11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index 565PageRank algorithm <strong>of</strong> 57,210, 211, 423, 480phone platform from 437searching with 423in social networking 441Yahoo! <strong>and</strong> 523YouTube <strong>and</strong> 524Google Apps 21, 107, 211, 217,294, 306Google Book Search 167, 211Google Docs & Spreadsheets 21,107, 211, 294, 517Google Earth 211, 292–293Google Groups 333–334Google Language Tools 271Google Maps 211, 292–293, 294,423Google News 211Google Pack 21Google Product Search 211Gopher 248, 518Gosling, James 255“GO TO Considered Harmful”(Dijkstra) 151Gouraud shading 106government 49, 76, 172–173, 181,250, 436government funding <strong>of</strong> computerresearch 212–213, 404, 462, 472GPL3 (General Public License)150, 352, 457, 478GPS (Global Positioning System)209, 364, 384Gr<strong>and</strong> Theft Auto series 104graphical user interface. See userinterfacegraphics. See computer graphicsgraphics card 213, 213–214BIOS <strong>and</strong> 49–50chipset for 86games <strong>and</strong> 104in IBM PC 236in I/O processing 243in laptops 272microprocessor for 305on motherboard 319in PCs 322performance <strong>of</strong> 106Graphics Device Interface (GDI)308graphics engine 105–106graphics formats 94, 214–215graphics interchange format (GIF)94, 134, 214graphics modeling 105–106graphics tablet 215, 215graphing calculators 71Gray, Elisha 525greedy algorithm 8green, in RGB 93greenhouse emissions 216green PC 101, 215–216Greiner, Helen 60, 253grid computing 87, 155, 216–217,494Grokster 246groupware 217–218Grove, Andrew S. 218, 318GSM (Global System <strong>of</strong> MobileCommunications) 436, 514GUI. See user interfaceGulf War 242Gulliver’s Travels (Swift) 418Gutmans, Andi 372HHackers (Levy) 482hackers <strong>and</strong> hacking 219–220. Seealso computer crime; security<strong>of</strong> application serviceproviders 21banking <strong>and</strong> 39copy protection <strong>and</strong> 246in cyber culture 125IBM <strong>and</strong> 235Mitnick <strong>and</strong> 314in open-source movement352in popular culture 378Stallman <strong>and</strong> 456Stoll <strong>and</strong> 458<strong>of</strong> voting systems 176hacktivism 127hafnium 86HAL 9000 (character) 59Halo (game) 306Halting problem 97Hamming Code 186H<strong>and</strong>book <strong>of</strong> Artificial Intelligence(Feigenbaum, ed.) 190h<strong>and</strong> geometry 48h<strong>and</strong>held scanner 416h<strong>and</strong>writing recognition 220–221,221, 466, 489hanging chads 175, 392Hannibal (robot) 56haptic interfaces 221–222harassment 100, 126, 248, 252,523hard disk 222, 222–223BIOS <strong>and</strong> 49bits in 50in boot sequence 55for data backup 37development <strong>of</strong> 404for file servers 192in game consoles 205in IBM PC 236in information retrieval 240in laptops 272tape drives <strong>and</strong> 467for virtual memory 302hardware 95, 137, 240, 245Harvard Mark I 5, 61, 231, 498Harvey, Brian 285hashing 24, 223–224, 240, 365,448hash sort 448Haskell language 204Hawking, Stephen 151Hawkins, Trip 174Hayek, F. A. 500Hazen, Harold 510HD-DVD 75HDTV 75head-mounted display (HMD)496, 501health, personal 300–301, 367–368, 436heap 24, 224heapsort 447hearing damage, from musicplayers 327heat 101, 305Heinlein, Robert 98Hellman, Martin 145, 180“Hello World” 67Help America Vote Act 176help desks 108HelpMate (robot) 183, 410HelpMate Robotics, Inc. 183help systems 224–225, 233, 308,471. See also technical supportheuristic 8Heuristic Compiler 33Hewlett-Packard (HP) 16, 237, 258hexadecimal system 225–226high-level language 29, 227,252–253, 278, 288, 337. See alsoC (language); C++ (language);FORTRANhigh-speed Internet. See broadb<strong>and</strong>High Tech Heretic (Stoll) 458highway system, automated 71–72Hilbert, David 87Hillis, Daniel 461history (Web browser) 234history <strong>of</strong> computing 226–229HMD (head-mounted display)496, 501Hoare, Anthony 33Hoare, C. A. R. 447H<strong>of</strong>f, Marcian E. “Ted” 304,318–319Holberton, Betty 515Holl<strong>and</strong>, John 28Hollerith, Herman 229–230, 458Homebrew <strong>Computer</strong> Club 18,366, 488, 519home business schemes 345Homel<strong>and</strong> Security 119, 136home media center 299home <strong>of</strong>fice 230–231Honeywell 297Hopper, Grace Murray 90, 231,231–232, 515hospital information systems (HIS)299HotBits 399Hot Plug 63“hot spots” 58, 250, 250Howard, John H. 63HP (Hewlett-Packard) 16, 237, 258HTML (Hypertext MarkupLanguage) 232, 232–233. Seealso DHTML; XHTMLCGI <strong>and</strong> 80–81in document formatting 342for help systems 225for hypertext 233for Internet applicationsprogramming 249with Java 255with JavaScript 256for presentations 381Web browsers <strong>and</strong> 503in Web page design 507for World Wide Web 518XML <strong>and</strong> 520HTTP (HyperText TransferProtocol) 157–158, 233, 438,503, 508, 518Huffman coding 134human-computer symbiosis 139,277, 391human genome 46human mind, modeling 92–93Human Use <strong>of</strong> Human Beings, The(Wiener) 511HVAC, in smart buildings 434hybrid cars 71Hypercard 32, 99, 122, 233, 322hypermedia 233–234. See alsomultimediaHyperterminal 476hypertext 233–234Bush <strong>and</strong> 63in computer history 229Engelbart’s work on 182in help systems 225multimedia <strong>and</strong> 322for World Wide Web 43in World Wide Web 518II18n 246–247IAD (Internet addiction disorder)391IBM (International BusinessMachines) 235–236Amdahl at 10Apple <strong>and</strong> 258in computing history 227Deep Blue <strong>and</strong> 85FORTRAN developed at 202government funding <strong>of</strong> 212hafnium chips by 86Hollerith <strong>and</strong> 230IAS computer <strong>and</strong> 499Java <strong>and</strong> 255mainframes by 290, 290marketing <strong>of</strong> 106Mark I underwritten by 5McCarthy at 297in <strong>of</strong>fice automation 341optical hybrid chip by 356parallel interface by 360patents owned by 245popular culture <strong>and</strong> 378research <strong>of</strong> 404RPG at 412supercomputers <strong>of</strong> 462tape format <strong>of</strong> 467word processor <strong>and</strong> 516X10 at 324IBM/360 227, 235, 290, 290, 323IBM/370 235, 290IBM/390 290IBM MVS JCL 257IBM PC 236–237. See also PCclonesApple II <strong>and</strong> 18, 258boot sequence for 54–55bus in 62in computing history 228in education 99in IBM business 235introduction <strong>of</strong> 366keyboard <strong>of</strong> 265Macintosh <strong>and</strong> 287market entry <strong>of</strong> 106–107microprocessors in 304, 319monitor for 318operating system for 107,206, 305, 307, 321processors for 4, 218reverse engineering <strong>of</strong> 405st<strong>and</strong>ards <strong>and</strong> 457word processing on 516Ibuka, Masaru 445IC. See integrated circuitICANN (Internet Corporation forAssigned Names <strong>and</strong> Numbers)17, 158, 251ICCP (Institute for Certification <strong>of</strong>Computing Pr<strong>of</strong>essionals) 80Icon 83icons 247ICT (Information <strong>and</strong>Communication Technologies)Task Force 251ICYou.com 368IDE (Integrated Drive Electronics)223Identification division 91identity fraud 238identity in the online world 17,124, 125, 237–238, 391, 482, 524identity theft 100, 238–239. Seealso computer crime; onlinefraud <strong>and</strong> scamsbiometrics <strong>and</strong> 49credit card use <strong>and</strong> 146data security <strong>and</strong> 137by hackers 220information collection in384Internet growth <strong>and</strong> 248phishing in 369, 370policy on 472risk <strong>and</strong> 408spyware in 453with viruses 111ideographs 82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!