Browse Definitions:
Definition

# increment

An increment is a small, unspecified, nonzero change in the value of a quantity. The symbol most commonly used is the uppercase Greek letter delta ( ). The concept is applied extensively in mathematical analysis and calculus.

Consider the case of the graph of a function y = f ( x ) in Cartesian (rectangular) coordinates, as shown in the figure. The slope of this curve at a specific point P is defined as the limit, as x approaches zero, of m = y / x , provided the function is continuous (the curve is not 'broken'). The value y / x depends on defining two points in the vicinity of P . In the illustration, one of the points is P itself, defined as ( x p , y p ), and the other is Q = ( x q , y q ), which is near P . The increments here are y = y q - y p and x = x q - x p . As point Q approaches point P , both of these increments approach zero, and the ratio of increments y / x approaches the slope of the curve at point P .

The term increment is occasionally used in physics and engineering to represent a small change in a parameter such as temperature, electric current, visible light intensity, or time.

Also see Mathematical Symbols .

This was last updated in September 2005

#### Start the conversation

Send me notifications when other members comment.

## SearchCompliance

• ### risk map (risk heat map)

A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

• ### internal audit (IA)

An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

• ### pure risk (absolute risk)

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

## SearchSecurity

• ### FIDO (Fast Identity Online)

FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

• ### cryptanalysis

Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

• ### Trojan horse (computing)

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

## SearchHealthIT

• ### HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009

The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to ...

• ### Epic Systems

Epic Systems is one of the largest providers of health information technology, used primarily by large U.S. hospitals and health ...

• ### accountable care organization (ACO)

An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

## SearchDisasterRecovery

• ### business continuity and disaster recovery (BCDR)

Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

• ### business continuity plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

• ### call tree

A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

## SearchStorage

• ### SSD TRIM

SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

• ### cloud storage service

A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a ...

• ### cloud hosting

Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers ...

## SearchSolidStateStorage

• ### hybrid hard disk drive (HDD)

A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close