Browse Definitions :
Definition

grawlix

A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase. Here's an example of a typical grawlix:

#@$%*!

The term first appeared in a 1964 article called Let's get down to grawlixes by American cartoonist Mort Walker, who is best known as the creator of the Beetle Bailey and Hi and Lois cartoons. Later, in a book called The Lexicon of Comicana, Walker created and named an international set of symbols used in comics around the world. Walker called his system Symbolia.

Here are some examples of other terms in the list:

  • agitrons: wiggly lines indicating that something is shaking
  • briffits: clouds of dust indicating that a character left in a rush
  • emanata: straight lines rising from around a character's head indicating surprise
  • plewds: drops of sweat indicating that a character is hot or stressed
  • squeans: asterisks with an empty center indicating drunkenness or dizziness
  • waftaroms: wavy lines rising from something indicating a strong smell or heat.

Some of the symbols used in Symbolia, such as the squean, are not represented on a keyboard or in commonly-used fonts. Some comic-oriented fonts, such as MarkerMan, include Symbolia characters.

This was last updated in June 2010

Continue Reading About grawlix

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close