Browse Definitions:
Definition

# algorithm

An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem, based on conductiong a sequence of specified actions. A computer program can be viewed as an elaborate algorithm. In mathematics and computer science, an algorithm usually means a small procedure that solves a recurrent problem.

Algorithms are widely used throughout all areas of IT (information technology). A search engine algorithm, for example, takes search strings of keywords and operators as input, searches its associated database for relevant web pages, and returns results.

An encryption algorithm transforms data according to specified actions to protect it. A secret key algorithm such as the U.S. Department of Defense's Data Encryption Standard (DES), for example, uses the same key to encrypt and decrypt data. As long as the algorithm is sufficiently sophisticated, no one lacking the key can decrypt the data.

The word algorithm derives from the name of the mathematician, Mohammed ibn-Musa al-Khwarizmi, who was part of the royal court in Baghdad and who lived from about 780 to 850. Al-Khwarizmi's work is the likely source for the word algebra as well.

Khan Academy provides an introductory tutorial on algorithms:

This was last updated in September 2016

#### Join the conversation

Send me notifications when other members comment.
http://www.inpractice.org/2013/08/11/children/what-is-an-algorithm/ From Teaching Algorithms To Children
Cancel
Ref. ALGORITHM ,
It is mentioned that Al Khouarizmi is the one who started ALGEBRA or ALJEBRA.
AlJEBRA is named after Mohamad ALJABER or ALGABER, not AL KHOUARIZMI...
Thanks for correcting.
Yousef.
yousefkhalaf@gmail.com
Cancel
I don't get it and its due on Friday and its Thursday and its my homework for grade 6!
Cancel
An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem.

HoMework is boring
Cancel
Send Rakhi Online with www.sendrakhizonline.com and share love and affection to your brother worldwide. Choose from a variety of beautiful, fancy, designer and awesome rakhi and rakhi gift collection.
Cancel
<strong>Send Rakhi Online</strong> is an online Rakhi shopping store which allows Indian siblings to share emotions and love on the holy festival Raksha Bandhan. <b>Send Rakhi Online</b> Helps sisters in sending Rakhi and Rakhi Gifts to their brothers worldwide. Also facilitates brother to <a href="http://www.sendrakhizonline.com/return-rakhi-gifts-for-sisters.html" title="Send Rakhi Gifts to Sister">send Rakhi return gifts for sisters</a> on the auspicious festival Rakhi. Browse from a huge collection of Beautiful, Fancy, Designer and Awesome Rakhi and <em>Rakhi Gifts</em>.

Visit: <a href="http://www.sendrakhizonline.com" title="Send Rakhi & Rakhi Gifts Online">www.sendrakhizonline.com</a>
Cancel
must see this site http://baselogics.blogspot.in/
Cancel
plese tell me what is rhe meaning of division algorethum
Cancel
No, term Al-gorithm is not derived from the name of Mohammed ibn-Musa al-Khwarizmi .. but from the name of Al-Abdulha Suleman Mithaiwala who used an acient technique to scarely known erstwhile to evaluate and calculate factors of production utlizied in manufacturing confectionaries. Another conspiracy says it is derived after name of phase that say Al-Gori-Thaam meaning 'hey beauty wait'.
Cancel
helo fkgfiopgj
Cancel
http://mazikbox.com
Cancel
hhshujfjfvnn vvdjfjdf dfjv csex vnfgidfbndvcjvbng sexx xfdfgjnikbsvkbntfb
Cancel
Thanks
http://www.mycodingland.com/2015/10/algorithm-and-algorithmic-notations.html
Cancel
the "Persian" mathematician, Mohammed ibn-Musa al-Khwarizmi, who ....
Cancel
chaz here
Cancel
thanx http://www.egrowthsolution.com/
Cancel

## SearchCompliance

• ### PCAOB (Public Company Accounting Oversight Board)

The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

• ### cyborg anthropologist

A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

• ### RegTech

RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

## SearchSecurity

• ### email spam

Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

• ### distributed denial of service (DDoS) attack

A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

• ### application whitelisting

Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

## SearchHealthIT

• ### athenahealth Inc.

Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

• ### Affordable Care Act (ACA or Obamacare)

The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

• ### HIPAA Privacy Rule

The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

## SearchDisasterRecovery

• ### disaster recovery as a service (DRaaS)

One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

• ### data recovery

Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

• ### disaster recovery plan (DRP)

A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

## SearchStorage

• ### virtual memory

Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

• ### yottabyte (YB)

A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

• ### Kilo, mega, giga, tera, peta, exa, zetta and all that

Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

## SearchSolidStateStorage

• ### PCIe SSD (PCIe solid-state drive)

A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

• ### SSD caching

SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

• ### NVDIMM (Non-Volatile Dual In-line Memory Module)

An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

## SearchCloudStorage

• ### RESTful API

A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

• ### cloud storage infrastructure

Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

• ### Zadara VPSA and ZIOS

Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close