Home > Blogs > Post Content

~ "Just A Few Techie Definitions" ~ Section 'C' (434 hits)


~ "Just A Few Techie Definitions" ~ Section 'C'
Gregory V. Boulware, Esq.

Ya’ateeh, Y'Ho, Shalom Alaikum, As Salaam Alaikum, Hotep, Hola, Konichiwa, Privyet, Hallo, Ni Hao, Anyoung Haseyo - Hello Family!

With the realization of how long/big the 'Academia Posting' of "Terminus*Infinitus," the series "Just A Few Techie Definitions" will continue in its planned alphabetical offerings from 'B to Z.' Many students also do not have "The One Thing I Know Is..." 'How To Understand Information Technology' as not being required reading and/or the inability to acquire the paperback book, these postings will be of great necessity...it is a pleasure to be able to provide this "Free Education and Self-Help" academic assistance.

Peace and Love,



"It is my commitment, my profound propensity to indefatigably inscribe throughout the annals of time and in the name of education, and Information, my contribution(s) to the practice of "Free Education and Self-Help" Publication(s) For One And All - Across The Globe And Beyond!"



“TheOneThingIKnow Is…”
GregoryV.Boulware, Esq.ASB/CS-CP
#BoulwareBooks #Education #Information #SelfHelp

"Terminus*Infinitus": Beyond A to Z
Gregory V. Boulware, Esq.



A high-level programming language developed by Dennis Ritchie at Bell Labs in the mid-1970s.
Although originally designed as a systems programming language, 'C' has proved to be a powerful and flexible language that can be used for a variety of applications, from business programs to engineering. C is a particularly popular language for personal computer programmers because it is relatively small--it requires less memory than other languages. The first major program written in C was the UNIX operating system, and for many years C was considered to be in extricably linked with UNIX. Now, however, C is an important language independent of UNIX.

Although it is a high-level language, C is much closer to assembly language than are most other high-level languages. This closeness to the underlying machine language allows C programmers to write very efficient code. The low-level nature of C, however, can make the language difficult to use for some types of applications.

C and C++ Programming Tutorials:

A collection of links to downloadable C programming tutorials, as well as a list of reference books, an FAQ, and the origins of C and C++. Association of C/C++ users Site of ACCU, the Association of C and C++ users. It contains information on the C family of programming languages including publications, book reviews, links to C sites, and related information.


Content Addresses Storage.

(1)Short for column address strobe.

(2)Short for content addressed storage.
Affordable Internet Service Built for your Business. Free professional installation & routers. Up to 2X the upload speed of many standard DSL services.


EMC Services High volume computer reseller, offering brand name products and technology solutions for business, government and education.

Characters and ASCII Equivalents:

Here are some of the more commonly used characters and their ASCII equivalents.
To use a character just copy and paste the ascii symbol into the formatting of your Web page at the spot where you want the character to show up.


Short for Customer Information Control System, a TP monitor from IBM that was originally developed to provide transaction processing for IBM mainframes. It controls the interaction between applications and users and lets programmers develop screen displays without detailed knowledge of the terminals being used.
CICS is also available on non-mainframe platforms including the RS/6000, AS/400 and OS/2basedPCs.


(Certification for Information System Security Professional) A certification reflecting the qualifications of information systems security practitioners. The CISSP examination consists of 250 multiple-choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC) 2 (www.isc2.org).

The (ISC) 2 promotes the CISSP as an aid to evaluating personnel performing information security functions. The certification was first available in 1989.

Cloud Computing:

A type of computing, comparable to grid computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional super computing, or high-performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second, in consumer-oriented applications such as financial portfolios or even to deliver personalized information,or power immersive computer games.

To do this, cloud computing networks large groups of servers, usually those with low-cost consumer PC technology, with specialized connections to spread data-processing chores across them. This shared IT infrastructure contains large pools of systems that are linked together.

Often, virtualization techniques are used to maximize the power of cloud computing.

The standards for connecting the computer systems and the software needed to make cloud computing work are not fully defined at present time, leaving many companies to define their own cloud computing technologies.

Systems offered by companies, like IBM's "BlueCloud" technologies for example, are based on open standards and open source software which link together computers that are used to deliver Web2.0 capabilities like mash-ups or mobile commerce.

Cloud computing has started to obtain mass appeal incorporate data centers as it enables the data center to operate like the Internet work through the process of enabling computing resources to be accessed and shared as virtual resources in a secure and scalable manner. See network cloud computing.

See also grid computing.


Connecting two or more computers together in such a way that they behave like a single computer. Clustering is used for parallel processing, load balancing and fault tolerance.

Clustering is a popular strategy for implementing parallel processing applications because it enables companies to leverage the investment already made in PCs and workstations. In addition, it's relatively easy to add new CPUs simply by adding a new PC to the network.

Microsoft's clustering solution for Windows NT systems is called MSCS. Also see cluster.

Clustering Architecture Whitepaper(s) from Microsoft describing the architecture of the clustering extensions to the Windows NT operating system.


Short for Internet Control Message Protocol, an extension to the Internet Protocol (IP) definedby RFC792. ICMP supports packets containing error, control, and informational messages. The PING command, for example, uses ICMP to test an Internet connection.
RFC792 Requests for Comments document for the Internet Control Message Protocol (ICMP).
Centralized Management Protocol.


A program that translates source code into object code. The compiler derives its name from the way it works, looking at the entire piece of source code and collecting and reorganizing the instructions. Thus, a compiler differs from an interpreter, which analyzes and executes each line of source code in succession, without looking at the entire program. The advantage of interpreters is that they can execute a program immediately. Compilers require some time before an executable program emerges. However, programs produced by compilers run much faster than the same programs executed by an interpreter.

Every high-level programming language (except strictly interpretive languages) comes with a compiler. In effect, the compiler is the language, because it defines which instructions are acceptable.

Because compilers translate source code into object code, which is unique for each type of computer, many compilers are available for the same language. For example,there is a FORTRAN compiler for PCs and another for Apple Macintosh computers. In addition, the compiler industry is quite competitive, so there are actually many compilers for each language on each type of computer.

More than a dozen companies develop and sell C compilers for the PC.


A message given to a Web browser by a Webserver. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.

Also see session cookie and persistent cookie.

The main purpose of cookies is to identify users and possibly prepare customized Web pages for them. When you enter a Web site using cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your Web browser, which stores it for later use. The next time you go to the same Web site, your browser will send the cookie to the Web server. The server can use this information to present you with custom Web pages. So, for example, instead of seeing just a generic welcome page you might see a welcome page with your name on it.

The name cookie derives from UNIX objects called magic cookies. These are tokens that are attached to a user or program and change depending on the areas entered by the user or program.


The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by crypt analysis, also called code breaking, although modern cryptography techniques are virtually unbreakable.
As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is Pretty Good Privacy because it's effective and free.

Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses.


Next...Section "D"

Til Next Time...




~'A Portentous Epoch of Sagacious Redolence'~ and (‘The E-store for Books by Boulware’)
Study Aids / Study Guides, Fiction / Occult & Supernatural, Body, Mind & Spirit / Spiritualism / General, Education / Administration / General, Fiction / Horror / General, Technology & Engineering / Project Management, Body, Mind & Spirit / Shamanism


Posting List Links and Locations to Articles by Boulware
'The Platforms of BoulwareEnterprises/Publications'
~ 'The E-Store for Books by Gregory V. Boulware, Esq.’ ~
New BCID: 823-13940945
New BCID: 823-13940945 – Hallow



“Article Posting Sites”

~The Connect Platform~







Helpful Search Tags:

#Education #Information #IT #BI #Computers #BoulwareBooks #Academia #Twitter #WordPress #SelfHelp #HBCU #Learning #eReader #Teaching #Tecnology #AI #BI #IT #Computers #MachineLearning #CCPedu #Berean #onWURD #BLM #College #BereanInstitute #LinkedIn #School #Blogger #FaceBook #Tumblr #Pinterest #Technology #Amazon #Algorithm #Syntax #IoT #RDBMS #SEO #CRM #CPU #SOHO #OSI #EMR #ANSII #SCSI #Chip #PC #AI #Elipse #SIMS #Boolean #SMTP #SPI #DB #SMS #GUID #SNMP #SOA #SOX #OLAP #FAT #ASP #SaaS #Nano #Program #EdTech #WebsiteMag #RAID #SSL #GUI #Software #DataSource #DataBase #ComputerWorld #Oracle #WebSiteMagazine #Wired #Networks #Networking #DataMiner #Dataminning #MIS #TheOneThingIknowIs #eReaders #ReadAloud #SMO #SMM #iOS #Blogger #TheLearningKey #UnitedBlackBooks #HarlemBookFair #TheDailyBeast #TheGuardian #Published #BlogSpot #KDP #Networking #IoT #TheOrderOfThings #Nibbies #ReadersGazette #MIT #Polymath #Erudite #ISDN #DynaSet #APP #BlackAmerica #BlackInAmerica #IAfroFuturism #RepJohnLewis #TheRevAl #Serendipity #Universal #Ubiquitous #MAAtEnterprises #Galactic #WarriorsOfTheMedicineWheel #Forbes #BBC #BBCNews #IndieBound #BoulwarePublications #AIVMI #TheShiP #globalcitizenship #Wakanda #TheUltimateRadioNetwork #ExpeditionWild #ClickBait #CBC #HealStorian #Zimbabwe #Ethiopia #Senegal #Uganda #Africa #TheIndigenousPeoples #FightThePowerThatBe #LDF #NavajoNationCouncil #NavajoCodeTalkers #Underground #AmericanIndianVeteransMemorial #NativeTeams #NativeSpirits #NativeMediaNetwork #NativeSpirits #TheStoryOfUs #UnsungAuthors #PeopleOfColorAroundTheWorld

Posted By: Gregory Boulware, Esq.
Saturday, February 2nd 2019 at 5:46PM
You can also click here to view all posts by this author...

Report obscenity | post comment
Share |
Please Login To Post Comments...

More From This Author
~ He Screwed Up Again Big Time ~
~ "Three Laws Safe" ~
~ "Being Hebrew" ...as recorded by and in 'The Good Book' ~
~ "Just A Few Techie Definitions" ~ Section 'D'
~ "Just A Few Techie Definitions" ~ Section 'B'
~ "Fairmount" - 'Willis Samuel Investigations Pt. 7': ~ "Loose Ends!" ~
~ "The Literary World Of Boulware Enterprises & Publications" ~
~ "The Fall of Light" Chapter 8: "Arc-Light From Atop" ~
Forward This Blog Entry!
Blogs Home
Sponsored Content Create an Ad
Follow Us!
Link To Us!
Do you have a website? Link to HBCU Connect!