Browse Definitions :
Definition

C shell

C shell is the UNIX shell (command execution program, often called a command interpreter ) created by Bill Joy at the University of California at Berkeley as an alternative to UNIX's original shell, the Bourne shell . These two UNIX shells, along with the Korn shell , are the three most commonly used shells. The C shell program name is csh , and the shell prompt (the character displayed to indicate readiness for user input) is the % symbol. The C shell was invented for programmers who prefer a syntax similar to that of the C programming language.

The other popular member of the C shell family is called tcsh (for Tab C shell) and is an extended version of C shell. Some of tcsh's added features are: enhanced history substitution (which allows you to reuse commands you have already typed), spelling correction, and word completion (which allows you to type the first couple of letters in a word and hit the tab key to have the program complete it).

Once considered " bug gy", the C shell has had a number of different versions developed to overcome the flaws in the original program. Most often, only experienced users prefer to use the C shell. C is frequently the default shell at universities and research organizations and is the default on many systems, especially those derived from Berkeley UNIX.

This was last updated in June 2005
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close