Browse Definitions :
Definition

function

In information technology, the term function (pronounced FUHNK-shun ) has a number of meanings. It's taken from the Latin "functio" - to perform.

1) In its most general use, a function is what a given entity does in being what it is.

2) In C language and other programming, a function is a named procedure that performs a distinct service. The language statement that requests the function is called a function call . Programming languages usually come with a compiler and a set of "canned" functions that a programmer can specify by writing language statements. These provided functions are sometimes referred to as library routines . Some functions are self-sufficient and can return results to the requesting program without help. Other functions need to make requests of the operating system in order to perform their work.

3) In mathematics, a function is a relationship between two variables called the independent variable and the dependent variable. The dependent variable has at most one value for any specific value of the independent variable. A function is usually symbolized by a lowercase, italicized letter of the alphabet, followed by the independent variable in parentheses. For example, the expression y = f ( x ), read " y equals f of x ," means that a dependent variable y is a function of the independent variable x . Functions are often graphed, and they usually appear as lines or curves on a coordinate plane.

4) In a hardware device, a function is one complete physical movement that has a discernible consequence relative to the device's purposes. In a printer, for example, this might be a carriage return or a line feed.

This was last updated in September 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • spear phishing

    Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • bridge

    A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a ...

  • browser isolation

    Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close