Browse Definitions :
Definition

auto-correct fail (auto-correct error)

Contributor(s): Ivy Wigmore

An auto-correct fail is an error that occurs when the software created to detect and correct misspelled words replaces a user-generated mistake with a different, and possibly worse, error.

Auto-correct software identifies misspelled words, uses algorithms to identify the words most likely to have been intended, and edits the text accordingly. Most word processors and messaging platforms of various types include auto-correct as a feature. 

Auto-correct programs work very well with common and straight-forward typos, such as "teh" for "the." However, when the error is less clear-cut, auto-correct programs can be unreliable. Usually, the errors are innocuous but there can be significant effects. In late April 2012, for example, two schools in Georgia were locked down after a student received the text message: "Gunman be at West Hall." The recipient (who was not the person the sender intended to contact) informed police immediately and security measures were put in place. The original message, however, was "gunna be at West Hall," sent to a friend  to say where they could meet. 

The incorrect replacement of misspelled words by auto-correct and spell-check programs is sometimes referred to as the Cupertino effect, a reference to the fact that Word ‘97 suggested Cupertino when "co-operation" was spelled without a hyphen. Cupertino is a small city in California, best known for being the home of Apple, whose iPhone auto-correct feature is notoriously error-prone.

This was last updated in October 2012

Continue Reading About auto-correct fail (auto-correct error)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close