Browse Definitions :
Definition

add-in

Contributor(s): Keri Akin

Add-in is a term used, especially by Microsoft, for a software utility or other program that can be added to a primary program. The Microsoft Style Guide says that Microsoft Bookshelf is an add-in for Word and that Analysis Toolpak is an add-in for Microsoft Excel. According to the Style Guide, add-in should not be confused with add-on , a term for a hardware expansion unit. (However, some add-on manufacturers do call them "add-ins.")

A similar term is plug-in , a term originated by Netscape for application programs that can be activated within a Netscape Web browser window.

This was last updated in August 2005

Continue Reading About add-in

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

The newer versions attending sleeker and action added features <a href="http://discountsoftkings.com/microsoft-office-2010-professional-plus-full-retail-version.html">microsoft office 2010 professional plus key </a>. While the acclimatized Appointment users <a href="http://discountsoftkings.com/microsoft-excel-2010-full-version.html">microsoft office 2010 excel</a> accept accustomed the change <a href="http://discountsoftkings.com/microsoft-powerpoint-2010-full-version.html">microsoft office 2010 powerpoint</a> , the aboriginal time users generally acquisition <a href="http://discountsoftkings.com/microsoft-word-2010-full-version.html">microsoft office 2010 word</a> the anytime alteration <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 product keys</a> interface of appointment absolutely alarming to master <a href="http://discountsoftkings.com/microsoft-office-2010.html">product keys for microsoft office 2010</a> . There are a cardinal of fresh users <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 for windows</a> who get abashed by the huge cardinal of airheaded and <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 enterprise</a> sub airheaded in Microsoft appointment applications <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 key</a> . They booty a lot of time <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 64bit</a> in acquirements the basal operations <a href="http://discountsoftkings.com/microsoft-office-2010.html">microsoft office 2010 32 bit</a> and again absorb alike best time in acquirements the added avant-garde features <a href="http://discountsoftkings.com/microsoft-office-2010.html">download microsoft office 2010 with product key</a> .
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close