- can/may
Use ‘can’ to describe actions or conditions that are possible. Use ‘may’ only to describe situations where permission is being given. If either ‘can,’ ‘could,’ or ‘may’ apply, use ‘can’ — it is less tentative.
- canceled
Correct. Do not use ‘cancelled’.
- cannot
Correct. Do not use ‘can not’.
- cd or CD
When referring to the change directory command, use cd.
When referring to a compact disk, use CD, such as ‘Insert the CD into the CD-ROM drive’. The plural is ‘CDs’.
When referring to the optical drive, use CD-ROM drive. Do not use ‘cdrom,’ ‘CD-Rom,’ ‘CDROM,’ ‘cd-rom’ or any other variation. The plural is ‘CD-ROM drives’.
- characters
Do not use ‘characters’ when you should use ‘bytes’. In English, bytes and characters can be used interchangeably; in other languages a single character may consist of multiple bytes.
In computer software, any symbol that requires one byte of storage. This includes all the ASCII and extended ASCII characters, including the space character. In character-based software, everything that appears on the screen, including graphics symbols, is considered to be a character. In graphics-based applications, the term character is generally reserved for letters, numbers, and punctuation.
- check
Do not use. Use verify, make sure, ensure, or read, depending on the context.
- checkbox
Correct. Do not use ‘check box’.
- chipset
Correct. Do not use ‘chip set’.
- ciphertext
Correct. Do not use "cipher text" or "cipher-text" or other variants.
- clear text
Do not use. Use plain text instead.
- click
Use when referring to a GUI control button. For example, ‘Click OK’ or ‘Click the Unload button’.
For keyboard instructions, see press.
- client-side/client side
Careful here. For example: Windbind is a client-side service used to connect to Windows NT servers. Windbind runs on the client side of a client/server Samba implementation. See server-side/server side.
- client/server architecture
A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers ). Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power.
Another type of network architecture is known as a peer-to-peer architecture because each node has equivalent responsibilities. Both client/server and peer-to-peer architectures are widely used, and each has unique advantages and disadvantages.
Client/server architectures are sometimes called two-tier architectures.
- clobber or clobbered
These words should be avoided (except if ‘clobber’ is the actual name of something). Use ‘altered,’ ‘invalidated,’ or ’overwritten’ — whichever is appropriate in the specific context.
- clustering
Connecting two or more computers together in such a way that they behave like a single computer. Clustering is used for parallel processing, load balancing and fault tolerance.
Clustering is a popular strategy for implementing parallel processing applications because it enables companies to leverage the investment already made in PCs and workstations. In addition, it’s relatively easy to add new CPUs simply by adding a new PC to the network.
- code
Only use as a noun, not a verb. Use ‘write’ for a verb.
- color
Correct. Do not use ‘colour’.
- combo-box
Correct. Do not use ‘combobox’.
- comma-delimited
A data format in which each piece of data is separated by a comma. This is a popular format for transferring data from one application to another, because most database systems are able to import and export comma-delimited data.
- command
An instruction to a computer or device to perform a specific task. Commands come in different forms. They can be:
Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another.
Another word for command is directive.
- command button
Use button instead.
- command language
The programming language through which a user communicates with the operating system or an application. For example, the DOS command language includes the commands DIR, COPY, and DEL, to name a few. The part of an operating system that responds to operating system commands is called the command processor.
With graphical user interfaces, the command language consists of operations you perform with a mouse or similar input device.
- command line
Correct. Do not use ‘command-line’ or ‘commandline’.
The line on the display screen where a command is expected. Generally, the command line is the line that contains the most recently displayed command prompt.
- command processor
The part of the operating system that receives and executes operating system commands. Every operating system has a command processor. When the shell prompt is displayed, the command processor is waiting for a command. After you enter a command, the command processor analyzes the syntax to make sure the command is valid, and then either executes the command or issues an error warning. For operating systems with a graphical user interface, the command processor interprets mouse operations and executes the appropriate command.
Another term for command processor is command line interpreter.
- command prompt
Do not use. Use ‘shell prompt’ instead.
- command-driven
Correct. Do not use ‘command driven’ or ‘commanddriven’.
Refers to programs and operating systems that accept commands in the form of special words or letters. In contrast, programs that allow you to choose from a list of options in a menu are said to be menu driven. Command-driven software is often more flexible than menu-driven software, but it is more difficult to learn.
- component
- configuration file
A file that contains configuration information for a particular program. When the program is executed, it consults the configuration file to see what parameters are in effect.
- connectivity
A computer buzzword that refers to a program or device’s ability to link with other programs and devices. For example, a program that can import data from a wide variety of other programs and can export data in many different formats is said to have good connectivity. On the other hand, computers that have difficulty linking into a network (many laptop computers, for example) have poor connectivity.
- contractions
Do not use. Contractions are a mark of informal writing, and should be avoided when writing policy manuals or other more formal types of manuals. They also cause problems for translation.
- control character
A special, non-printing character that begins, modifies, or ends a function, event, operation or control operation. The ASCII character set defines 32 control characters. Originally, these codes were designed to control teletype machines. Now, however, they are often used to control display monitors, printers, and other modern devices.
- control key
Use Ctrl instead, such as ‘To save the program, press Ctrl+Z’.
- Control Panel or control-panel
When referring to a window, use Control Panel, such as ‘From the Settings menu, select Control Panel’. When referring to the command to start the control panel from X, use control-panel.
- control program
A program that enhances an operating system by creating an environment in which you can run other programs. Control programs generally provide a graphical interface and enable you to run several programs at once in different windows.
Control programs are also called operating environments.
- convert
To change data from one format to another.
- cookie
A message given to a web browser by a web server. The browser stores the message in a text file called cookie.txt. The message is then sent back to the server each time the browser requests a page from the server.
The main purpose of cookies is to identify users and possibly prepare customized web pages for them. When you enter a website using cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your web browser which stores it for later use. The next time you go to the same website, your browser will send the cookie to the web server. The server can use this information to present you with custom web pages. So, for example, instead of seeing just a generic welcome page you might see a welcome page with your name on it.
The name ‘cookie’ derives from UNIX objects called magic cookies. These are tokens that are attached to a user or program and change depending on the areas entered by the user or program. Cookies are also sometimes called ‘persistent cookies’ because they typically stay in the browser for long periods of time.
- corrupted
Refers to data that has been damaged in some way.
- CR
Use if referring to code, such as ‘Type CR at the end of each line…’. If referring to the keyboard key, use either Enter or Return, depending upon the platform.
- cross-platform
Correct. Do not use ‘crossplatform’ or ‘cross platform’.
Refers to the capability of software or hardware to run identically on different platforms.
- cross-site scripting
Correct. When referring to cross-site scripting attacks, use ‘cross-site scripting attack’. Acceptable use is also ‘cross-site (XSS) scripting attack’.
- Cygmon
Correct. Do not use ‘CygMon,’ ‘cygmon,’ or ‘CYGMON’. An exception is if a command is being typed (such as cygmon).
Refer to it as ‘Cygmon: a ROM monitor,’ not ‘Cygmon: the Cygnus ROM monitor" or ‘Cygmon: the ROM monitor’.