Computer Dictionary

Search and explore key computer science terms including programming, hardware, networking, databases, AI, and more.

Showing 351 terms
KeywordDescription
Abstract Data Type (ADT)A mathematical model for data types that defines behavior without implementation details (e.g., Stack, Queue).
Access ControlSecurity policies restricting unauthorized access to systems/resources (e.g., RBAC, ACL).
AccumulatorCPU register storing intermediate arithmetic/logic results.
AdderDigital circuit performing binary addition (Half-Adder, Full-Adder).
Address BusHardware pathway carrying memory addresses between CPU and RAM.
Adversarial AIAttacks manipulating ML models (e.g., adversarial examples).
Agile DevelopmentIterative software methodology (Scrum, Kanban).
AJAXAsynchronous JavaScript/XML for dynamic web content.
AlgorithmStep-by-step problem-solving procedure (e.g., Dijkstra’s, Quicksort).
Alpha TestingInitial software testing by internal teams.
ALU (Arithmetic Logic Unit)CPU component performing calculations/bitwise operations.
Amazon Web Services (AWS)Cloud computing platform (EC2, S3, Lambda).
Analog ComputerProcesses continuous data (e.g., voltage, temperature).
Android SDKToolkit for building Android apps.
AnimationRapid image sequencing to simulate motion.
ANSIAmerican National Standards Institute (e.g., ANSI C).
APIApplication Programming Interface for software interaction.
AppletSmall Java application running in browsers (deprecated).
ArchivingLong-term data storage/compression (e.g., ZIP, TAR).
ARPAddress Resolution Protocol (maps IP to MAC).
ArrayFixed-size collection of same-type elements.
Artificial Intelligence (AI)Machines mimicking human intelligence (ML, NLP, Robotics).
AssemblerConverts assembly language to machine code.
Assembly LanguageLow-level programming using mnemonics (e.g., MOV, ADD).
Asymmetric EncryptionPublic-key cryptography (e.g., RSA, ECC).
AtomicityDatabase property ensuring transactions are all-or-nothing (ACID).
AttributeData field in OOP or databases (e.g., class properties).
AuthenticationVerifying user identity (e.g., passwords, OTP).
AuthorizationGranting resource access post-authentication.
AutocompleteUI feature predicting user input (e.g., search suggestions).
Automata TheoryStudy of abstract machines (DFA, NFA, Turing Machines).
AVL TreeSelf-balancing binary search tree.
A* AlgorithmPathfinding algorithm using heuristics.
AbstractionHiding complexity while exposing essentials (OOP principle).
Active DirectoryMicrosoft’s directory service for network management.
Actor ModelConcurrency framework (e.g., Akka, Erlang).
Adaptive SoftwarePrograms adjusting behavior based on environment.
Adjacency MatrixGraph representation using a 2D array.
Affine TransformationLinear mapping in graphics (rotation, scaling).
Agent-Based ModelingSimulating autonomous agents (e.g., traffic systems).
Ambient IntelligenceSmart environments reacting to human presence.
Apache HadoopFramework for distributed big data processing.
Augmented Reality (AR)Overlaying digital content on real-world views.
BackendThe server-side part of an application that handles logic, databases, and APIs.
BackpropagationAn algorithm used in training neural networks to calculate gradients for weight updates.
BackupThe process of copying data to restore it in case of loss or corruption.
BandwidthThe maximum data transfer rate of a network or internet connection, measured in bits per second (bps).
Base CaseThe terminating condition in a recursive function that stops further recursion.
Batch ProcessingExecuting a series of jobs (data/commands) without manual intervention, often scheduled.
Behavioral ModelA design pattern focusing on communication between objects (e.g., Observer, Strategy).
Big O NotationA mathematical notation describing the upper bound of an algorithm's time/space complexity.
Binary SearchAn efficient O(log n) search algorithm for sorted arrays by repeatedly dividing the interval.
Binary TreeA tree data structure where each node has at most two children (left and right).
BitThe smallest unit of data in computing, representing a binary value (0 or 1).
BlockchainA decentralized, distributed ledger technology for secure transactions (e.g., Bitcoin, Ethereum).
BooleanA data type with two values: true or false.
BootstrapA front-end framework for responsive web design using HTML/CSS/JS.
BotnetA network of compromised devices controlled by malware for DDoS attacks or spam.
BranchA divergence in code execution (e.g., in version control or CPU pipelines).
Breadth-First Search (BFS)A graph traversal algorithm exploring all neighbor nodes at the present depth before moving deeper.
BufferA temporary memory area storing data during transfer between processes/devices.
BugAn error or flaw in software causing unexpected behavior.
BusA communication system transferring data between computer components (e.g., USB, PCI).
ByteA unit of data equal to 8 bits, representing a single character (e.g., 'A' = 65 in ASCII).
BytecodeIntermediate code executed by virtual machines (e.g., Java JVM, Python PVM).
CacheA high-speed data storage layer that stores a subset of data for faster access.
Call StackA stack data structure that stores information about active subroutines in a program.
CompilerA program that translates source code written in a high-level language into machine code.
CryptographyThe practice of secure communication techniques to protect information from adversaries.
CSS (Cascading Style Sheets)A stylesheet language used to describe the presentation of a document written in HTML.
CPU (Central Processing Unit)The electronic circuitry that executes instructions comprising a computer program.
Cloud ComputingThe delivery of computing services over the internet ('the cloud') including servers, storage, databases, etc.
CybersecurityThe practice of protecting systems, networks, and programs from digital attacks.
ConcurrencyThe ability of different parts or units of a program to be executed out-of-order or in partial order.
CookieA small piece of data sent from a website and stored on the user's computer by the web browser.
CAP TheoremA concept that a distributed system can only provide 2 of 3 guarantees: Consistency, Availability, and Partition tolerance.
CI/CD (Continuous Integration/Continuous Deployment)A method to frequently deliver apps by introducing automation into the stages of app development.
C++A general-purpose programming language created as an extension of the C programming language.
C#A general-purpose, multi-paradigm programming language encompassing strong typing and object-oriented programming.
Command Line Interface (CLI)A text-based interface used to interact with software and operating systems.
Client-Server ModelA distributed application structure that partitions tasks between providers (servers) and requesters (clients).
Computer VisionA field of artificial intelligence that trains computers to interpret and understand the visual world.
ChatbotA software application used to conduct an online chat conversation via text or text-to-speech.
ClusteringA machine learning technique that groups similar data points together.
ChecksumA small-sized datum derived from a block of digital data for detecting errors.
Cross-PlatformSoftware that can run on multiple computing platforms with minimal modifications.
Cron JobA time-based job scheduler in Unix-like operating systems.
Content Delivery Network (CDN)A geographically distributed network of proxy servers and their data centers.
Cyclomatic ComplexityA software metric used to indicate the complexity of a program.
CachingThe process of storing copies of files in a cache for quicker access.
ContainerizationA lightweight alternative to full machine virtualization that involves encapsulating an application in a container.
Code ReviewA systematic examination of computer source code intended to find and fix mistakes overlooked in development.
Cache CoherenceThe uniformity of shared resource data that ends up stored in multiple local caches.
ClosureA function that has access to its own scope, the outer function's variables, and global variables.
CORS (Cross-Origin Resource Sharing)A mechanism that allows restricted resources on a web page to be requested from another domain.
CipherAn algorithm for performing encryption or decryption.
CRUD (Create, Read, Update, Delete)The four basic functions of persistent storage in database applications.
Context SwitchThe process of storing the state of a process or thread so that it can be restored and execution resumed later.
Continuous IntegrationThe practice of merging all developers' working copies to a shared mainline several times a day.
CyberattackAn attempt to damage, disrupt, or gain unauthorized access to a computer system or network.
CachingThe process of storing copies of files in a cache for quicker access.
ClusteringA machine learning technique that groups similar data points together.
CyberneticsThe science of communications and automatic control systems in both machines and living things.
Code RefactoringThe process of restructuring existing computer code without changing its external behavior.
Convolutional Neural Network (CNN)A class of deep neural networks, most commonly applied to analyzing visual imagery.
CryptocurrencyA digital currency in which transactions are verified and records maintained by a decentralized system.
Cyber-Physical SystemsSystems that integrate computation, networking, and physical processes.
Content Management System (CMS)A software application used to create and manage digital content.
Computational ComplexityA branch of computer science that focuses on classifying computational problems according to their difficulty.
Computer ArchitectureThe set of rules and methods that describe the functionality, organization, and implementation of computer systems.
CyberspaceThe notional environment in which communication over computer networks occurs.
Coding StandardsA set of guidelines for a specific programming language that recommend programming style, practices, and methods.
Cellular AutomatonA discrete model studied in computability theory, mathematics, physics, complexity science, theoretical biology.
Cyber WarfareThe use of digital attacks to attack a nation, causing comparable harm to actual warfare.
Code ObfuscationThe deliberate act of creating source or machine code that is difficult for humans to understand.
Cascading FailureA failure in a system of interconnected parts where the failure of one part can trigger the failure of successive parts.
Computational ThinkingA problem-solving process that includes formulating problems, logically organizing data, and representing data through abstractions.
Cloud StorageA model of computer data storage in which the digital data is stored in logical pools across multiple servers.
Cyber HygieneBasic steps and practices that users can take to improve their cybersecurity.
Computer NetworkA set of computers connected together for the purpose of sharing resources.
Circuit SwitchingA method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel.
Coding TheoryThe study of the properties of codes and their fitness for a specific application.
Cyber Threat IntelligenceInformation about threats and threat actors that helps mitigate harmful events in cyberspace.
Cluster AnalysisThe task of grouping a set of objects in such a way that objects in the same group are more similar to each other.
Computational BiologyThe science of using biological data to develop algorithms and models to understand biological systems.
Cyber ResilienceThe ability of a system to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, or attacks.
Context-Free GrammarA formal grammar where production rules are of the form A → α, where A is a nonterminal and α is a string of terminals and/or nonterminals.
Cyber-Physical SecurityThe protection of cyber-physical systems from malicious attacks.
Concurrent ComputingA form of computing in which several computations are executed during overlapping time periods.
Code SmellAny characteristic in the source code of a program that possibly indicates a deeper problem.
Cyber InsuranceAn insurance product used to protect businesses from Internet-based risks.
Computer Vision SyndromeA condition resulting from focusing the eyes on a computer display for extended periods.
Cyber LawThe legal issues related to use of communications technology, particularly cyberspace.
Cloud SecurityThe set of policies, technologies, and controls deployed to protect data and infrastructure in cloud computing.
Computational GeometryA branch of computer science devoted to the study of algorithms which can be stated in terms of geometry.
Cyber EspionageThe use of computer networks to gain illicit access to confidential information.
Contextual BanditA machine learning algorithm that selects actions based on contextual information.
Cyber ForensicsThe practice of identifying, acquiring, processing, analyzing, and reporting on data stored electronically.
Computational LinguisticsThe scientific study of language from a computational perspective.
Cyber RangeA virtual environment used for cybersecurity training and simulations.
Cognitive ComputingSystems that learn at scale, reason with purpose, and interact with humans naturally.
Cyber Risk ManagementThe process of identifying, assessing, and prioritizing risks to information and information systems.
Computational NeuroscienceThe study of brain function in terms of the information processing properties of the structures that make up the nervous system.
Cyber Threat HuntingThe practice of proactively searching for cyber threats that are lurking undetected in a network.
Context-Aware ComputingA computing paradigm that uses context to provide relevant information and services to the user.
Cyber-Physical AttackA security breach in cyberspace that impacts operations in the physical world.
Computational PhysicsThe study and implementation of numerical analysis to solve problems in physics.
Cyber Threat ModelingA process by which potential threats can be identified, enumerated, and prioritized.
Contextual AdvertisingA form of targeted advertising for advertisements appearing on websites or other media.
Cyber-Physical InterfaceThe boundary between the cyber and physical worlds where interactions occur.
Computational Social ScienceThe academic sub-discipline concerned with computational approaches to the social sciences.
Cyber Threat Intelligence SharingThe exchange of information about cyber threats between organizations.
Contextual InquiryA user-centered design research method that involves observing and interviewing users in their natural environment.
Cyber-Physical SimulationThe simulation of systems that integrate computation, networking, and physical processes.
Computational SustainabilityThe application of computational techniques to sustainable development.
Cyber Threat Intelligence PlatformA technology solution that aggregates, correlates, and analyzes threat intelligence data.
Contextual DesignA user-centered design process that uses contextual inquiry as its primary research method.
Cyber-Physical TestbedA platform for experimenting with cyber-physical systems.
Computational TopologyThe study of topological features of data from a computational perspective.
Cyber Threat Intelligence FeedA stream of data containing information about cyber threats.
Contextual Bandit ProblemA machine learning problem where an algorithm must select actions based on contextual information.
Cyber-Physical Security ExerciseA training exercise focused on securing cyber-physical systems.
Computational TypologyThe computational study of language typology.
Cyber Threat Intelligence AnalystA professional who analyzes cyber threat intelligence data.
Contextual Bandit AlgorithmA machine learning algorithm that solves the contextual bandit problem.
Cyber-Physical Security AssessmentAn evaluation of the security of a cyber-physical system.
Computational VerificationThe use of computers to verify mathematical proofs.
Cyber Threat Intelligence FrameworkA structured approach to collecting, analyzing, and disseminating cyber threat intelligence.
Contextual Bandit ModelA machine learning model that implements a contextual bandit algorithm.
Cyber-Physical Security FrameworkA structured approach to securing cyber-physical systems.
Computational VirologyThe use of computers to study viruses.
Cyber Threat Intelligence LifecycleThe process by which cyber threat intelligence is collected, analyzed, and acted upon.
Contextual Bandit ProblemA machine learning problem where an algorithm must select actions based on contextual information.
Cyber-Physical Security PolicyA set of rules and procedures for securing cyber-physical systems.
Computational VisionThe use of computers to process and understand visual information.
Cyber Threat Intelligence PlatformA technology solution that aggregates, correlates, and analyzes threat intelligence data.
Contextual Bandit SolutionA method for solving the contextual bandit problem.
Cyber-Physical Security StandardA set of criteria for securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence ProcessThe steps involved in collecting, analyzing, and acting on cyber threat intelligence.
Contextual Bandit SystemA machine learning system that implements a contextual bandit algorithm.
Cyber-Physical Security TrainingEducation and exercises focused on securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence SharingThe exchange of information about cyber threats between organizations.
Contextual Bandit TechniqueA method for implementing a contextual bandit algorithm.
Cyber-Physical Security ToolSoftware or hardware used to secure cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing PlatformA technology solution that facilitates the exchange of cyber threat intelligence.
Contextual Bandit TheoryThe mathematical foundation of contextual bandit algorithms.
Cyber-Physical Security VulnerabilityA weakness in a cyber-physical system that could be exploited by a threat actor.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing ProtocolA standardized method for exchanging cyber threat intelligence.
Contextual Bandit VariantA modified version of the contextual bandit problem.
Cyber-Physical Security WorkshopA meeting or training session focused on securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing StandardA set of criteria for exchanging cyber threat intelligence.
Contextual Bandit ApplicationA practical use of contextual bandit algorithms.
Cyber-Physical Security ExerciseA training exercise focused on securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing FrameworkA structured approach to exchanging cyber threat intelligence.
Contextual Bandit ImplementationA specific way of coding a contextual bandit algorithm.
Cyber-Physical Security AssessmentAn evaluation of the security of a cyber-physical system.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing ProcessThe steps involved in exchanging cyber threat intelligence.
Contextual Bandit PerformanceThe effectiveness of a contextual bandit algorithm.
Cyber-Physical Security PolicyA set of rules and procedures for securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing StandardA set of criteria for exchanging cyber threat intelligence.
Contextual Bandit OptimizationThe process of improving the performance of a contextual bandit algorithm.
Cyber-Physical Security StandardA set of criteria for securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing FrameworkA structured approach to exchanging cyber threat intelligence.
Contextual Bandit EvaluationThe process of assessing the performance of a contextual bandit algorithm.
Cyber-Physical Security FrameworkA structured approach to securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing ProtocolA standardized method for exchanging cyber threat intelligence.
Contextual Bandit AnalysisThe examination of a contextual bandit algorithm's behavior.
Cyber-Physical Security ToolSoftware or hardware used to secure cyber-physical systems.
DatabaseAn organized collection of structured data stored electronically in a computer system.
Data StructureA specialized format for organizing, processing, retrieving and storing data (e.g., arrays, linked lists).
DebuggingThe process of identifying and removing errors from computer hardware or software.
Deep LearningA subset of machine learning using artificial neural networks with multiple abstraction layers.
DNS (Domain Name System)The hierarchical naming system that translates domain names to IP addresses.
Distributed SystemA system whose components are located on networked computers that communicate to achieve a common goal.
DockerA platform for developing, shipping, and running applications in containers.
Data MiningThe process of discovering patterns in large datasets using machine learning, statistics, and database systems.
Dijkstra's AlgorithmAn algorithm for finding the shortest paths between nodes in a graph.
Dynamic ProgrammingA method for solving complex problems by breaking them down into simpler subproblems.
Data WarehouseA central repository of integrated data from one or more disparate sources.
DevOpsA set of practices combining software development (Dev) and IT operations (Ops).
Digital SignatureA mathematical scheme for verifying the authenticity of digital messages or documents.
DDoS (Distributed Denial of Service)A cyberattack where multiple systems flood a target's resources to disrupt service.
DartA client-optimized programming language developed by Google for building mobile, desktop and web apps.
Data ScienceAn interdisciplinary field using scientific methods to extract knowledge from structured/unstructured data.
Dependency InjectionA design pattern where an object receives other objects it depends on (inversion of control).
DjangoA high-level Python web framework encouraging rapid development and clean design.
Docker ComposeA tool for defining and running multi-container Docker applications.
Data LakeA storage repository holding vast amounts of raw data in native format.
Dual StackA networking architecture allowing hosts to simultaneously communicate via IPv4 and IPv6.
DeadlockA situation where processes block each other by holding resources needed by another.
DynamoDBAmazon's fully managed NoSQL database service.
Data ModelingThe process of creating a data model for an information system.
Design PatternA general reusable solution to commonly occurring problems in software design.
Dart VMThe virtual machine that executes Dart code and provides runtime support.
Data PipelineA set of data processing elements connected in series for automated data flow.
Differential PrivacyA system for publicly sharing data while withholding information about individuals.
Directive (Programming)A language construct specifying how a compiler should process input (e.g., #include in C).
Domain-Driven Design (DDD)An approach to software development focusing on complex needs by connecting implementation to an evolving model.
Data GovernanceThe overall management of availability, usability, integrity, and security of enterprise data.
Dependency GraphA directed graph representing dependencies of several objects toward each other.
Deterministic AlgorithmAn algorithm that, given a particular input, will always produce the same output.
Durable (ACID)A database property where committed transactions persist even after system failures.
Data IntegrityThe maintenance and assurance of data accuracy and consistency over its lifecycle.
DatalogA declarative logic programming language for querying databases.
Declarative ProgrammingA paradigm expressing the logic of computation without describing control flow (e.g., SQL).
Docker SwarmDocker's native clustering and orchestration tool.
DataframeA 2D labeled data structure with columns of potentially different types (Pandas, R).
Dynamic TypingA language feature where type checking is performed at runtime (e.g., Python, JavaScript).
DenormalizationA database optimization technique adding redundant data to improve read performance.
Dual CoreA CPU with two complete execution cores per physical processor.
Data DictionaryA centralized repository of information about data such as meaning, relationships, origin, usage.
Dimensional ModelingA data structure technique optimized for data warehousing tools.
Duck TypingA style of dynamic typing where an object's suitability is determined by presence of methods/properties.
DockerfileA text document containing commands to assemble a Docker image.
Data CleansingThe process of detecting and correcting corrupt or inaccurate records from datasets.
Depth-First Search (DFS)A graph traversal algorithm exploring as far as possible along each branch before backtracking.
DeploymentThe activities making a software system available for use.
Data SerializationThe process of converting data structures into a storable/transmittable format (e.g., JSON, Protocol Buffers).
DMA (Direct Memory Access)A feature allowing hardware subsystems to access memory independently of the CPU.
Data FederationAn approach integrating multiple databases into a virtual database.
Dart NativeDart code compiled to native machine code for mobile/desktop apps.
Discrete MathematicsMathematical structures fundamentally discrete rather than continuous (essential for CS).
Data ReplicationThe process of storing data in multiple locations to improve availability and fault tolerance.
Dependency ManagementTools and processes for handling external libraries/packages a project relies on.
Dart WebDart code compiled to JavaScript for web applications.
Data MaskingA technique creating structurally similar but inauthentic data for privacy protection.
Deterministic Finite Automaton (DFA)A finite state machine accepting/rejecting strings of symbols by running through a state sequence.
Data WranglingThe process of cleaning, structuring, and enriching raw data into a desired format.
Docker HubA cloud-based registry service for sharing Docker container images.
Data ParallelismA form of parallel computing where the same operation is performed on multiple data simultaneously.
Dual BootA configuration where a computer has two operating systems and can boot into either.
Data VisualizationThe graphical representation of information and data (e.g., charts, graphs).
Dart IsolateA lightweight thread in Dart's concurrency model with its own memory heap.
Data NormalizationThe process of structuring a database to reduce redundancy and improve integrity.
Dynamic Link Library (DLL)Microsoft's implementation of shared libraries in Windows.
Data SovereigntyThe concept that digital data is subject to laws of the country where it's located.
Dart FFI (Foreign Function Interface)A mechanism for Dart code to call native C code.
Data MeshA decentralized architecture for data management and organizational scaling.
Domain NameA human-readable web address (e.g., google.com) mapped to an IP address via DNS.
Dart AnalyzerA static analysis tool for Dart code that identifies errors and warnings.
Data AnnotationThe process of labeling data to make it usable for machine learning.
Dynamic Host Configuration Protocol (DHCP)A network protocol automatically assigning IP addresses to devices.
Data StreamA continuous flow of data records processed incrementally.
Dart PubDart's package manager for sharing and using libraries.
Data QualityThe measure of data's fitness to serve its purpose in a given context.
Digital TwinA virtual representation serving as the real-time digital counterpart of a physical object.
Dart TestDart's built-in testing framework.
Data FabricAn architecture and set of services providing consistent capabilities across hybrid multi-cloud environments.
Demultiplexer (Demux)A circuit taking a single input and selecting one of many outputs.
Dart FormatterA tool that automatically formats Dart code according to style guidelines.
Data DeduplicationA technique eliminating duplicate copies of repeating data to improve storage efficiency.
Docker VolumeA mechanism for persisting data generated by Docker containers.
Dart DocDart's documentation generator that creates API reference docs from code comments.
Data VirtualizationAn approach allowing applications to retrieve and manipulate data without technical details.
Dart Build SystemA system for transforming and generating Dart code during development.
Data LineageThe lifecycle of data including origins, movements, characteristics, and transformations.
Dart Native ExtensionsA mechanism for extending Dart's capabilities with platform-specific code.
DataOpsA collaborative data management practice improving communication between data teams.
Dart ObservatoryA profiling and debugging tool for Dart applications.
Data ProfilingThe process of examining data for completeness, accuracy, and consistency.
Dart Code MetricsTools for analyzing Dart code quality and maintainability.
Data RetentionPolicies determining how long data should be stored before deletion.
Dart DevToolsA suite of performance tools for Dart and Flutter development.
Data SynchronizationThe process of establishing consistency among data across different systems.
Dart FixA tool for automatically applying fixes to Dart code based on analyzer suggestions.
Data TransformationThe process of converting data from one format/structure to another.
Dart LinterA static analysis tool enforcing coding standards in Dart projects.
Data ValidationThe process of ensuring data is clean, correct, and useful.
Dart Native AssetsA mechanism for bundling platform-specific resources with Dart applications.
Data VersioningThe practice of tracking and managing changes to datasets over time.
Dart Platform InterfaceA design pattern for writing platform-agnostic Dart code with platform-specific implementations.
Data VaultA data modeling approach for historical data tracking in data warehouses.
Dart PluginAn extension adding functionality to the Dart development environment.
Data IngestionThe process of importing data from various sources into a system for storage/analysis.
Dart SDKThe Software Development Kit containing tools for Dart development.
Data PartitioningThe practice of dividing data into subsets for improved performance and manageability.
Dart StandaloneDart programs that run independently outside of browsers.
Data PersistenceThe characteristic of data that outlives the execution of the program that created it.
Dart WebAssembly (Wasm)Compiling Dart to WebAssembly for web deployment.
Data MigrationThe process of transferring data between storage types, formats, or systems.
Dart Web ComponentsA way to create reusable custom elements in web applications using Dart.
Data CompressionThe process of encoding information using fewer bits to reduce storage/transmission requirements.
Dart Web ServerA server-side application written in Dart for handling HTTP requests.
Data ConsistencyThe property ensuring all data copies in a distributed system are identical at all times.
Dart Web StarterTemplates and tools for bootstrapping Dart web applications.
Data ClassificationThe process of organizing data into categories for efficient use and protection.
Dart Web ToolkitLibraries and tools for building web applications with Dart.
Data ArchivingThe process of moving data that is no longer actively used to separate storage for long-term retention.
Dart Web UIA declarative framework for building web user interfaces in Dart.
Data AggregationThe compilation of information from databases with intent to prepare combined datasets for analysis.
Dart Web WorkersA mechanism for running Dart scripts in background threads for web applications.
Data AnalyticsThe science of analyzing raw data to make conclusions about information.
Dart WebSocketsA protocol providing full-duplex communication channels over a single TCP connection in Dart web apps.
Data BindingA general technique that binds data sources from the provider and consumer together.
Dart Web FrameworkA software framework designed to support development of web applications using Dart.
Data CatalogAn organized inventory of data assets in an organization.
Dart Web ComponentsA way to create reusable custom elements in web applications using Dart.
Data FlowThe movement of data through a system comprising software, hardware, or a combination.
Dart Web DevelopmentThe process of building web applications using the Dart programming language.
Data HierarchyThe systematic organization of data, often in a tree-like structure.
Dart Web ApplicationAn application program that is stored on a remote server and delivered over the Internet through a browser interface, written in Dart.