Browse Definitions :
Definition

front end and back end

Contributor(s): Laura FItzgibbons

Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user. In this context, the user refers to an entity that could be human or digital.

The back end refers to parts of a computer application or a program's code that allow it to operate and that cannot be accessed by a user. Most data and operating syntax are stored and accessed in the back end of a computer system. Typically the code is comprised of one or more programming languages. The back end is also called the data access layer of software or hardware and includes any functionality that needs to be accessed and navigated to by digital means.

The layer above the back end is the front end and it includes all software or hardware that is part of a user interface. Human or digital users interact directly with various aspects of the front end of a program, including user-entered data, buttons, programs, websites and other features. Most of these features are designed by user experience (UX) professionals to be accessible, pleasant and easy to use.

A back-end application or program supports front-end user services, and interfaces with any required resources. The back-end application may interact directly with the front end or it may be called from an intermediate program that mediates front-end and back-end activities.

Purpose of front end and back end

System architectures are broken down into front end and back end components for a variety of purposes. The most common is in software and web development to break down projects in terms of required skills. The front end aspect of a project is usually handled by professionals such as web designers while the back end is handled by engineers and developers.

Front end and back end can also be used to describe situations where the customer has access to one view and employees have access to another. Front end components are customer facing while rights to the back end are exclusively for authenticated users.

Examples of front end and back end

Concepts and components that focus on the front end of a system include:

  • Design and markup languages like HTML, CSS and JavaScript.
  • Search engine optimization (SEO).
  • Usability and accessibility testing.
  • Graphic design and image editing tools.
  • Web performance and browser compatibility.

Inversely, those that focus on the back end of a system include:

  • Programming and scripting languages like PHP, Python and C#.
  • Automated testing frameworks.
  • Network scalability and availability.
  • Database management and data transformation.
  • Cybersecurity and data backup practices.
This was last updated in May 2019

Continue Reading About front end and back end

Join the conversation

4 comments

Send me notifications when other members comment.

Please create a username to comment.

What layer of software or hardware do you think holds more weight in your work, the front end or back end?
Cancel
front-end and front end are two different things ;)
Cancel
Under frontend in general you understand iOS-Applications, Android-Apps and the web frontend. Here you can use different technoligies http://frontend-gmbh.de/technologien
Cancel
Under frontend in general you understand iOS-Applications, Android-Apps and the web frontend. Here you can use different <a href="http://frontend-gmbh.de/technologien">technologies</a>.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • privilege creep

    Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. In IT, a privilege is...

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

Close