Saturday, August 29, 2020

I.T. Glossary compiled by me Gloria Poole,RN,artist of Springfield Missouri


I.T. glossary #6 compiled by me Gloria Poole,
RN,artist, of Springfield Missouri and I used simple explanations to help all people. This was prompted today by me watching videos on using APIs and creating apps as a developer. I included those videos on youtube after the glossary. All people have to educate themselves on computer terminology as much as they have to educate themselves on any other topic.


Earlier today I read several articles and particularly this in BBC news :


"Algorithms do what their code tells them to do. The problem is this code is rarely available. This makes them difficult to scrutinise, or even understand."...Our data also confirmed others’ findings that it is almost impossible to complain about the decisions of the algorithm....Understandings about impact of algorithms on all forms of work is still in its infancy. It demands greater scrutiny and research. Without human oversight based on agreed principles we risk inviting HAL into our workplaces." Read article :

https://www.bbc.com/worklife/article/20200826-how-algorithms-keep-workers-in-the-dark

And I decided to research some and so watched that youtube video that I labeled comprehensive like a University crash course. Then I used my own knowledge and googled a few terms I was not sure of to create this glossary. I studied I.T. a bit at University of Georgia and have taught myself much about it. I am trying to help people with no knowledge of information technology.


My glossary I compiled to help you understand the comprehensive youtube video included at bottom of page.

C.I.S.O means "Chief Information Security Officer" in a corporation


A.P.I. means application programming interface; which means it is the screen that a user uses to access a and make an app or program work; it defines the interaction between people and computers and makes one part of the software communicate with other parts of software.iAn API is similar to lego building blocks. APIs are used in many ways . E.g. weather snippets [or widgets] ;travel booking; apps;


G.U.I. means graphical user interface; with images sound, video and not merely words and interactive buttons that allow users to control experience;


R.E.S.T. is a protocol that means "representational state transfer" and is protocol for APIs.


Remote API; pulls info from the web to execute the program


Computational power means central processing capability of a computer


RESTful API means APIs that use protocol R.E.S.T.; not all do. R.E.S.T has several standards that must be met.


URL means uniform resource [or synonym object] locator;


URI means uniform resource [or object] identifier. Both os these are the code names for what you type into the box that the web searches for;


Hyper text means text that can link to other text


stateless means the server does not need to know anything about the client requesting the API.


Json; pronounced J-son is JavaScript object notation;


S.D.K. means software developer kit; a library of files that creates a computer program, or application or operating system


endpoint means what it is you are trying to get from web


iOS means Apple Mac computer operating system


Get is a command


Auth is a command, abbreviation for authorization and usually there are several options


" Access token" is a digital key that gives the user the authority/ permission to access/ use a computer program/ app/ API/ platform.


q means query; a search term


array is a list of objects; or a string of letters, numbers and characters; could be words; computers cannot read as humans do. They accept the definitions in some cases of what is programmed into them. In some coding the developer must define for the computer what goes in the variable.


variable is something that changes from person to person. Examples are passwords, names, locations, computers, o.s., numbers as in telephones; defined by user or developer;


error is a coded explanation of why the web could not find what you were looking for. Examples are :

404 error means that url [website] cannot be found on web

401 error means basically you are unauthorized to access that website

and a whole lot more error pages. google them.


V.U.I. is a voice user interface such as Google assistant, Alexa or Siri on Apple; and or voice commands from user;


Call is a command in code that is different from telephone call. It means to alert web that yu want such and such code to produce such and such results. Call up program so and so, in other words.


"preview_url " is developer option that allows you to get a look at what your code has accomplished before you put it on web for world to use;


cacheable means a file , folder, web page can be saved in a cache [pronounced cash]


a cache is basically a storage cabinet in operating system with a defined amount of space. When it gets full, your computer slows down. It can be emptied in settings.


Twilio is a computer program that allows sending sms [short messages ] from your computer; it runs the messages thru your telephone number.


S.I.D. is a string identifier


String is a long sequential set of characters, letters or numbers, could be words but not necessarily; a String can also be random collection of numbers and letters . Example of a string in code: e8}0tWNQ!8%@


/ a trailing slash at end of a section or url which means continue to the next line


PARAMS or params is abbreviation for parameters that must be included along with a command for it to work . Examples are the command Get [whatever] [all]; or another example Get [whatever] [first] ;


S.M.S. short message service ; a protocol for sending text messages. Telephone companies use this protocol to send text messages but apps also use it.


cURL or curl is a programming language


POST is a command that puts your page on web


Put is a command


{{ }} in APIs, creates a link to what is inside those brackets


media_url are photos/videos/audios that have their own url address


status is what the computer returns back to you to tell you if your command was carried out and what the results were. Examples are Status: completed; Status failed;



a shell is the computer script program that the UNIX computer runs that makes your computer work, and includes a terminal screen that is specific to writing commands.


Commands are precise, exact and vary from computer language to computer language. They are not interchangeable in other words but they are often very similar. There are online manuals for almost all computer programming codes and books to buy or borrow on them too. Commands are typed into the terminal screen and then entered and then computer replies to you with a prompt or a response if your wrote into command what response you requested. Examples of commands : Get, Post, Run, Print; Log; Help; List; Set; At terminal window you can type in word "help" usually and it will print on screen much info. Same is true for list directories; or list files;. To exit terminal is either word exit; or e ; or quit.


boilerplate is code that is repetitive and always the same no matter who uses it;


node is a basic unit of data such as a linked list or a tree directory


zsh is a shell command interpreter of Bourne shells; there are other shells


const is a command meaning a constant, meaning not a variable; the value stays the same always in all times the code is used; is unchangeable;


Promise in code is a then function; the eventual completion [or failure] of an aynchronous operation


`` are back ticks on keyboard to get string interpreted


TEMP or tmp is a temporary folder that holds files or folders that the url you are using needs to complete


headers are the info for emails of the who sent it, how it was sent, what route it took, who authorized, time and date and a ton of more info. In most emails you have to turn on headers in the settings. To see headers in gmail click settings of each email and click "view source". Some programs allow basic headers or full headers. Full headers give much more info and often you can see immediately that an email is a spoof [trick] sent by someone other than the name in as "sender"/ it is wise to look at headers if you have any doubt if safe to read email.


asynchronous; means not synchronized, a unique command that doesn't move on to the next user or next device; abbrev async;


README means read me" ; a file that contains specific information for a developer


err is abbreviation for error, which may be written as err in code but error for ordinary users whose website
did not appear;



python is a programming language which uses virtual environments [.venv]; is abbreviated .py


P.I.P means Python install packages


# before a command makes it non-executable and makes it a comment to developers


executable means it is a command which tells the computer to do something; file ending is .exe and other versions such as .cmd; or various depending upon computer language and manufacturer of computer. Executable files should not be messed with generally speaking because if you delete one of those even if accidentally your computer may not function as intended. Not all files are executable; some are read only; some are library reference files;


source is the entire code that makes a web page work. It can usually be viewed from the web browser.


"batch scripting" is a set of scripts to accomplish a complicated task


repository is a library or collection of files and folders


folder is a container in software; think of it like a big manila folder that holds lots of other papers and think of the papers as files;


Flash is a web framer


"Server side rendering" requires that full page is reloaded for the changes you made to take effect. The o.s. will almost always inform you when you have to refresh your page or reboot your computer to make changes.


github is a well known repository


env is abbreviation for environment which is a set of parameters that control your computer and that can be changed by the administrator. Examples are locale or location meaning where in world you are located usually defined as United States, or individual countries; Time; date; time zone; language; operating system and if more than one which one takes preference and boots computer.


import means to bring into the computer code from web or from another device such as a camera or memory card or external storage device


div means a division in code that sections off long code ; written as

in html


div class is a category of a devices that run on different operating systems with different code


POST is protocol that puts a web page on web.


return is a command that instructs computer how you want it to reply to you. Example is you can tell it to return every answer with "here's your answer Leigh" or Jen; or Samuel, or Lydia, or whoever is writing code and commands; but usually it returns the answer and then a prompt.


refresh means reload console of developer so changes take effect


load is command to tell computer to find a program in the library and load it so that it exceutes on your screen. or boots computer;


'pass argument" means that a command has to have parameters set for that particular command to work. An example is Run. If you just command it to run it might do nothing because it does not know what program you want it to run. When a computer has no idea what you intend it does nothing. It cannot read your mind! it cannot think. It can only do what someone before you told it to do when they wrote the code for it.Another thing you have to remember is that the answer you get from a computer depends on the input into it. For example if you set up a deliberately false algorithm for instance if you define the answer to 2+2 = 5 and set that into the code it will give you back that answer when it is executed. It spits back what you was programmed into it. That is why algorithyms are being questioned so much. They can be manipulated to produce fake results and to discriminate and to prevent certain groups from being able to use programs.


client is the user of a computer that interfaces with the web


server is the computer [examples are Google, Apple Computers, Microsoft, news, amazon, etc] that allows client machines to access their databases and or their programs.


from is a key word in python language. A key word is a word that instructs the computer search function to query or search the entire web for that word.


def is abbreviation for define. You have to define variables if you wnte them into code or you have to write code that allows the user to define the variable. An example is a password which is user defined usually.


[ ] means an empty array; meaning there should be something between the brackets that tells the computer something but it's missing;


body means the main part of the message separate from the header or footer.


todos is to do list


API limits are constraints the developer(s) put on an API. Example is "user must be older than 13 yrs"


elements are fragments of code. an example is which means keyboard in html


/api means server code interface for client


"layered system" means several APIs that communicate with each other.


HATEOS is abbrev for protocol "Hypermedia as the engine of application" and means that hypertext must be used to find the way through the APIs.


developer is writer of code, creator of apps and software


"uniform design" is abbreviated U.D. and means the fundamental idea and construction are presented and examples are given when writing code.


app is abbreviation for application. An app is a bit of code that links your smartphone, tablet or computer to a remote computer that holds an entire program that executes upon demand of app. All the files are stored on the remote computer and the result they produce shows on your app on you device.


span is a range of limits such as DNS ip addresses


fetch is a command. Commands must be written in the way that particular language defines. For example one language might write it FETCH but another might write it fetch and another might write it Fetch. Each command must be exactly as program requires for it to work.


bodyParser means any command that comes in will get parsed.


Parse means to break a group of code or long code into separate components executed in different ways.


listen is command to listen at a port for instructions


$ in front of { means that it is a JavaScript identifier of variables, functions, properties; events; or objects. JavaScript treats $ and _ [underline] as a shortcut to the function getelement in brackets.


show is a command to display something


console is the developer's dashboard


format wipes out all content on a drive and it cannot be undone! So don't format unless you intend to write on same memory card again or same harddrive again. There is a secure format on some o.s. [such as Apple] which means the data is not erased and put in trash for retrieval but overwritten.


to catch(err) instructs computer to make note of, catch, report, log a specific error


dependency means something that is required for a command or program to work. Example is Such and such depends upon first having English as your language if your program is only for English language. Some programs but not all are multilingual. Computers cannot read other languages unless their fonts have been downloaded and it has been defined for computer. <>

port is the web portal that a user's computer uses. These are defined and labeled much as telephone numbers are and can be searched in their database. The default for the web is 80.


database is a collection of subsets of information such as all the people who use any platform on web. Example is all the telephone numbers in the white pages. Is abbreviated dB.


Express is a data modeling language defined by ISO 10303-11, similar to Paschal


print means print on screen or to paper or to file at remote.


.css means computer style sheet which tells computer how to make each page look.


cloning is duplicating existing code to use somewhere else


When making apps don't send confidential info to clients!


C is usually the label assigned to the harddrive on a computer. In most recent computers it is a computer SSID chip. or more than one.


'back end" means infrastructure, physical hardware of a computer


"front end" means client side presentation layer of software


package means all the code for a program or operating system.


'stack trace" means a list of the method calls an app is using


await tells computer to wait for results of one command before going on to next command; Normally a computer reads everything as one long string unless you write in divisions, new paragraphs, stops such as End; and it executes the commands as it comes to them unless you tell it otherwise.


"internal server error" means the server did not know what you intended, and said FOUL! [joke] or actually it says ERROR--with a number of that error and a simple explanation. Google often gives a link to more precise info also if you want to know the specific details. And you should want to know those because you learn which sites are not safe or might compromise your computer.


req is abbrev for request a file or folder; a command


localhost is your computer [not the server although some computers can function as servers if they allow others to call into them to access their content.


null means a value and a pointer; a constant with the value of zero written as 0 to terminate code in C [a language]


vue is v- [hyphen] attributes to commands


res is abbreviation for response


ngrok is way to create secure tunnels to transport websites; command is "ngrok http 8080" per google


s.p.a is single page application which requires client to manually load other pages in site


debugger is de-bugger ; application to find computer errors in code labeled "bugs" and correct them.


static is a value that does not change.




I compiled this glossary after watching youtube presentation on creating APIs and I recommend those to all to watch so you learn terminology and some specifics about coding. You can watch the youtubes I watched at :


Youtube explanation of API:

https://www.youtube.com/watch?v=s7wmiS2mSXY


Crash course, comprehensive on creating API on youtube:[very good, 2 hrs long but covers a quarter of work if u did it at univ]


https://www.youtube.com/watch?v=GZvSYJDk-us


Update on 3rd Sept 2020: yesterday I doodled using Google software and another computer of mine and a computer mouse of mine, and published it to the web and it has an anonymous link at: https://docs.google.com/document/d/e/2PACX-1vQTg_l03qJI7mfKwbhVcQgztetFgdnnCuUoLW3knQaeBtbR5lkEOnnlADVbj6Owtwi6DWHspcOqTSmg/pub?urp=gmail_link

More blogs of mine are and some include art I painted/sketched or drew:


https://gloriapoole-paintings.blogspot.com,

https://gpoole817.blogspot.com

https://prolife-nurse.blogspot.com

https://words-that-work-LLP.blogspot.com

https://mini-exhibition.blogspot.com

https://tapestry-of-life-LLP.blogspot.com

https://artist-gloriapoole.blogspot.com

https://gloria0817.blogspot.com



Posted by me Gloria Poole,Registered Nurse, artist with business degree from University of Georgia, tonite 29 Aug 2020 at 10:16pm central time; from my own apartment in Springfield using my own computer and equipment [as always].


Monday, August 3, 2020

Sketch white deer by me Gloria Poole of Springfield Missouri


I, Gloria Poole, thank Google for making it right today. Today, I also updated my blog https://gloriapoole-paintings.blogspot.com with my sketch of a panda bear and my reason for it.


This sketch is one of three that I drew in watercolors as preliminary for the painting in oil I painted of a white deer in the woods at a later time. I also posted that oil painting's photo on web before. I am posting this sketch here because of what happened yesterday. Google knows who I am and so does other people and news agencies. The deliberate intention by criminal hackers to steal my born with name, my content, my actual possessions is getting to be a real problem. An entire folder of about 6000 (+) photos that I photographed with my digital camera [not phones] and uploaded was ripped right off my Apple iMac computer last week by criminals who broke into my internet. It is necessary to alert Police,federal law enforcement {FBI, Secret Service, DHS, State Dept] that it contained dozens if not hundreds of photos I photographed of my family--me, my 2 daughters and their children. The intent of those who steal family photos is to steal identities of us [Poole , Borelli & Bills families] and I am doing what I can to give the public, banks, law enforcement an alert to that. My youngest daughter Leigh and her husband Matt both have diplomatic passports since they were in US Peace Corps, a part of the US State Dept. Their photos were also in the folder that was stolen from my so called private apartment's internet right off my Apple iMac all in one computer that I paid to upgrade with new harddrive and updated Apple o.s.

The public, banks and law enforcement should know that Apple iMac all in one computer is not secure. And that internet coming into private apartments in Springfield Missouri is also not secure.


Update by me Gloria on 16th August, 2020 at 9am in Springfield Missouri, to add that I have always tried to serve The Living Lord with my life since I was seven years old. I want to share these scriptures with the world:



The promises of God are very reassuring and they have sustained me my whole life.

1) "The fear of THE LORD [GOD] prolongeth days; but the years of the wicked shall be shortened. " Proverbs 10:27, King James Holy Bible.

2) "The blessing of The Lord, it maketh rich, and He addeth no sorrow with it." Proverbs 10:22, KJV

3) "The fear of The Lord is the beginning of wisdom; and the knowledge of The Holy is understanding." Proverbs 9:10,KJV

4) " I was set up [by GOD in heaven] from everlasting, from the beginning, or ever the earth was". Proverbs 8:23,KJV. That verse amazes me--that GOD planned each of us in the beginning of time! We are the fulfillment of His plan to repopulate the earth with His people, His believers/followers.

5) "My son, keep My words, and lay up My commandments with thee. Keep my commandments and live; and my law as the apple of thy eye. Bind them upon thy fingers, write them upon the table of thine heart." " Proverbs 7:1-3, KJV. Those commandments are written in Exodus chapter 20, KJV. Jesus did not undo the commandments and in fact said to keep them if you love Him and follow Him and He said if you keep them it proves your love for Him [a paraphrase].. I have to find that verse but you can find it by reading New Testament.{John 15:10, KJV; & John 14:20-21, 23-24,KJV;

6) "These things have I spoken unto you, that in Me {Jesus speaking} ye might have peace. in the world ye shall have tribulation; but be of good cheer; I have overcome the world. " John 16: 33, KJV.

7) Jesus said, "I and My Father {GOD in heaven] are One." John10:30, KJV.

8) Jesus said , " I AM the resurrection, and the life;" John 11: 25a,KJV.

9) Jesus said, "he that is of God, heareth God's words; " John 8:47a, KJV. The Bible says many times that GOD speaks directly to humans. Don't let the world convince you otherwise. GOD will answer you when you pray to know Him, and seek him in prayer.

10) Jesus said, "but The Comforter which is the Holy Ghost [Spirit of GOD] , whom The Father will send in My name,He shall teach you all things, and bring all things to your remembrance, whatsoever I have said unto you. " John 14:26,KJV



I really love The Holy Bible especially The King James version because it is "the king's English" and I like that. Some of the modern so-called translations totally omit the word "sin" and the concept of sin against GOD, and try to word it so people think everyone goes to heaven regardless of their relationship to GOD, but that is not true. Each person must decide for him or herself in this life on earth, to accept Jesus as their Lord and Saviour. Jesus set the example of how we should do that when He was baptized by immersion. A public declaration alerts world that you acknowledge Jesus as Messiah, Redeemer, Savior and intend to follow Him. The believers will support you in that. The haters of GOD will persecute you for it. But remember the verse in number 6 above in those situations.



For the record: I have notified Google and the FBI that I am not in any way affiliated with the domain named affpartners [dot]com that sends spam/malware/and phishing emails. That is a deliberate, coordinated effort by evil people to ruin my name by using my name as if was their name and to send fraudulent emails. I do NOT know those people who are running that scam nor where they are located but they are NOT my "partners" in any way nor are they authorized to use my name in any way, so don't be fooled if you get that sort of mail.Filter spam mail and alert law enforcement if you see criminals using my name.


Copyright notice: I, Gloria Poole, create all art, sketches, drawings, words, photos that I post to my blogs or displayed on twitter, and I, Gloria Poole, own all copyright privileges according to U S law. My content is automatically covered by U.S. Copyright laws and The Library of Congress has some documentation on paper to that effect. I am known on web as gloriapoole ; as gloria0817; as gpoole817; as Prolife Nurse; as tartan_Bliss; as tweetie0817; as personhood1; as gloria_poole; as gloria.poole; as gloria-poole; as Ms Gloria Poole,as Poole,Gloria; as cartoonist_gloria; as gloriapoole.RN; as gloriapoole_RN and words that WORK, and Tapestry of LIFE also. Every time there is an attempt by criminal stalker/thief to steal my name it creates more havoc for me and he [stalker-hacker-thief] should be in federal prison for his physical assaults on me in years 2003-2006 & again in 2012. He [2nd exhusband male DBP] is not authorized to be in my apartment, nor t have possession of anything of mine, nor to sign my name, nor to use my name in any way. He is a thief, a criminal and a stalker who breaks into my internet, my apartment, and my telephones to intimidate and harass me and steal my name and assets. He would be in prison if I were a democrat or male.


I am a white, unmarried [divorced twice] christian, woman, who is the only tenant in my so-called private apartment in Springfield Missouri. I wrote so-called private because someone broke into my apartment while I was at the lake last week with my family and stole 7 items from my apartment and may have connected their fraudulent device to my ethernet wall connection. I am documenting this for public, for banks, for insurance, and for law enforcement.


Posted by me Gloria Poole, Registered Nurse, artist, Springfield Missouri on 3rd August 2020 at 8:09am, central time.

Sunday, August 2, 2020

Is Google helping thieves?

Is Google helping identity thieves steal my name and content? I am beginning to wonder. They have removed from blogspot the ability to insert photos. As I have read the I.T. news [as usual] I realized that Google always abandons their so-called " developers' projects" of services to consumers after a year or two. There is a long list of "services" that Google began then abandoned and I read it a few days ago in I.T. news.

My guess is they are secretly abandoning blogspot. Or they ASSUME that white women are not "worthy" of having blogs on the web since their CEO is from India where rape is the national pastime?

Or they ASSUME that a divorced white woman couldn't possibly have 2 [or more computers] because Google is sexist, racist [against white women] and discriminate against grandmothers?

I also own this big Apple computer and always owned it. I also own the tablets, smartphones, cell phones,APPLE IPod, APPLE Iphone, home phone, cameras, modems, wires, cables I use to communicate on web and I own EVERYTHING in this apartment in Springfield Missouri except the built in refreigerator that was the only thing in this apartment when I moved into it on Oct 1, 2018. It is necessary to document this for the public and the FBI. I have not moved from my apartment which is not a shared apartment and never was while I have lived in it. I am aware there are several intentional identity thieves who have repeatedly entered my apartment unlawfully, stolen items with my signature in them, stolen personal items [everything in this aprtment is "personal" ] of mine with my fingerprints, words, thoughts, records in them, for thieves to use to trick law enforcement and stupid real estate fake managers. GOD is, and HE will avenge me in His time and way. That is one of the promises of GOD in Holy Bible.

/s/ Gloria Poole, Registered Nurse, artist, Springfield Missouri ; 2 Augustt 2020, 8:26am

Happy Thanksgiving y'all & Congrats to Pres Trump from me #Gloria

Copyright Notice: all rights reserved for all words/#paintings/sketches/#drawings/#cartoons/articles/op-eds/essays/ that I create or h...