Browse Definitions :
Definition

add-in

Contributor(s): Keri Akin

Add-in is a term used, especially by Microsoft, for a software utility or other program that can be added to a primary program. The Microsoft Style Guide says that Microsoft Bookshelf is an add-in for Word and that Analysis Toolpak is an add-in for Microsoft Excel. According to the Style Guide, add-in should not be confused with add-on , a term for a hardware expansion unit. (However, some add-on manufacturers do call them "add-ins.")

A similar term is plug-in , a term originated by Netscape for application programs that can be activated within a Netscape Web browser window.

This was last updated in August 2005

Continue Reading About add-in

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

The newer versions attending sleeker and action added features <a href="http://discountsoftkings.com/microsoft-office-2010-professional-plus-full-retail-version.html">microsoft office 2010 professional plus key </a>. While the acclimatized Appointment users <a href="http://discountsoftkings.com/microsoft-excel-2010-full-version.html">microsoft office 2010 excel</a> accept accustomed the change <a href="http://discountsoftkings.com/microsoft-powerpoint-2010-full-version.html">microsoft office 2010 powerpoint</a> , the aboriginal time users generally acquisition <a href="http://discountsoftkings.com/microsoft-word-2010-full-version.html">microsoft office 2010 word</a> the anytime alteration <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 product keys</a> interface of appointment absolutely alarming to master <a href="http://discountsoftkings.com/microsoft-office-2010.html">product keys for microsoft office 2010</a> . There are a cardinal of fresh users <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 for windows</a> who get abashed by the huge cardinal of airheaded and <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 enterprise</a> sub airheaded in Microsoft appointment applications <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 key</a> . They booty a lot of time <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 64bit</a> in acquirements the basal operations <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 32 bit</a> and again absorb alike best time in acquirements the added avant-garde features <a href="http://discountsoftkings.com/microsoft-office-2010.html">download microsoft office 2010 with product key</a> .
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close