[next] [previous] [top] [last] [indice generale] [violazione GPL] [translators] [docinfo] [indice analitico] [volume] [part]
In this chapter we briefly describe some terms commonly used in the Unix environments. The list is not complete and it is just meant to help the beginner.
access procedure, 588.1
case insensitive, 588.5
case sensitive, 588.5
change of line, 588.2
client computer, 588.3
client program, 588.3
domain name, 588.5
linking a file system, 588.2
mounting a file system, 588.2
network node, 588.3
regular file, 588.2
serve program, 588.3
server computer, 588.3
service program, 588.4
standard error, 588.4
standard input, 588.4
standard output, 588.4
system initialisation procedures, 588.4
unlinking a file system, 588.2
unmounting a file system, 588.2
utility program, 588.4
wildcard character , 588.2
The term account literally represents an account, such as those that one may have in a bank. One has an account within a Unix system when one has been registered (and therefore has obtained a UID) and can access the system by using the access procedure.
Group identifier, Group ID or number that identifies a group of users.
The term access procedure refers to the process used by a user to access and interact with the syste, after an identification phase, that usually consists in the entry of a user-name and a password. In detail login identifies the user entry, whereas the logout identifies the conclusion of his/her activities.
User identifier, User ID or User Identification Number.
It refers to a word or phrase used to verify the user identity in order to access some service.
The native file system of the GNU/Linux system is the type Second-extended, that has two variants: Ext2 and Ext3. The Ext3 variant contains some extensions that allow to reduce the possibility of data corruption, without loosing the compatibility with the Ext2 system.
The glob mechanism is used to identify many files (or directories) together and corresponds to the use of wildcard characters in the Dos environment. The more common ones are the asterisk, the question mark and the square parentheses.
In the Unix operating systems, when one wants to access data stored on a disk, one cannot refer to a device as it happens with Dos and similar systems. One must always refer to the global file system. To do this, all disks that must be accessed are connected together like branches on a tree. the term mounting, or mount, identifies a connection or link of the disk content to the global file system; the term unmounting, or unmount, identifies the disconnection or unlinking of a disk from the global structure.
This term refers to the code required to identify the end of a line and the start of the next one. By using the name one should avoid to specify directly the actual code to allow different implementations on different systems.
The more common Unix systems use the code <LF>. In the Dos and similar systems the couple <CR><LF> is instead used. For this reason, if one tries to print a text entered on a Unix system by using a printer configured for the Dos operating system, the result is a number of shifted lines.
To solve the problem, since rarely such a printer can be configured to change line by checking only the <LF> code, it is possible to use a filter to transform the <LF> character into the <CR><LF>. This filter program is well known and is called unix2dos.
Often in the Unix environments the term newline is confused with the <LF> code. This is a problem, because there are situations in which it is important to clarify that it is the <LF> code independently of the platform to which the concept is applied. Because of this, when this term is used, it is important to pay attention to the meaning of the text, by using some common sense.
The record is generally a record of amy time. In computing, the record usually corresponds to a line of a data file. A record is usually subdivided into fields, and can be considered analogue to a card in a card file: the fields of each card (i.e. record) are the different items written on the card.
In the Unix family operating systems, when the term file is mentioned, this can refer also to a directory and other objects with specific functions. The term regular file or normal file is used to specify that it is a simple file, by including in this category also the executables.
The network node is a computer or another specialized component which is connected to a network and which has a network valid address (address referred to the level 3, according to the ISO-OSI; chapter ##en-capitolo-rete-intro##).
The name is an acronym of Max transfer unit and defines the maximum dimension of a (frame) which can be sent to the network through a given interface.
A very important service in the local area networks consists in the possibility to share portions of a file system from and to other connected computers. The service is obtained by suing the NFS protocol and therefore allows sharing data in a network.
NFS is often used as an acronym of Network file system and sometimes of Network file sharing. The two possible interpretations represent features of the same thing: the use of a file system that extends through the network and the consequent data sharing.
Network news transfer protocol. This is the protocol used to transfernews messages. A server NNTP is a computer that has the task to collect a copy of news messages from the discussion groups and to allow users to read and send messages to the same groups.
The term proxy is used in many cases to identify a service which has the task to provide or supply something. The typical example is the proxy and the servente which connects a local network to an external network, with the purpose to access the external network for the nodes of the local network, without allowing them a direct contact with the external nework. Usually, this type of proxy includes a cache memory to reduce repeated accesses to the external resources. However one should keep in mind that this definition applies also to other types of less known services.
Simple mail transfer protocol. It is a protocol used to transmit electronic mail. A server SMTP is a computer which has the task to manage the electronic mail of a group of users which use the computer as their dispatching central point.
Uniform resource locator, Uniform resource identifier. These terms define an address which identifies exactly a network resource, such as a page HTML, a file of an FTP service and more. The two definitions have different extension; partcularly, URI includes URL and extends beyond.
Init is the program which is started by the kernel in order to start the system. Init uses a number of scripts to start the programs which work in the background to perform the processing needed to make the system available. Together they are known as system initialisation procedures, which includes both the start up and the termination, by identifying also different run levels.
It refers to printouts sent to the output queue (spool).
It refers to commands whose execution is deferred to a specified time or queued until resources are available.
In computing, the log is equivalent to the history log of ships. The log is an automatic system that records significant events. The files that contain these records atr called log files and could also be identified as log files. Generally, the log is a file and what is written on them is a record.
Process identifier, Process ID or process identification number.
The word refers to an imaginary pipe used to direct the output of a program into the input of another. The connection of programs in this way is managed by the shell and usually the symbol | is used to identify this operation. For the same reason, compatibly with the context, the symbol | is also called pipe.
When the system initialization procedure is used in mode System V, which is actually the normal mode, the run level can take different values, in order to define which system functions must be activated, according to the requirements.
The run level is a positive number starting from zero, whose meaning depends on the configuration of the system. Usually the level zero is reserved for the shutdown phase, the level one is reserved to the single user mode and the level six is reserved to the system restart phase.
The shell of an operating system is the program that has the task to interpret and execute commands entered by a user to the command line. The use of the term shell in this way has actually started with the Unix operating systems.
The file or device which is predefined as the destination of the error messages is the standard error. Usually it is the screen of the console or workstation used by the user. The standard error, usually, can be redirected by using the symbol 2> followed by the name of the file or device that one wants to use.
The file or device which is predefined as the data entry source, is the standard input. Usually it is the keyboard of the console or workstation used by the user. The data entry is terminated by entering an end of file character that is normally obtained by the combination [Ctrl+d].
The standard input, usually, can be redirected by using the symbol less (<) followed by the name of the file or device to be used, or the symbol pipe (|) when one wants to use the output of a command for input to the following command.
The file or device which is predefined as the destination of the output is the standard output. Usually it is the screen of the console or workstation used by the user. The standard output, usually can be redirected by using the symbol greater (>) followed by the name of a file or device to be used, or it can be redirected to another command by using the symbol pipe (|).
It is a communication system between applications besed on a special file type: the socket. Some daemons offer services with this type of communication by listening to a connection request from client applications.
A utility, or a utility program, or better a service program, is a useful and practical program, which performs its task simply and terse way. Usually, this type of programs are an integral part of the operating system.
The two definitions refer to the ``sensibility'' or not regarding the difference between upper case and lower case characters. Generally, the Unix systems are case sensitive, but there are situations when this sensitivity os missing or ignored.
In the Unix environments, core is a synonim of central memory, or RAM. The word is due to the fact the the original central memory forms were implemented as a network of magnetic iron nucleous: the nucleous memory, or core. For this reason, often, when a process teminates abnormally, the operating system dumps the image of its core memory. This file has the name
core dump (obviously) and can be later on analysed by using diagnostic tools.
The daemon, is a program that works in the background (background) and performs repetitive services. The term is typical of the Unix environments, whereas with other operating systems different definitions are used, such as server. Traditionally, most of the daemon programs have a name which terminate with the letter ``d''.
Normally the term ``domain'' is used to refer to a given network node in an Internetnetwork. The name is composed of various elements, which are used to represent a hierarchy of domains, in a way comparable with what is done in the file system with the directory structure. A ``domain name'' may represent a partial position in the hierarchy, or the complete name of a node.
The verb to implement means to develop a practical solution to a project characteristic. In other word the implementation is the practical solution chosen to perform a given function. In summary, the implementation is the applied development of something in a given context.
The internationalization is the mode in which a program is developed or modified in order to be compatible with the ``localization''. The code is made up by the fact that between the letter ``i'' and the letter ``n'' of internationalization there are 18 letters.
The localization is the configuration that allows a program to be adaptable to local national-language features. The code is made up by the fact that between the letter ``l'' and the letter ``n'' of localization there are 10 letters.
Originally, the normal mode to interact with a computer was the use of a typewriter: teletype. From this name the code TTY is derived and is normally used to identify a generic terminal. The console is the main terminal directly linked to the computer. The term terminal is normally used to mean the unit made by the keyboard and the display.
The data stream received from a terminal is normally referred to as standard input, i.e one refer to what has been entered through the keyboard. The data stream directed to the display is normally referred to as standard output, i.e. one refers to what is presented on the screen.
Eric S. Raymond, Jargon File Resources
Appunti di informatica libera 2003.06.29 --- Copyright © 2000-2003 Daniele Giacomini --
daniele @ swlibero.org
1) Translation last update on 2003.06.19 from Mario Pesce
mario @ datamission.co.uk (original chapter was 6).
It should be possible to link to this page also with the name glossary_for_beginners.html
[next] [previous] [top] [last] [indice generale] [violazione GPL] [translators] [docinfo] [indice analitico]