Browse Definitions :

Programming

Definitions related to software programming, including tech terms about programming languages and words and phrases about software design, coding, testing and debugging.

BUG - DEP

  • bug - In computer technology, a bug is a coding error in a computer program.
  • build - In a programming context, a build is a version of a program.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • bump mapping - Bump mapping is a technique used in graphics programs to produce the appearance of textured surfaces.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • business logic - Business logic is the programming that manages communication between an end user application and a database.
  • business logic attack - A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.
  • Business Process Modeling Language (BPML) - Business Process Modeling Language (BPML) is an Extensible Markup Language (XML)-based metalanguage developed by the Business Process Management Initiative (BPMI) as a means of modeling business processes, much as XML is, itself, a metalanguage with the ability to model enterprise data.
  • business rules engine (BRE) - A business rules engine (BRE) is a software component that allows non-programmers to add or change business logic in a business process management (BPM) system.
  • business technology management (BTM) - Business technology management (BTM) is a term for a group of services intended to help businesses that might not have their own information technology (IT) department.
  • bytecode - Bytecode is computer object code that is processed by a program, usually referred to as a virtual machine, rather than by the "real" computer machine, the hardware processor.
  • C - C is a structured, procedural programming language that has been widely used both for operating systems and applications and that has had a wide following in the academic community.
  • C# - C# (pronounced C-sharp) is an object-oriented programming language in development from Microsoft, which is intended to combine the computing power of C++ with the programming ease of Visual Basic.
  • C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications.
  • cabinet file (.cab) - In Microsoft program development, a cabinet is a single file created to hold a number of compressed files.
  • canonicalization - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • Capability Maturity Model (CMM) - The Capability Maturity Model (CMM) is a methodology used to develop and refine an organization's software development process.
  • CAPI (Common Application Programming Interface) - CAPI (Common Application Programming Interface) is an international standard interface that applications can use to communicate directly with ISDN equipment.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • cardinal - Cardinal refers to a basic or primary value.
  • Cascading Style Sheet, level 1 (CSS1) - CSS1 (Cascading Style Sheet, level is the recommendation from the World Wide Web Consortium (W3C) for a standard cascading style sheet specification.
  • CATT (Computer Aided Test Tool) - CATT (Computer Aided Test Tool) is a test tool in the ABAP Workbench package from SAP, part of its popular R/3 system.
  • cellular automaton (CA) - A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • chatbot - A chatbot (sometimes referred to as a chatterbot) is a computer program that attempts to simulate the conversation or "chatter" of a human being via text or voice interactions.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • class - In object-oriented programming, a class is a template definition of the methods and variables in a particular kind of object.
  • class library - In object-oriented programming, a class library is a collection of prewritten class es or coded templates, any of which can be specified and used by a programmer when developing an application program.
  • clean room technique (clean room design) - The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided.
  • client-server model (client-server architecture) - Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server).
  • COBOL (Common Business Oriented Language) - COBOL (Common Business-Oriented Language) is a high-level programming language for business applications.
  • code - In programming, code (noun) is a term used for both the statements written in a particular programming language - the source code, and a term for the source code after it has been processed by a compiler and made ready to run in the computer - the object code.
  • code review - Code review is a phase in the computer program development process in which the authors of code, peer reviewers, and perhaps quality assurance reviewers get together to review code, line by line.
  • codebase (code base) - A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.
  • CoffeeScript - CoffeeScript is a programming language that predictably transcompiles to JavaScript.
  • cold buffer - In data processing, a cold buffer is a buffer (segment of computer memory reserved for temporary data storage) that hasn't been used or accessed recently.
  • Collaboration Data Objects (CDO) - Collaboration Data Objects (CDO) is Microsoft's technology for building messaging or collaboration applications or adding these capabilities to existing applications.
  • COM+ - COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs.
  • comma-separated values file (CSV) - In computers, a CSV (comma-separated values) file contains the values in a table as a series of ASCII text lines organized so that each column value is separated by a comma from the next column's value and each row starts a new line.
  • comment - Often cited as one of the most useful and least used programming conventions, a comment is a text note added to source code to provide explanatory information, usually about the function of the code.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Information Model (CIM) - The Common Information Model (CIM) is a computer industry standard for defining device and application characteristics so that system administrators and management programs will be able to control devices and applications from different manufacturers or sources in the same way.
  • Common Language Infrastructure (CLI) - Part of Microsoft's .
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Compact HTML (CHTML) - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • Compiere - Compiere is a popular open-source system of software applications that provide enterprise resource planning (ERP), customer relationship management (CRM), supply chain management (SCM), tax accounting, and general accounting for the small and medium-size enterprise.
  • compiler - A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.
  • component - In programming and engineering disciplines, a component is an identifiable part of a larger program or construction.
  • Component Object Model (COM) - Component Object Model (COM) is Microsoft's framework for developing and supporting program component objects.
  • computational origami - Computational origami is a type of computer program for modeling the ways in which various materials, including paper, can be folded.
  • computational reflection - Computational reflection (sometimes just called reflection) is a computer process involving self-awareness.
  • computer-aided software engineering (CASE) - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.
  • concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare, to link together) is taking two or more separately located things and placing them side-by-side next to each other so that they can now be treated as one thing.
  • concurrent processing - Concurrent processing is a computing model in which multiple processors execute instructions simultaneously for better performance.
  • Concurrent Versions System (CVS) - CVS also is an abbreviation for Computer Vision Syndrome.
  • conformance - In information technology, a state or acts of adherence to a certain specification, standard, or guideline.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • const - The const (constant) keyword indicates that the associated variable cannot be changed.
  • context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for things the software developer anticipates the user might want to do.
  • contiguous - Contiguous describes two or more objects that are adjacent to each other.
  • continuous integration (CI) - Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.
  • CORBA (Common Object Request Broker Architecture) - Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network.
  • core dump - A core dump is the printing or the copying to a more permanent medium (such as a hard disk) the contents of random access memory (RAM) at one moment in time.
  • Cosmo - Cosmo was a set of products for developing presentations and applications that took advantage of the Java programming language, 3-D environments using the Virtual Reality Modeling Language (VRML), and other multimedia elements.
  • Cosmos - Cosmos is an open source, evolving, .
  • cowboy coding - Cowboy coding describes an undisciplined approach to software development.
  • crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
  • critical section routine - In computers, a critical section routine is an approach to the problem of two or more programs competing for the same resource at the same time.
  • cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
  • crypto - Depending on its usage, crypto can be a short form for cryptography or for encryption.
  • cuckoo egg - A cuckoo egg is an MP3 file that typically contains 30 seconds of the original song with the remainder of the song overwritten with cuckoo clock noises, white noise, and/or voice messages such as, "Congratulations, you must've goofed up somewhere.
  • Curl - Curl is an object-oriented programming language designed to replace HTML, JavaScript, and related tools as a means for creating interactive Web pages.
  • curses - In C programming, curses is a collection of precompiled routines stored as objects for text-based terminals that is used to create similarity of function.
  • customer - In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project.
  • Cygwin - Cygwin is an open source collection of tools that allows Unix or Linux applications to be compiled and run on a Windows operating system from within a Linux-like interface.
  • D - D is one of two programming languages, Digital Mars D, an object-oriented metaprogramming language, or Microsoft D, a key component of the upcoming Oslo development environment.
  • d3.js (data-driven documents) - D3.js (data-driven documents) is a library of JavaScript code that enables users to input their own data into prebuilt visualizations.
  • data analytics (DA) - Data analytics (DA) is the science of examining raw data with the purpose of drawing conclusions about that information.
  • data binding - Data binding is a process that allows an Internet user to manipulate Web page elements using a Web browser.
  • data hiding - Data hiding is a characteristic of object-oriented programming.
  • data preprocessing - Data preprocessing describes any type of processing performed on raw data to prepare it for another processing procedure.
  • Data Security Council of India (DSCI) - The Data Security Council of India (DSCI) is a not-for-profit organization created to promote the country as a secure destination for information technology (IT) outsourcing.
  • data source object (DSO) - A data source object (DSO) is a Microsoft ActiveX object embedded within a Web page.
  • data type - A data type, in programming, is a classification that specifies which type of value a variable has and what type of mathematical, relational or logical operations can be applied to it without causing an error.
  • DCOM (Distributed Component Object Model) - DCOM (Distributed Component Object Model) is a set of Microsoft concepts and program interfaces in which client program objects can request services from server program objects on other computers in a network.
  • dead body spam (corpse graffiti) - Dead body spam, also known as corpse graffiti, is a message in a video game that's spelled out with dead characters.
  • debugging - Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.
  • decompile - To decompile is to convert executable (ready-to-run) program code (sometimes called object code) into some form of higher-level programming language so that it can be read by a human.
  • delimiter - In computer programming, a delimiter is a character that identifies the beginning or the end of a character string (a contiguous sequence of characters).
  • Delphi - Delphi (pronounced DEHL-FAI) from Borland competes with Visual Basic as an offering for an object-oriented, visual programming approach to application development.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • privilege creep

    Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. In IT, a privilege is...

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

Close