Browse Definitions :
Definition

front end and back end

Contributor(s): Laura FItzgibbons

Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user. In this context, the user refers to an entity that could be human or digital.

The back end refers to parts of a computer application or a program's code that allow it to operate and that cannot be accessed by a user. Most data and operating syntax are stored and accessed in the back end of a computer system. Typically the code is comprised of one or more programming languages. The back end is also called the data access layer of software or hardware and includes any functionality that needs to be accessed and navigated to by digital means.

The layer above the back end is the front end and it includes all software or hardware that is part of a user interface. Human or digital users interact directly with various aspects of the front end of a program, including user-entered data, buttons, programs, websites and other features. Most of these features are designed by user experience (UX) professionals to be accessible, pleasant and easy to use.

A back-end application or program supports front-end user services, and interfaces with any required resources. The back-end application may interact directly with the front end or it may be called from an intermediate program that mediates front-end and back-end activities.

Purpose of front end and back end

System architectures are broken down into front end and back end components for a variety of purposes. The most common is in software and web development to break down projects in terms of required skills. The front end aspect of a project is usually handled by professionals such as web designers while the back end is handled by engineers and developers.

Front end and back end can also be used to describe situations where the customer has access to one view and employees have access to another. Front end components are customer facing while rights to the back end are exclusively for authenticated users.

Examples of front end and back end

Concepts and components that focus on the front end of a system include:

  • Design and markup languages like HTML, CSS and JavaScript.
  • Search engine optimization (SEO).
  • Usability and accessibility testing.
  • Graphic design and image editing tools.
  • Web performance and browser compatibility.

Inversely, those that focus on the back end of a system include:

  • Programming and scripting languages like PHP, Python and C#.
  • Automated testing frameworks.
  • Network scalability and availability.
  • Database management and data transformation.
  • Cybersecurity and data backup practices.
This was last updated in May 2019

Continue Reading About front end and back end

Join the conversation

4 comments

Send me notifications when other members comment.

Please create a username to comment.

What layer of software or hardware do you think holds more weight in your work, the front end or back end?
Cancel
front-end and front end are two different things ;)
Cancel
Under frontend in general you understand iOS-Applications, Android-Apps and the web frontend. Here you can use different technoligies http://frontend-gmbh.de/technologien
Cancel
Under frontend in general you understand iOS-Applications, Android-Apps and the web frontend. Here you can use different <a href="http://frontend-gmbh.de/technologien">technologies</a>.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close