Browse Definitions :
Definition

function

In information technology, the term function (pronounced FUHNK-shun ) has a number of meanings. It's taken from the Latin "functio" - to perform.

1) In its most general use, a function is what a given entity does in being what it is.

2) In C language and other programming, a function is a named procedure that performs a distinct service. The language statement that requests the function is called a function call . Programming languages usually come with a compiler and a set of "canned" functions that a programmer can specify by writing language statements. These provided functions are sometimes referred to as library routines . Some functions are self-sufficient and can return results to the requesting program without help. Other functions need to make requests of the operating system in order to perform their work.

3) In mathematics, a function is a relationship between two variables called the independent variable and the dependent variable. The dependent variable has at most one value for any specific value of the independent variable. A function is usually symbolized by a lowercase, italicized letter of the alphabet, followed by the independent variable in parentheses. For example, the expression y = f ( x ), read " y equals f of x ," means that a dependent variable y is a function of the independent variable x . Functions are often graphed, and they usually appear as lines or curves on a coordinate plane.

4) In a hardware device, a function is one complete physical movement that has a discernible consequence relative to the device's purposes. In a printer, for example, this might be a carriage return or a line feed.

This was last updated in September 2005

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close