Skip to main content

Currently Skimming:

B Glossary
Pages 196-204

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 196...
... Archival database. A database containing data values and other information retained over a period of time and represented as an accurate reflection of the contents at a specified time.
From page 197...
... a buffer storage that contains frequently accessed instructions and data; it is used to reduce access time; (3) an optional part of the directory database in network nodes where frequently used directory information may be stored to speed directory searches.
From page 198...
... A sender can create a signature for a message and encrypt it with his or her private key. The enciphered signature can be decrypted only by the sender's corresponding public key known to the recipient.
From page 199...
... Evaluation involves examination and appraisal of the data presented, assessment of experimental techniques and associated errors, consistency checks for allowed values and units, comparison with other experimental or theoretical values, reanalysis and recalculation of derived quantities as required, selection of best values, and assignment of probable error or reliability.
From page 200...
... A dedicated computer network (either a local-or wide-area network) within a corporation or other private institution intended to serve its own needs for data exchange, electronic mail, bulletin boards, etc.
From page 201...
... A system of multiple parallel structures, containing a highly interconnected set of simple elements, exploiting aspects of their collective behavior and operating according to a strict, deterministic set of rules for proceeding from one step to the next. Normalize.
From page 202...
... A person wishing to receive a secret message can publicly distribute the enciphering key, which, when used by the originator of a message, produces an enciphered message that only the secret deciphering key kept by the recipient can decipher. The first and still most widely used public-key algorithm is the RSA algorithm; the public key is derived from the product of two very large prime numbers, and the strength of protection derives from the size of the prime numbers and the resulting computational difficulty in decomposing the product in those primes.
From page 203...
... A database composed of flat files, each embodying different facets of information about the data, organized by linkages representing one or more relations; the resulting data structure allows the efficient use of many types of data during queries and can be manipulated with great flexibility using a formal relational algebra to derive standard (normalized) forms and to establish equivalencies.
From page 204...
... Typically, the workstation includes enough computing power and data storage capacity to operate free-standing from any other computer, although workstations are often networked to larger systems for data archives, communication with other workstations, etc. As the technology of personal computers has improved, they have taken on functions previously handled on workstations.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.