Browse Definitions :

Programming

Definitions related to software programming, including tech terms about programming languages and words and phrases about software design, coding, testing and debugging.

COL - FRA

  • Collaboration Data Objects (CDO) - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
  • comma-separated values file (CSV) - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comment - Often cited as one of the most useful and least used programming conventions, a comment is a text note added to source code to provide explanatory information, usually about the function of the code.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • compiler - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
  • Component Object Model (COM) - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • const - The const (constant) keyword indicates that the associated variable cannot be changed.
  • content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
  • context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for things the software developer anticipates the user might want to do.
  • contiguous - Contiguous describes two or more objects that are adjacent to each other.
  • continuous integration (CI) - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
  • CORBA (Common Object Request Broker Architecture) - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
  • core dump - A core dump is the printing or the copying to a more permanent medium (such as a hard disk) the contents of random access memory (RAM) at one moment in time.
  • Cosmos - Cosmos is an open source, evolving, .
  • cowboy coding - Cowboy coding describes an undisciplined approach to software development.
  • CQRS (command query responsibility segregation) - Command query responsibility segregation (CQRS) is a programming design pattern that treats retrieving data and changing data differently.
  • crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
  • cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
  • customer - In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project.
  • Cygwin - Cygwin is an open source collection of tools that allows Unix or Linux applications to be compiled and run on a Windows operating system from within a Linux-like interface.
  • d3.js (data-driven documents) - D3.js (data-driven documents) is a library of JavaScript code that enables users to input their own data into prebuilt visualizations.
  • data analytics (DA) - Data analytics (DA) is the process of examining data sets in order to find trends and draw conclusions about the information they contain.
  • data binding - Data binding is a process that allows an Internet user to manipulate Web page elements using a Web browser.
  • data preprocessing - Data preprocessing describes any type of processing performed on raw data to prepare it for another processing procedure.
  • data type - A data type, in programming, is a classification that specifies which type of value a variable has and what type of mathematical, relational or logical operations can be applied to it without causing an error.
  • DCOM (Distributed Component Object Model) - DCOM (Distributed Component Object Model) is a set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network.
  • debugging - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • decompile - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • delimiter - In computer programming, a delimiter is a character that identifies the beginning or the end of a character string (a contiguous sequence of characters).
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • design reuse - In information technology, design reuse is the inclusion of previously designed components (blocks of logic or data) in software and hardware.
  • development environment - In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product.
  • disassemble - In programming terminology, to disassemble is to convert a program in its executable (ready-to-run) form (sometimes called object code) into a representation in some form of assembler language so that it is readable by a human.
  • Diskpart (Disk Partition Utility) - Diskpart is a command-line utility used to manipulate disk partitions in all versions of Windows and Windows Server beginning with Windows XP and Windows Server 2003.
  • distributed computing - Distributed computing is a model in which components of a software system are shared among multiple computers.
  • distribution - In marketing, distribution is the process of moving a product from its manufacturing source to its customers.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • Document Object Model (DOM) - Document Object Model (DOM), a programming interface specification being developed by the World Wide Web Consortium (W3C), lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • domain model - In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT.
  • domain specific language (DSL) - A domain specific language (DSL) is a programming language developed to address an aspect within a specific domain.
  • DRY principle - The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.
  • dynamic HTML - Dynamic HTML is a collective term for a combination of Hypertext Markup Language (HTML) tags and options that can make Web pages more animated and interactive than previous versions of HTML.
  • dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that can be loaded when needed by larger programs and used at the same time.
  • dynamic memory allocation (in virtualization) - Dynamic memory allocation is a memory management technique in which a program can request and return memory while it is executing.
  • dynamic SQL (Dynamic Structured Query Language) - Dynamic SQL is an enhanced form of Structured Query Language (SQL) that, unlike standard (or static) SQL, facilitates the automatic generation and execution of program statements.
  • dynamic URL - A dynamic URL is the address - or Uniform Resource Locator (URL) - of a Web page with content that depends on variable parameters that are provided to the server that delivers it.
  • Easter Egg - An Easter Egg is an unexpected surprise -- an undocumented procedure or unauthorized feature that's playful in nature or gives credit to the software developer or chip designer.
  • ebXML (electronic business xml) - ebXML (Electronic Business XML) is a project to use the Extensible Markup Language (XML) to standardize the secure exchange of business data.
  • ECC (error correction code or error checking and correcting) - ECC (either "error correction [or correcting] code" or "error checking and correcting") allows data that is being read or transmitted to be checked for errors and, when necessary, corrected on the fly.
  • Eclipse (Eclipse Foundation) - Eclipse is an open-source Java Integrated Development Environment (IDE) known for its plug-ins that allow developers to develop and test code written in other programming languages.
  • elegant solution - The word elegant, in general, is an adjective meaning of fine quality.
  • Elk Cloner - Elk Cloner was the first computer virus known to have spread in the wild.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • embedded system - An embedded system is a combination of computer hardware and software designed for a specific function.
  • embedded systems programming - Embedded systems programming is the programming of an embedded system in some device using the permitted programming interfaces provided by that system.
  • EmbeddedJava - EmbeddedJava is Sun Microsystems' software development platform for dedicated-purpose devices with embedded systems, such as products designed for the automotive, telecommunication, and industrial device markets.
  • encapsulation - In general, encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent.
  • encapsulation in Java - Java offers four different "scope" realms--public, protected, private, and package--that can be used to selectively hide data constructs.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • engine - In computer programming, an engine is a program that performs a core or essential function for other programs.
  • Enterprise JavaBeans (EJB) - Enterprise JavaBeans (EJB) is an architecture for setting up program components, written in the Java programming language, that run in the server parts of a computer network that uses the client/server model.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.
  • Entity Relationship Diagram (ERD) - An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.
  • entity-relationship model (ERM or ER model) - The entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database.
  • Erlang programming language - Erlang is a programming language designed for developing robust systems of programs that can be distributed among different computers in a network.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
  • exception handler - In Java, checked exceptions are found when the code is compiled; for the most part, the program should be able to recover from these.
  • executable - In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • extract, transform, load (ETL) - Extract, transform, load (ETL) is a process for writing data values to a target database with a single programming tool.
  • Extreme Programming (XP) - Extreme Programming (XP) is a pragmatic approach to program development that emphasizes business results first and takes an incremental, get-something-started approach to building the product, using continual testing and revision.
  • FastCGI - FastCGI is a programming interface that can speed up Web applications that use the most popular way to have the Web server call an application, the common gateway interface (CGI).
  • feature flagging - Feature flagging is a cost-effective and simple programming method that involves a programming design pattern which allows developers to turn a feature of a software application on or off without having to release or change the code in production.
  • FIFO (first-in, first-out) - In computer programming, FIFO (first-in, first-out) is an approach to handling program work requests from queues or stacks so that the oldest request is handled next.
  • file extension (file format) - In a computer, a file extension is the layout of a file -- in terms of how the data within the file is organized.
  • filter - In computer programming, a filter is a program or section of code that is designed to examine each input or output request for certain qualifying criteria and then process or forward it accordingly.
  • Firebase Cloud Messaging (FCM) - Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send notifications and messages to users across a variety of platforms, including Android, iOS and web applications.
  • firefighting - Firefighting is an emergency allocation of resources, required to deal with an unforeseen problem.
  • fist to five (fist of five) - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • flag - In programming, a flag is a predefined bitor bit sequence that holds a binary value.
  • Flash - Flash, a popular authoring software developed by Macromedia, is used to create vector graphics-based animation programs with full-screen navigation interfaces, graphic illustrations, and simple interactivity in an antialiased, resizable file format that is small enough to stream across a normal modem connection.
  • flowchart - A flowchart is a formalized graphic representation of a logic sequence, work or manufacturing process, organization chart, or similar formalized structure.
  • foo (in software programming) - Foo is a term used by developers as a placeholder when describing an idea or concept.
  • FORTRAN (FORmula TRANslation) - FORTRAN (FORmula TRANslation) is a third-generation (3GL) programming language that was designed for use by engineers, mathematicians, and other users and creators of scientific algorithms.
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • sandbox (software testing and security)

    A sandbox is an isolated testing environment that enables users to run programs or open files without affecting the application, ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an individual or a group of unwanted and uninvited users interrupt online ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close