Browse Definitions :
Definition

binary file

Contributor(s): Ryan Speirs

A binary file is a file whose content must be interpreted by a program or a hardware processor that understands in advance exactly how it is formatted. That is, the file is not in any externally identifiable format so that any program that wanted to could look for certain data at a certain place within the file. A progam (or hardware processor) has to know exactly how the data inside the file is laid out to make use of the file.

In general, executable (ready-to-run) programs are often identified as binary files and given a file name extension of ".bin". Programmers often talk about an executable program as a "binary" and will ask another programmer to "send me the binaries." (A synonym for this usage is object code .) A binary file could also contain data ready to be used by a program.

In terms of transmitting files from one place to another, a file can be transmitted as a "binary," meaning that the programs handling it don't attempt to look within it or change it, but just pass it along as a "chunk of 0s and 1s," the meaning of which is unknown to any network device.

This was last updated in April 2005

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

The BIN file extension is employed by a number of programs that range from image disk programs to data storage. The most typical definition of the file extension BIN is associated to Nero Burning ROM, a disk imaging software application. For technically detailed information please refer to http://www.file-extension.com/files/BIN/
Cancel
Cash On My Top Secret Profit Formula and Quickly Secure Weekly Profits Of $50000. Watch the video here: http://tinyurl.com/qeurad9 . Hurry up!
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close