Browse Definitions :
Definition

# recursion

In computer programming, a recursion (noun, pronounced ree-KUHR-zhion) is programming that is recursive (adjective), and recursive has two related meanings:

1) A recursive procedure or routine is one that has the ability to call itself. This usually means that it has the capability to save the condition it was in or the particular process it is serving when it calls itself (otherwise, any variable values that have been developed in executing the code are overlaid by the next iteration or go-through). Typically, this is done by saving values in registers or data area stacks before calling itself or at the beginning of the sequence where it has just been reentered.

2) A recursive expression is a function, algorithm, or sequence of instructions (typically, an IF, THEN, ELSE sequence) that loops back to the beginning of itself until it detects that some condition has been satisfied. Here is a simple example (using a made-up computer source language):

```CODELINE1   N=0;
CODELINE2   IF N=<10 THEN DO WRITE LETTER;
CODELINE3   ELSE GOTO CODELINE6;
CODELINE4   N=N+1;
CODELINE5   GOTO CODELINE2;
CODELINE6   ...some other instruction
```

Here, the instructions labeled CODELINE2 through CODELINE5 are recursive until the condition of N having the value of 10. "IF N=<10" means "If N has a value less than 10." "N=N+1" means "Add 1 to the current value of N."

In mathematics, recursion has similar but more complicated meanings than it does when used in programming.

This was last updated in August 2005

## SearchCompliance

• ### compliance risk

Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

• ### information governance

Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

• ### enterprise document management (EDM)

Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

## SearchSecurity

• ### information security (infosec)

Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of ...

• ### denial-of-service attack

A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

• ### user authentication

User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

## SearchHealthIT

• ### protected health information (PHI) or personal health information

Protected health information (PHI), also referred to as personal health information, is the demographic information, medical ...

• ### digital health (digital healthcare)

Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between ...

• ### HIPAA (Health Insurance Portability and Accountability Act)

HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security ...

## SearchDisasterRecovery

• ### risk mitigation

Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

• ### call tree

A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

• ### Disaster Recovery as a Service (DRaaS)

Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

## SearchStorage

• ### cloud storage

Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

• ### cloud testing

Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

• ### storage virtualization

Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close