a |a|
factorial a a!
logarithm (to base b) logba
common logarithm log10a
natural logarithm logea or lna
summation ∑
continued product Π

251
Appendixes
Symbols and Notation (continued)

Geometry and trigonometry


angle ⬔
triangle
square ⵧ
circle 䊊
parallel to ||
perpendicular to Ⲛ
congruent to ≡
similar to ~
sine sin
cosine cos
tangent tan
cotangent cot, ctn
secant sec
cosecant cosec, csc
inverse sine sin–1, arc sin
inverse cosine cos–1, arc cos
inverse tangent tan–1, arc tan
etc. etc.
Cartesian coordinates (x, y, z)
spherical coordinates (r, θ, φ)
cylindrical coordinates (r, θ, z)
direction numbers or cosines (l, m, n)

252
Appendixes
Symbols and Notation (continued)

Sets and logic


implies that ⇒
is implied by ⇐
implies and is implied ⇔
by (if and only if)
set a, b, c,... {a, b, c, ...}
is an element of ∈
is not an element of ∉
such that :
number of elements in set S n(S)
universal set E or Ᏹ
empty set ∅
complement of S S′
union ∪
intersection ∩
is a subset of ⊂
corresponds one-to-one with ↔
x is mapped onto y x→y
conjunction ∧
disjunction ∨
negation (of p) ~p or ¬p
implication → or ⊃
biconditional (equivalence) ≡ or ↔
the set of natural numbers ⺞
the set of integers ⺪
the set of rational numbers ⺡
the set of real numbers ⺢
the set of complex numbers ⺓

253
Appendixes
Symbols and Notation (continued)

Calculus

increment of x x or δx

limit of function of
x as x approaches a Lim f(x)
x→a

derivative of f(x) df(x)/dx or f′(x)

second derivative of f(x) d2f(x)/dx2 or f″(x)


etc. etc.

indefinite integral of f(x)


with respect to x 冮f(x)dx

definite integral with a


limits a and b 冮 f(x)dx
b
partial derivative of
function f(x,y) with respect to x ∂f(x,y)/∂x

254
Appendixes
File Extensions

There are a large number of different file extensions in use. Some of the more common
extension names are listed below.

.7z 7-zip compressed archive file .cmd command file in Windows,


MS-DOS, and OS/2
.afm PostScript font metrics file
.cmf Corel Metafile format graphics
.ai Adobe Illustrator graphics file
file
.arc compressed archive file
.com command or program file
.asc ASCII text file
.cpp C++ source file
.asp ASP web page
.cs C# source file
.atm Adobe Type Manager file
.css cascading style sheets file
.au audio file
.csv comma separated values file
.avi audio visual interleaved
.ct Paint Shop Pro graphics file
multimedia file
.dat data file
.bac backup file
.dbf dBase and FoxPro database file
.bak backup file
.dcr Macromedia Shockwave
.bas Basic source file
multimedia file
.bat batch program file in MS-DOS
.dll dynamic link library file
and Windows
.doc document file in Microsoft
.bin compressed MacBinary file
Word (and some other word-
.bmp bitmapped graphics file processing applications)

.c C source file .dos MS-DOS file


.c++ C++ source file .dot Microsoft Word document
template
.cab Cabinet compressed archive file
.drv device driver file
.cbl Cobol source file
.dtd document type definition file for
.cdr CorelDraw graphics file SGML and XML
.cgi Common Gateway Interface .dtp Microsoft publisher document
script file file
.cgm Computer Graphics metafile .dv video file
format file
.eps encapsulated PostScript file
.chk Windows unidentified data
saved by ScanDisk .exe executable program file
.class Java class file .fax fax file
.clp Windows clipboard file .fla Macromedia Flash movie file

255
Appendixes
File Extensions (continued)

.fon Windows system font file .msi Windows installer file


.for Fortran source file .obj compiled program module file
.gid Windows index file .ole Microsoft OLE object
.gif Gif format graphics file .p Pascal source file
.gtar compressed Unix file .pas Pascal source file
.gz compressed Unix file .pcd Kodak Photo-CD file
.h C or C++ header file .pcx Paintbrush bitmap graphics file
.hex Macintosh BinHex encoded file .pdd Photoshop file
.hlp Windows help file .pdf Adobe Acrobat portable
document format file
.htm HTML file
.pfb PostScript font file
.html HTML file
.pfm PostScript font metrics file
.ico Windows icon file
.pic PC Paint graphics file
.ini initialization file in MS-DOS
.pict Macintosh PICT graphics file
.iso CD image file
.png PNG format graphics file
.jar Java archive file
.pps Microsoft PowerPoint slide
.java Java source file show file
.jpe JPEG format graphics file .ppt Microsoft PowerPoint
.jpeg JPEG format graphics file presentation file

.jpg JPEG format graphics file .prn Windows print file

.js JavaScript source file .ps PostScript print file

.lb library file .psd Photoshop file

.lzh LZH archive file .pub document file in certain DTP


programs
.mac MacPaint graphics file
.qti Apple QuickTime image file
.mdb Microsoft Access database file
.qtm Apple QuickTime movie file
.mid MIDI format audio file
.qxd QuarkXpress document file
.midi MIDI format audio file
.qxl QuarkXpress library file
.mime MIME format file
.ra RealAudio sound file
.mov Apple QuickTime video file
.ras Sun raster image bitmap file
.mp3 MPEG compressed audio file
.rm RealAudio movie file
.mpeg MPEG video file
.rtf rich text format file
.mpg MPEG video file
.sea Macintosh self-extracting file
.msg Microsoft Outlook file compressed using StuffIt

256
Appendixes
File Extensions (continued)

.sgm SGML file .uud file produced in ASCII by


uuencode
.sgml SGML file
.uue file produced in binary by
.shtml HTML file with SSI uudecode
.sit Macintosh file compressed with .vb Visual Basic source file
StuffIt
.vbs VBScript source file
.spl Macromedia Shockwave Flash
file .vp Ventura Publisher document file

.stm HTML file with SSI .wav WAV format audio file

.stml HTML file with SSI .wp Corel WordPerfect document


file
.sun Sun graphics file
.wpg Corel WordPerfect graphics file
.svg SVG format graphics file
.wps Microsoft Works document file
.sw Macromedia Shockwave audio
file .wri Microsoft Write document file

.sys system file .xht XHTML file

.tar Unix archive file .xhtm XHTML file

.taz Unix archive file .xhtml XHTML file


xls Microsoft Excel spreadsheet file
.tga Targa format bitmap graphics
file xlm XML file
.tif TIFF format graphics file xsd XML schema file
.tiff TIFF format graphics file xsl XSL file
.tmp temporary file xslt XSL-T file
.ttf TrueType font file .xtg QuarkXpress tagged format file
.txt ASCII text file .zip ZIP compressed archive file

257
Appendixes
Organizational Top-Level Domain Names

Internet top-level domain names are of two types: organizational names and geographic
names. Organizational domain names indicate the type of Internet site and are used as
follows:
.aero air transport industry
.biz businesses
.cat relating to Catalan language or culture
.com any purpose (originally for commercial organizations)
.coop cooperative associations
.edu colleges and universities (mainly US)
.gov US government (nonmilitary)
.info any purpose
.int international organizations established by treaty
.jobs businesses advertising jobs
.mil US military; this has three subdomains:
.af.mil Air Force
.army.mil Army
.navy.mil Navy
.mobi mobile devices and related services
.museum museums
.name individuals
.net any purpose (originally for network-related
organizations)
.org any purpose, but especially nonprofit-making
organizations
.pro professionals (doctors, lawyers, accountants)
.travel travel industry

The following proposed new top-level domains are under consideration:

.asia Asia and the Pacific region


.post postal-service industry
.tel telephone-Internet communications services
.xxx sexually explicit material

258
Appendixes
Geographic Top-Level Domain Names

Geographic names indicate the country. When a geographic name is the top-level do-
main, the second-level subdomain in the US may indicate an organization or a state (see
page 264). For other countries, it may indicate an organization. For example
.co.uk a company in the United Kingdom
.ed.uk an educational establishment in the United Kingdom

Geographic names are as shown below

.ac Ascension Island .bg Bulgaria


.ad Andorra .bh Bahrain
.ae United Arab Emirates .bi Burundi
.af Afghanistan .bj Benin
.ag Antigua and Barbuda .bm Bermuda
.ai Anguilla .bn Brunei Darussalam
.al Albania .bo Bolivia
.am Armenia .br Brazil
.an Netherlands Antilles .bs Bahamas
.ao Angola .bt Bhutan
.aq Antarctica .bv Bouvet Island
.ar Argentina .bw Botswana
.as American Samoa .by Belarus
.at Austria .bz Belize
.au Australia .ca Canada
.aw Aruba .cc Cocos Islands
.ax Aland Islands .cd Congo
.az Azerbaijan .cf Central Africa Republic
.ba Bosnia-Herzegovina .cg Congo-Brazzaville
.bb Barbados .ch Switzerland
.bd Bangladesh .ci Cote D’Ivoire
.be Belgium .ck Cook Islands
.bf Burkina Faso .cl Chile

259
Appendixes
Geographic Top-Level Domain Names (continued)

.cm Cameroon .gb United Kingdom (also .uk)


.cn China .gd Grenada
.co Colombia .ge Georgia (Republic of)
.cr Costa Rica .gf French Guiana
.cs Serbia and Montenegro .gg Guernsey
(formerly Czechoslovakia)
.gh Ghana
.cu Cuba
.gi Gibraltar
.cv Cape Verde
.gl Greenland
.cx Christmas Island
.gm Gambia
.cy Cyprus
.gn Guinea
.cz Czech Republic
.gp Guadaloupe
.de Germany
.gq Equatorial Guinea
.dj Djibouti
.gr Greece
.dk Denmark
.gs South Georgia and South
.dm Dominica Sandwich Islands
.do Dominican Republic .gt Guatemala
.dz Algeria .gu Guam
.ec Ecuador .gw Guinea-Bissau
.ee Estonia .gy Guyana
.eg Egypt .hk Hong Kong
.eh Western Sahara .hm Heard Island and McDonald
.er Eritrea Islands

.es Spain .hn Honduras

.et Ethiopia .hr Croatia (Hrvatska)

.eu European Union .ht Haiti

.fi Finland .hu Hungary

.fj Fiji .id Indonesia

.fk Falkland Islands .ie Ireland

.fm Micronesia (Federated States of) .il Israel


.fo Faeroe Islands .im Isle of Man
.fr France .in India
.ga Gabon .io British Indian Ocean Territory

260
Appendixes
Geographic Top-Level Domain Names (continued)

.iq Iraq .mc Monaco


.ir Iran .md Moldova
.is Iceland .mg Madagascar
.it Italy .mh Marshall Islands
.je Jersey .mk Macedonia

.jm Jamaica .ml Mali

.jo Jordan .mm Myanmar

.jp Japan .mn Mongolia

.ke Kenya .mo Macau

.kg Kyrgyzstan .mp Northern Mariana Islands

.kh Cambodia .mq Martinique

.ki Kiribati .mr Mauritania

.km Comoros .ms Montserrat

.kn St. Kitts-Nevis .mt Malta

.kp Korea (Democratic People’s .mu Mauritius


Republic) .mv Maldives
.kr Korea (Republic of) .mw Malawi
.kw Kuwait .mx Mexico
.ky Cayman Islands .my Malaysia
.kz Kazakhstan .mz Mozambique
.la Laos .na Namibia
.lb Lebanon .nc New Caledonia
.lc Saint Lucia .ne Niger
.li Liechtenstein .nf Norfolk Island
.lk Sri Lanka .ng Nigeria
.lr Liberia .ni Nicaragua
.ls Lesotho .nl Netherlands
.lt Lithuania .no Norway
.lu Luxembourg .np Nepal
.lv Latvia .nr Nauru
.ly Libya .nu Niue
.ma Morocco .nz New Zealand

261
Appendixes
Geographic Top-Level Domain Names (continued)

.om Oman .sn Senegal


.pa Panama .so Somalia
.pe Peru .sr Suriname
.pf French Polynesia .st São Tomé and Principe
.pg Papua New Guinea .sv El Salvador
.ph Philippines .sy Syrian Arab Republic
.pk Pakistan .sz Swaziland
.pl Poland .tc Turks and Caicos Islands
.pm St. Pierre and Miquelon .td Chad
.pn Pitcairn Island .tf French Southern Territories
.pr Puerto Rico .tg Togo
.ps Palestinian Territories .th Thailand
.pt Portugal .tj Tajikistan
.pw Palau .tk Tokelau
.py Paraguay .tl Timor-Leste
.qu Qatar .tm Turkmenistan
.re Reunion Island .tn Tunisia
.ro Romania .to Tonga
.ru Russian Federation .tp East Timor
.rw Rwanda .tr Turkey
.sa Saudi Arabia .tt Trinidad and Tobago
.sb Solomon Islands .tv Tuvalu
.sc Seychelles .tw Taiwan
.sd Sudan
.tz Tanzania
.se Sweden
.ua Ukraine
.sg Singapore
.ug Uganda
.sh Saint Helena
.uk United Kingdom (also .gb)
.si Slovenia
.um United States Minor Outlying
.sj Svalbard and Jan Mayen Islands Islands
.sk Slovakia .us United States
.sl Sierra Leone .uy Uruguay
.sm San Marino .uz Uzbekistan

262
Appendixes
Geographic Top-Level Domain Names (continued)

.va Vatican City State .ws Samoa (formerly Western


Samoa)
.vc Saint Vincent and the
Grenadines .ye Yemen
.ve Venezuela .yt Mayotte
.vg British Virgin Islands .yu Yugoslavia
.vi United States Virgin Islands .za South Africa
.vn Vietnam .zm Zambia
.vu Vanuatu .zw Zimbabwe
.wf Wallis and Futuna Islands

263
Appendixes
United States Subdomain Names

There are various subdomains in use with the top-level domain name .us. A few
of these refer to organizations, for example:
.lib.us United States library
.state.us state government

Most common subdomain names are used for states, for example:
.ak.us Alaska
.ar.us Arkansas
.ca.us California
.fl.us Florida
.ga.us Georgia
.il.us Illinois
.in.us Indiana
.la.us Louisiana
.ma.us Massachusetts
.md.us Maryland
.mi.us Michigan
.mn.us Minnesota
.ms.us Mississippi
.nc.us North Carolina
.ne.us Nebraska
.nh.us New Hampshire
.ny.us New York (state)
.oh.us Ohio
.ok.us Oklahoma
.or.us Oregon
.va.us Virginia
.vt.us Vermont
.wv.us West Virginia
.wy.us Wyoming
A third-level subdomain may be used for a town or city, as in:
.atl.ga.us Atlanta, Georgia
.nyc.ny.us New York City, New York
.sf.ca.us San Francisco, California

264
Appendixes
Number Conversions

Decimal Binary Octal Hex

1 1 1 1
2 10 2 2
3 11 3 3
4 100 4 4
5 101 5 5
6 110 6 6
7 111 7 7
8 1000 10 8
9 1001 11 9
10 1010 12 A
11 1011 13 B
12 1100 14 C
13 1101 15 D
14 1110 16 E
15 1111 17 F
16 10000 20 10
17 10001 21 11
18 10010 22 12
19 10011 23 13
20 10100 24 14
21 10101 25 15
22 10110 26 16
23 10111 27 17
24 11000 30 18
25 11001 31 19
26 11010 32 1A
27 11011 33 1B
28 11100 34 1C
29 11101 35 1D
30 11110 36 1E
31 11111 37 1F
32 100000 40 20
33 100001 41 21
34 100010 42 22
35 100011 43 23
36 100100 44 24
37 100101 45 25
38 100110 46 26
39 100111 47 27
40 101000 50 28

265
Appendixes
Number Conversions (continued)

Decimal Binary Octal Hex


41 101001 51 29
42 101010 52 2A
43 101011 53 2B
44 101100 54 2C
45 101101 55 2D
46 101110 56 2E
47 101111 57 2F
48 110000 60 30
49 110001 61 31
50 110010 62 32
51 110011 63 33
52 110100 64 34
53 110101 65 35
54 110110 66 36
55 110111 67 37
56 111000 70 38
57 111001 71 39
58 111010 72 3A
59 111011 73 3B
60 111100 74 3C
61 111101 75 3D
62 111110 76 3E
63 111111 77 3F
64 1000000 100 40
65 1000001 101 41
66 1000010 102 42
67 1000011 103 43
68 1000100 104 44
69 1000101 105 45
70 1000110 106 46
71 1000111 107 47
72 1001000 110 48
73 1001001 111 49
74 1001010 112 4A
75 1001011 113 4B
76 1001100 114 4C
77 1001101 115 4D
78 1001110 116 4E
79 1001111 117 4F
80 1010000 120 50
81 1010001 121 51

266
Appendixes
Number Conversions (continued)

Decimal Binary Octal Hex


82 1010010 122 52
83 1010011 123 53
84 1010100 124 54
85 1010101 125 55
86 1010110 126 56
87 1010111 127 57
88 1011000 130 58
89 1011001 131 59
90 1011010 132 5A
91 1011011 133 5B
92 1011100 134 5C
93 1011101 135 5D
94 1011110 136 5E
95 1011111 137 5F
96 1100000 140 60
97 1100001 141 61
98 1100010 142 62
99 1100011 143 63
100 1100100 144 64
101 1100101 145 65
102 1100110 146 66
103 1100111 147 67
104 1101000 150 68
105 1101001 151 69
106 1101010 152 6A
107 1101011 153 6B
108 1101100 154 6C
109 1101101 155 6D
110 1101110 156 6E
111 1101111 157 6F
112 1110000 160 70
113 1110001 161 71
114 1110010 162 72
115 1110011 163 73
116 1110100 164 74
117 1110101 165 75
118 1110110 166 76
119 1110111 167 77
120 1111000 170 78
121 1111001 171 79
122 1111010 172 7A

267
Appendixes
Number Conversions (continued)

Decimal Binary Octal Hex


123 1111011 173 7B
124 1111100 174 7C
125 1111101 175 7D
126 1111110 176 7E
127 1111111 177 7F
128 10000000 200 80
129 10000001 201 81
130 10000010 202 82
131 10000011 203 83
132 10000100 204 84
133 10000101 205 85
134 10000110 206 86
135 10000111 207 87
136 10001000 210 88
137 10001001 211 89
138 10001010 212 8A
139 10001011 213 8B
140 10001100 214 8C
141 10001101 215 8D
142 10001110 216 8E
143 10001111 217 8F
144 10010000 220 90
145 10010001 221 91
146 10010010 222 92
147 10010011 223 93
148 10010100 224 94
149 10010101 225 95
150 10010110 226 96
151 10010111 227 97
152 10011000 230 98
153 10011001 231 99
154 10011010 232 9A
155 10011011 233 9B
156 10011100 234 9C
157 10011101 235 9D
158 10011110 236 9E
159 10011111 237 9F
160 10100000 240 A0
161 10100001 241 A1
162 10100010 242 A2
163 10100011 243 A3

268
Appendixes
Number Conversions (continued)

Decimal Binary Octal Hex


164 10100100 244 A4
165 10100101 245 A5
166 10100110 246 A6
167 10100111 247 A7
168 10101000 250 A8
169 10101001 251 A9
170 10101010 252 AA
171 10101011 253 AB
172 10101100 254 AC
173 10101101 255 AD
174 10101110 256 AE
175 10101111 257 AF
176 10110000 260 B0
177 10110001 261 B1
178 10110010 262 B2
179 10110011 263 B3
180 10110100 264 B4
181 10110101 265 B5
182 10110110 266 B6
183 10110111 267 B7
184 10111000 270 B8
185 10111001 271 B9
186 10111010 272 BA
187 10111011 273 BB
188 10111100 274 BC
189 10111101 275 BD
190 10111110 276 BE
191 10111111 277 BF
192 11000000 300 C0
193 11000001 301 C1
194 11000010 302 C2
195 11000011 303 C3
196 11000100 304 C4
197 11000101 305 C5
198 11000110 306 C6
199 11000111 307 C7
200 11001000 310 C8
201 11001001 311 C9
202 11001010 312 CA
203 11001011 313 CB
204 11001100 314 CC

269
Appendixes
Number Conversions (continued)

Decimal Binary Octal Hex


205 11001101 315 CD
206 11001110 316 CE
207 11001111 317 CF
208 11010000 320 D0
209 11010001 321 D1
210 11010010 322 D2
211 11010011 323 D3
212 11010100 324 D4
213 11010101 325 D5
214 11010110 326 D6
215 11010111 327 D7
216 11011000 330 D8
217 11011001 331 D9
218 11011010 332 DA
219 11011011 333 DB
220 11011100 334 DC
221 11011101 335 DD
222 11011110 336 DE
223 11011111 337 DF
224 11100000 340 E0
225 11100001 341 E1
226 11100010 342 E2
227 11100011 343 E3
228 11100100 344 E4
229 11100101 345 E5
230 11100110 346 E6
231 11100111 347 E7
232 11101000 350 E8
233 11101001 351 E9
234 11101010 352 EA
235 11101011 353 EB
236 11101100 354 EC
237 11101101 355 ED
238 11101110 356 EE
239 11101111 357 EF
240 11110000 360 F0
241 11110001 361 F1
242 11110010 362 F2
243 11110011 363 F3
244 11110100 364 F4
245 11110101 365 F5

270
Appendixes
Number Conversions (continued)

Decimal Binary Octal Hex


246 11110110 366 F6
247 11110111 367 F7
248 11111000 370 F8
249 11111001 371 F9
250 11111010 372 FA
251 11111011 373 FB
252 11111100 374 FC
253 11111101 375 FD
254 11111110 376 FE
255 11111111 377 FF

271
Appendixes
Web Sites

Apple Computer Inc www.apple.com


British Computer Society www.bcs.org
Cnet Magazine www.cnet.com
Institute of Electrical and Electronics www.ieee.org
Engineers
International Standards www.iso.org/iso/en/
CatalogueListPage.CatalogueList
Linux Online www.linux.org
Microsoft Corporation www.microsoft.com
Sun Developer Network, for Java http://java.sun.com
The Open Group, for UNIX www.unix.org
The Unicode Consortium www.unicode.org
University at Albany (links) http://library.albany.edu/subject/csci.htm
World Wide Web Consortium www.w3.org
ZDNet www.zdnet.com

272
Bibliography
Bibliography

Bacon, J. & Harris, T. Operating Systems. Boston: Addison-Wesley, 2003.

Broy, M. & Denert, E. (eds) Software Pioneers: contributions to software engineering.


New York: Springer-Verlag, 2002.

Collins, H. & Pinch, T. The Golem at large: what you should know about technology.
Cambridge, U.K.: Cambridge University Press, 1998.

Cormen, T.H., Leiserson, C.D., Rivest, R.L., & Stein, C. Introduction to Algorithms.
Cambridge, MA: MIT Press, 2001.

Knuth, D.E. The Art of Computer Programming, Boston: Addison-Wesley, 1997-98.

Devlin, K. Sets, Functions, and Logic: an introduction to abstract mathematics. London:


Chapman and Hall, 2003.

Nissanke, N. Introductory Logic and Sets for Computer Scientists. Boston: Addison-
Wesley, 1999.

Patterson, D. & Hennessy, J. Computer Organisation and Design. San Francisco, CA:
Morgan Kaufmann, 1998.

Pressman, R.S. Software engineering. New York: McGraw-Hill, 2001.

Silberschatz, A., Peterson, J.L., & Galvin, P.C. Operating Systems Concepts. New York:
Addison-Wesley, 1998.

Simon, H.A. The Sciences of the Artificial. Cambridge, MA: MIT Press, 1996.

Tanenbaum, A.S. Structured Computer Organisation. London: Prentice-Hall, 1990.

273

You might also like