C

C2PA
CA
Cache
A hardware or software component that stores data so that future requests for that data can be served faster. The data stored in a cache might be the result of an earlier computation or a copy of data stored elsewhere. A cache hit occurs when the requested data can be found in a cache, while a cache miss occurs when it cannot. Cache hits are served by reading data from the cache, which is faster than recomputing a result or reading from a slower data store. ← Wikipedia
Cache busting
A type of HTTP flood attack that uses query variations to get around caching. Instead of returning results from the cache, servers must be contacted which increases their load and potentially overwhelms them.
Cache eviction
The removal of old, unused, or large data from a cache.
Cache partitioning
The dividing and assigning of cache space to different system or application tasks, in order to improve security (as with browser cache partitioning) or performance.
Cache poisoning
Cache timing attack
CAI
California Consumer Privacy Act
A state statute intended to enhance privacy rights and consumer protection for residents of California, United States. The bill was passed in 2018, amending the California Civil Code. The intentions of the CCPA are to provide California residents with the right to know what personal data is being collected about them; to know whether their personal data is sold or disclosed and to whom; to say “no” to the sale of personal data; to access their personal data; to request a business to delete personal information about a consumer collected from that consumer; and not to be discriminated against for exercising their privacy rights. ← Wikipedia
Call by need
Call by value
Call stack
A stack data structure that stores information about the active subroutines of a computer program. Although maintenance of the call stack is important for the proper functioning of most software, the details are normally hidden and automatic in high-level programming languages. Many computer instruction sets provide special instructions for manipulating stacks. A call stack is used for several related purposes, but the main reason for having one is to keep track of the point to which each active subroutine should return control when it finishes executing. ← Wikipedia
Call to action
A marketing term used extensively in advertising and selling. It refers to any device designed to prompt an immediate response or encourage an immediate sale. A CTA most often refers to the use of words or phrases that can be incorporated into sales scripts, advertising messages or web pages that encourage consumers to take prompt action. ← Wikipedia
Callback
Executable code that is provided as an argument to other code that executes—calls back—that argument immediately (synchronous callback) or at a later time (asynchronous callback). ← Wikipedia
Callback queue
A queue of messages (functions) that are processed in a “first in, first out” order (FIFO) by the JavaScript event loop.
Camel case
The practice of writing phrases such that each word or abbreviation after the first one begins with a capital letter, with no intervening spaces or punctuation. Common examples include “iPhone” and “eBay.” Camel case is also sometimes used in online usernames such as “johnSmith.” In programming, camel case is often used for variable names. ← Wikipedia
Camino
A discontinued GUI-based web browser based on Mozilla’s Gecko layout engine, specifically designed for the OS X operating system. In place of an XUL-based user interface used by most Mozilla-based applications, Camino used Mac-native Cocoa APIs. In 2013, the Camino Project stopped the development of the browser. ← Wikipedia
Canary
Software that is only released to a small group of users, making it easy to roll it back in case of serious defects. The name comes from canaries that were once used in coal mines to warn of dangerous levels of carbon monoxide.
Candidate Recommendation
The specification-testing phase of a World Wide Web Consortium (W3C) specification (also known as a recommendation).
Cannibalization
A reduction in sales volume, sales revenue, or market share of one product when the same company introduces a new product. In ecommerce, some companies intentionally cannibalize their retail sales through lower prices on their online product offerings. More consumers than usual may buy the discounted products, especially if they’d previously been anchored to the retail prices. Even though their in-store sales may decline, the company might see overall gains. ← Wikipedia
Canonical equivalence
The assumption that code point sequences have the same appearance and meaning when printed or displayed. ← Wikipedia
Canonical link
An HTML element marked rel=canonical that helps webmasters prevent duplicate content issues in search engine optimization by specifying the “canonical” or “preferred” version of a web page. ← Wikipedia
Canonical Name
A type of resource record in the Domain Name System (DNS) which maps one domain name (an alias) to another (the canonical name). ← Wikipedia
Canvas
A container, the HTML canvas element, that allows for dynamic, scriptable rendering of 2D and 3D shapes and bitmap images by providing an empty graphic zone on which specific JavaScript APIs can draw (such as Canvas 2D or WebGL). ← MDN Web Docs
CAP Theorem
A theoretical computer science theorem that states that it is impossible for a distributed data store to simultaneously provide more than two out of the following three guarantees: 1) Consistency: Every read receives the most recent write or an error. 2) Availability: Every request receives a (non-error) response, without the guarantee that it contains the most recent write. 3) Partition tolerance: The system continues to operate despite an arbitrary number of messages being dropped (or delayed) by the network between nodes. The CAP Theorem implies that in the presence of a network partition, one has to choose between consistency and availability. ← Wikipedia
CAPTCHA
A type of challenge–response test used in computing to determine whether the user is human. The term stands for “completely automated public Turing test to tell computers and humans apart” and was coined in 2003 by Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford. ← Wikipedia
Card sorting
A method that aids the design or evaluation of the information architecture of a website. Card sorting is usually performed with groups, with attendees organizing topics into categories or folksonomies.
Cardinality explosion
The exponential growth in the number of unique values within a particular attribute or dimension in data processing or database management. Cardinality explosion can occur due to high variability in data sets or operations that generate numerous distinct values. It can lead to slower query performance, decreased effectiveness of indexing, and increased storage requirements.
Caret
A grapheme—“^”, “‸”, “⁁”, or “^”—with several uses, including as a proofreading mark, as a special character in programming languages, as an escape character, or for estimation. ← Wikipedia
Caret browsing
A kind of keyboard navigation where a caret (also known as a text cursor, text insertion cursor, or text selection cursor) is used to navigate within a document. ← Wikipedia
Caret navigation
Carousel
A slideshow-like design element for web pages. A carousel allows focus on one unit of content and media while providing access to similar units (by some way of navigation).
Cart
Cascade
The order by which declarations are applied in CSS: 1) per target media type; 2) per importance and origin (from user agent to important user declarations); 3) by specificity; and 4) by order in which the declaration was specified (with all having the same weight, origin, and specificity, the latest declaration prevails).
Cascading HTML Style Sheets
A style sheet language proposal drafted in 1994 by Håkon Wium Lie. ↑ w3.org/People/howcome/p/cascade
Cascading Style Sheets
A style sheet language for describing the presentation of documents written in a markup language such as HTML or XML (including XML dialects such as SVG, MathML, or XHTML). CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript. It is designed to enable the separation of content and presentation, including layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, reduce repetition and complexity by allowing web pages to share formatting (by referring to the relevant CSS in a separate file, i.e., a style sheet), and improve page load speed between pages that share such CSS files and the respective formatting (by enabling these files to be cached). The first final specification of CSS was published in 1996 by Håkon Wium Lie and Bert Bos. ← Wikipedia ↑ w3.org/Style/CSS
Case
In engineering, as use case, a list of actions or event steps typically defining the interactions between a role (known in UML as an actor) and a system to achieve a goal. The actor can be a human or other external system. In systems engineering, use cases are used at a higher level than within software engineering, often representing missions or stakeholder goals. ← Wikipedia
In programming, a selection mechanism to allow a variable to change the flow of a program. ← Wikipedia
In typography, as letter case, the distinction between the letters that are in larger upper case (also uppercase, capital letters, capitals, caps, large letters, or more formally majuscule) and smaller lower case (also lowercase, small letters, or more formally minuscule) in the written representation of certain languages. ← Wikipedia
Case folding
The mapping of strings to a form without case differences, e.g., by replacing all non-uppercase characters by their uppercase variants.
Case mapping
The mapping of lowercase, uppercase, and title case characters for a given language. Case mapping can change the number of code points or units of a string, and it is language-dependent as well as context-sensitive. ↑ is.gd/jpfHQH
catch
CBD
CBSE
CC/PP
CCPA
CCT
ccTLD
CD
CDATA
CDN
CDP
CDUI
CEP
CERT
A certificate resource record in the Domain Name System (DNS). ← Wikipedia
Certificate
An electronic document used to prove the ownership of a public key. The certificate includes information about the key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate’s contents (called the issuer). ← Wikipedia
Certificate authority
An entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party, trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 standard. One particularly common use for certificate authorities is to sign certificates used in HTTPS, the secure browsing protocol for the World Wide Web. ← Wikipedia
Certificate revocation list
A list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date, and that should no longer be trusted. CRLs are no longer required, as alternate certificate revocation technologies (such as OCSP) are increasingly used instead; nevertheless, CRLs are still widely used by certificate authorities. ← Wikipedia
Certificate signing request
A message sent from an applicant to a certificate authority of the public key infrastructure in order to apply for a digital identity certificate. A CSR usually contains the public key for which the certificate should be issued, identifying information (such as a domain name) and a proof of authenticity including integrity protection (e.g., a digital signature). The most common format for CSRs is the PKCS #10 specification. ← Wikipedia
CES
CFML
CGI
Chaining
The calling of several methods after another on an object.
Change list
A set of changes made in a single commit. This can also represent a sequential view of the source code, allowing the examination of source as of any particular changelist ID. ← Wikipedia
Change set
Changeset
A method to handle multi-package changes and versions. ↑ github.com/atlassian/changesets
Channel messaging
An API described by the HTML specification that enables independent pieces of code (e.g., scripts in different browsing contexts) to communicate directly. Channel messaging works through two-way channels (or pipes) with a port at each end. ← MDN Web Docs
Chaos engineering
The discipline of experimenting on a software system in production in order to build confidence in the system’s capability to withstand turbulent and unexpected conditions. Chaos engineering can be used to achieve resilience against infrastructure, network, and application failures. ← Wikipedia
Character
An encoded symbol that maps to a glyph.
Character data
A concept used for distinct but related purposes in the markup languages SGML and XML. “CDATA” indicates that a certain portion of the document is general character data, rather than non-character data or character data with a more specific, limited structure. ← Wikipedia
Character encoding
A mapping of code points to characters, like UTF-8.
Character entity reference
A character reference that refers to a character by the name of an entity which has the desired character as its replacement text. The entity must either be predefined (built into the markup language) or explicitly declared in a document type definition (DTD). The format is the same as for any entity reference: &name;, where “name” is the case-sensitive name of the entity. ← Wikipedia
Character reference
Character set
Charset
Chartjunk
Visual elements in a chart or graph that are not necessary to comprehend the information represented, or that distract the viewer from this information. Examples of chartjunk include heavy or dark grid lines, unnecessary text, inappropriately complex or gimmicky font faces, and ornamented chart axes. The term “chartjunk” was coined by Edward Tufte in his 1983 book The Visual Display of Quantitative Information. ← Wikipedia
Checkbox hack
The use of HTML labels and checkboxes as well as the CSS :checked pseudo-class to influence the appearance of adjacent elements. The checkbox hack is considered a hack because it may not make appropriate use of form markup, and may violate separation of concerns, when the intended behavior is best achieved by use of a scripting language.
CheiRank
An eigenvector with a maximal real eigenvalue of the Google matrix G* constructed for a directed network with the inverted directions of links. CheiRank is similar to the PageRank vector, which ranks the network nodes in average proportionally to a number of incoming links being the maximal eigenvector of the Google matrix G with a given initial direction of links. Due to inversion of link directions the CheiRank ranks the network nodes in average proportionally to a number of outgoing links. ← Wikipedia
chmod
On Unix-like operating systems, a command to change access permissions and special mode flags of file system objects (i.e., files and directories). Originally, these permissions and flags were called an object’s modes, and the name “chmod” was chosen as an abbreviation of “change mode.” ← Wikipedia
chown
On Unix-like operating systems, a command to change the owner of files and directories. The ownership of any file in the system may only be altered by a superuser. A user cannot give away ownership of a file, even when the user owns it. Similarly, only a member of a group can change a file’s group ID to that group. ← Wikipedia
Chrome
A cross-platform web browser, based on the Chromium browser project. Chrome was released in 2008 by Google. ↑ google.com/chrome
The graphical elements of a web browser, like title, address, and status bar as well as navigation elements.
Chrome Custom Tabs
A Chrome feature that allows native apps to invoke the Chrome browser with customized actions, toolbars, and animations.
Chrome DevTools
A set of web developer tools built directly into the Chrome web browser. ↑ is.gd/TsOXbb
Chrome DevTools Protocol
A protocol to “instrument, inspect, debug, and profile” Chromium, Chrome, and other Blink-based browsers. ↑ is.gd/a55qQ3
Chrome OS
A Linux kernel-based operating system designed by Google. Chrome OS is derived from the free software Chromium OS and uses the Chrome web browser as its principal user interface. Google announced Chrome OS in 2009, conceiving it as an operating system in which both applications and user data reside in the cloud—hence Chrome OS primarily runs web applications. Chrome OS is only available pre-installed on hardware from Google manufacturing partners, but there are unofficial methods that allow it to be installed in other equipment. ← Wikipedia ↑ google.com/chromebook/chrome-os
Chrome User Experience Report
A Google initiative providing real-user metrics for the user experience on popular websites and apps. The metrics make for “the official data set” of the Web Vitals program. CrUX was started in 2017. ↑ is.gd/5puhZv
ChromeVox
A screen reader for Chrome OS as well as the Chrome web browser developed by Google. ↑ is.gd/zCNu0C
Chromium
A Google-developed project whose source code can be compiled into a web browser. Google’s Chrome browser is based on the Chromium code, as are several other browsers, including Edge, Opera, and Silk. Other parties have compiled the code as-is, releasing their browsers under the Chromium name. ← Wikipedia ↑ chromium.org
CHSS
cHTML
Churn
Churn rate
A measure of the number of individuals or items moving out of a collective group over a specific period. ← Wikipedia
CI
CI/CD
The combined practices of continuous integration (CI) and continuous delivery (CD) or, less often, continuous deployment. They are sometimes referred to collectively as continuous development or continuous software development. ← Wikipedia
CIA triad
CIDR
Cipher
An algorithm for encryption or decryption. To encipher or encode is to convert information into cipher or code. ← Wikipedia
CircleCI
A continuous integration and delivery platform. CircleCI was founded in 2011. ↑ circleci.com
Cisco Discovery Protocol
A proprietary data link layer protocol developed in 1994 by Cisco Systems. CDP is used to share information about other directly connected Cisco equipment, such as operating system version and IP address. ← Wikipedia
CJS
CommonJS
CL
Class
An extensible program code template for creating objects, providing initial values for state (member variables), and implementations of behavior (member functions or methods). In many languages, the class name is used as the name for the class (the template itself), the name for the default constructor of the class (a subroutine that creates objects), and as the type of objects generated by instantiating the class. ← Wikipedia
In web development, the (value of the) class attribute, usually used as a selector for styling purposes.
Class variable
Any variable declared with the static modifier of which a single copy exists, regardless of how many instances of the class there are. ← Wikipedia
Classitis
In software development, a negative outcome of the disputed goal to work with many small classes.
In web development, the excessive use of class attributes and values.
Classless Inter-Domain Routing
A method for allocating IP addresses and for IP routing. The Internet Engineering Task Force (IETF) introduced CIDR in 1993 to replace the previous classful network addressing architecture on the Internet. The goal of CIDR was to slow the growth of routing tables on routers across the Internet, and to help slow the rapid exhaustion of IPv4 addresses. ← Wikipedia
CLDR
Clean code
SOLID
Clearance
A concept from the CSS clear property, potentially introduced by values other than none. Clearance prevents margin collapsing, and is a cause of spacing above the top margin of the respective element. Clearance pushes the element past the float.
Clearfix
A name for a variety of float-clearing techniques that may (when CSS-only) or may not (as with relying on presentational helper classes) meet development best practices. ↑ is.gd/ywDpA3
CLF
CLI
Click
A physical or emulated interaction with a pointing device.
Click-through rate
The ratio of users who click on a specific link to the number of total users who view a page, email, or advertisement. It is commonly used to measure the success of an online advertising campaign for a particular website as well as the effectiveness of email campaigns. ← Wikipedia
Clickjacking
A malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of the user’s computer. ← Wikipedia
Client
A piece of computer hardware or software that accesses a service made available by a server. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network. ← Wikipedia
Client hints
A set of HTTP request header fields for proactive content negotiation allowing clients to indicate a list of device and agent specific preferences. Client hints enable automated delivery of optimized assets, like the automatic negotiation of image DPR resolution. ← MDN Web Docs ↑ wicg.github.io/ua-client-hints
Client side
Operations on the client as opposed to the server side in a client–server relationship. ← Wikipedia
Client-side rendering
A technique in which a page is rendered on the client side, as opposed to the server side (as with SSR). On the first request, only a skeleton (a minimal HTML document) is returned by the server. It is then populated on the client side, usually via JavaScript, to turn it into a fully rendered page.
Clipping
A method to selectively enable or disable rendering operations within a defined region of interest. Clip regions are commonly specified to improve render performance. A well-chosen clip allows the renderer to save time and energy by skipping calculations related to pixels that the user cannot perceive. ← Wikipedia
Cloaking
A search engine optimization (SEO) technique in which the content presented to the search engine spider is different from that presented to a user’s browser. This can be done by delivering content based on the IP addresses or the User-Agent HTTP header of the user requesting the page. When a user is identified as a search engine spider, a server-side script delivers a different version of the web page, one that contains content not present on the visible page, or that is present but not searchable. The purpose of cloaking is to deceive search engines so they display the page when it would not otherwise be displayed (black hat SEO). However, it can also be a functional (though antiquated) technique for informing search engines of content they would not otherwise be able to locate. ← Wikipedia
Clojure
A dynamic and functional dialect of the Lisp programming language on the Java platform. Like other Lisp dialects, Clojure treats code as data and has a Lisp macro system. The development process is community-driven, overseen by Rich Hickey as a “benevolent dictator for life” (BDFL). Clojure advocates immutability and immutable data structures and encourages programmers to be explicit about managing identity and its states. ← Wikipedia ↑ clojure.org
Clone detection
The automated process of finding duplication in source code. ← Wikipedia
Closure
A technique for implementing lexically scoped name binding in a language with first-class functions. Operationally, a closure is a record storing a function together with an environment. The environment is a mapping associating each free variable of the function (variables that are used locally, but defined in an enclosing scope) with the value or reference to which the name was bound when the closure was created. Unlike a plain function, a closure allows the function to access those captured variables through the closure’s copies of their values or references, even when the function is invoked outside their scope. ← Wikipedia
Cloud
Cloud computing
The on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server. ← Wikipedia
Cloud storage
A model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. ← Wikipedia
CloudStack
IaaS cloud computing software for creating, managing, and deploying infrastructure cloud services. CloudStack uses existing hypervisor platforms for virtualization, such as KVM, VMware vSphere, XenServer/XCP, and XCP-ng. CloudStack was originally developed by Cloud.com, formerly known as VMOps. ← Wikipedia ↑ cloudstack.apache.org
CLS
Cluster
A set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system. Unlike grid computers, computer clusters have each node set to perform the same task, controlled and scheduled by software. ← Wikipedia
CMF
CMP
CMS
CMYK
CNAME
CNAME cloaking
The disguising of third-party resources as first-party resources through the modification of domain CNAME entries. CNAME cloaking is used to get around tracking protections.
Coalescing
A way to provide a default value if an operand is null or undefined. This so-called null or nullish coalescing allows a default value to be defined for cases where a more specific value is not available. ← Wikipedia
The merging of two adjacent free blocks of memory, which is relevant as when an application frees memory, gaps can fall in the memory segment that the application uses. ← Wikipedia
Coalition for Content Provenance and Authenticity
An industry initiative started by Adobe, Arm, BBC, Intel, Microsoft, and Truepic to address disinformation, misinformation, and online content fraud “through developing technical standards for certifying the source and history or provenance of media content.” It connects the Adobe-led Content Authenticity Initiative (CAI) with Microsoft- and BBC-led Project Origin. The C2PA was founded in 2021. ↑ c2pa.org
COC
Code
A set of instructions forming a computer program which is executed by a computer. It is one of two components of software which runs on computer hardware, the other being data. ← Wikipedia
Code coverage
A measure used to describe the degree to which the source code of a program is executed when a particular test suite runs. A program with high test coverage, measured as a percentage, has had more of its source code executed during testing, which suggests it has a lower chance of containing undetected software bugs compared to a program with low test coverage. Many different metrics can be used to calculate test coverage; some of the most basic are the percentage of program subroutines and the percentage of program statements called during execution of the test suite. ← Wikipedia
Code debt
Code golf
A type of recreational computer programming competition in which participants strive to achieve the shortest possible source code that implements a certain algorithm. Playing code golf is known as “golf scripting.” Code golf tournaments may also be named with the programming language used (for example, Perl golf). ← Wikipedia
Code of conduct
A set of rules outlining the norms, rules, and responsibilities of, or proper practices for, an individual or an organization. ← Wikipedia
Code point
Any of the numerical values that make up the code space for a character encoding. Many code points represent single characters but they can also have other meanings, such as for formatting. ← Wikipedia
Code refactoring
Code review
A software quality assurance activity in which one or several people check a program mainly by viewing and reading parts of its source code, and they do so after implementation or as an interruption of implementation. At least one of the persons must not be the code’s author. The persons performing the checking, excluding the author, are called reviewers. ← Wikipedia
Code smell
Any characteristic in the source code of a program that possibly indicates a deeper problem. Determining what is and is not a code smell is subjective, and varies by language, development methodology, and developer. The term “code smell” was popularized in the late 1990s by Kent Beck. ← Wikipedia
Code splitting
The practice of breaking up the code a web application depends on—its own as well as third-party dependencies—into separate bundles that can be loaded independently. This allows an application to load only the code it actually needs at a given point in time, and load other bundles on demand. Code splitting is used to improve application performance, especially on initial load. ← MDN Web Docs
Codeline
Branch
CODEOWNERS
A file that allows to specify files, file types, and folders and the individuals and teams responsible for them. CODEOWNERS can be used to automatically request reviews from the respective individuals or teams. Several developer platforms, like GitHub and GitLab, support CODEOWNERS files.
CodePen
An online community for testing and showcasing user-created HTML, CSS, and JavaScript code snippets. It functions as a code editor and learning environment, where developers can create code snippets (called pens), test, and share them. CodePen was founded in 2012. ← Wikipedia ↑ codepen.io
Coder
Coding by Convention
Coding guidelines
Rules for how code is to be designed and formatted. Coding guidelines are usually established in organizations with several developers and development teams.
COE
COEP
CoffeeScript
A programming language that compiles to JavaScript. It adds syntactic sugar inspired by Ruby, Python, and Haskell in an effort to enhance JavaScript’s brevity and readability. Specific additional features include list comprehension and destructuring assignment. ← Wikipedia ↑ coffeescript.org
COGA
COGA TF
COGA TF
Cognitive and Learning Disabilities Accessibility Task Force
A subgroup of the World Wide Web Consortium’s Accessibility Guidelines Working Group, chartered in 2014 to provide guidance and document techniques “to make web content, content authoring, and user agent implementation accessible and more useable by people with cognitive and learning disabilities.” ↑ webglossary.info/x/coga
Cognitive complexity
A software metric that measures the difficulty of understanding a piece of code. It was developed and presented by Sonar to address shortcomings of cyclomatic complexity. ↑ is.gd/Cac0d6
Cognitive disability
As disabilities affecting cognitive ability, a concept encompassing various intellectual or cognitive deficits, including intellectual disability (formerly called mental retardation), deficits too mild to properly qualify as intellectual disability, various specific conditions (such as specific learning disability), and problems acquired later in life through acquired brain injuries or neurodegenerative diseases like dementia. Many of these disabilities have an effect on memory, which is the ability to recall what has been learned over time. ← Wikipedia
Cold data
Rarely accessed data.
ColdFusion
A commercial rapid web application development computing platform created in 1995 by J.J. Allaire. (The programming language used with the platform is also commonly called ColdFusion, though is more accurately known as CFML.) ColdFusion was originally designed to make it easier to connect simple HTML pages to a database. By version 2 (1996), it became a full platform that included an IDE in addition to a full scripting language. ← Wikipedia ↑ is.gd/r6E53v
ColdFusion Markup Language
A scripting language for web development that runs on the Java virtual machine, the .NET framework, and Google App Engine. Multiple implementations of CFML engines are available, including Adobe ColdFusion, Lucee, New Atlanta BlueDragon, Railo, and Open BlueDragon. ← Wikipedia
Collapsed margin
Color blindness
The decreased ability to see color or differences in color. 8% of men and 0.5% of women have some form of color blindness. The most common forms of color blindness are deuteranomaly, deuteranopia, protanomaly, and protanopia. ← Wikipedia
Color circle
Color management
The controlled conversion between the color representations of various devices, such as image scanners, digital cameras, monitors, TV screens, film printers, computer printers, offset presses, and corresponding media. The primary goal of color management is to obtain a good match across color devices; for example, the colors of one frame of a video should appear the same on a computer LCD monitor, on a plasma TV screen, and as a printed poster. Color management helps to achieve the same appearance on all of these devices, provided the devices are capable of delivering the needed color intensities. Color management cannot guarantee identical color reproduction, as this is rarely possible, but it can at least give more control over any changes which may occur. ← Wikipedia
Color scheme
The choice of colors used in design to create style and appeal. Colors that create an aesthetic feeling when used together will commonly accompany each other in color schemes. ← Wikipedia
Color wheel
An abstract illustrative organization of color hues around a circle, which shows the relationships between primary colors, secondary colors, tertiary colors, etc. Some sources use the terms “color wheel” and “color circle” interchangeably; however, one term or the other may be more prevalent in certain fields. ← Wikipedia
Color, Material, Finish
An area of industrial design that focuses on the chromatic, tactile, and decorative identity of products and environments. CMF design uses meta-design logic, the simultaneous planning of the identity of entire ranges of products for a given brand. ← Wikipedia
COM
Combinator
A CSS selector that combines other CSS selectors. It includes the “ ” (whitespace), “>”, “+”, and “~” characters.
Comma-separated values
A text file format that uses commas to separate values, and newlines to separate records. Each record consists of the same number of fields, and these are separated by commas in the CSV file. If the field delimiter itself may appear within a field, fields can be surrounded with quotation marks. The CSV file format is one type of delimiter-separated file format. Delimiter-separated files are often given a “.csv” extension even when the field separator is not a comma. The lack of adherence to the CSV standard RFC 4180 necessitates the support for a variety of CSV formats in data input software. ← Wikipedia
Command
A directive to a computer program to perform a specific task. It may be issued via a command-line interface, such as a shell, or as input to a network service as part of a network protocol, or as an event in a graphical user interface triggered by the user selecting an option in a menu. ← Wikipedia
Command-Line Interface
An interface processing commands to a computer program in the form of lines of text. Operating systems implement command-line interfaces in a shell for interactive access to operating system functions or services. ← Wikipedia
Command-Query Responsibility Segregation
An architectural pattern that uses different models for reading and writing data. It is motivated by different system loads of read and write operations, as well as different risk profiles and therefore security implications. CQRS is attributed to Greg Young.
Command-Query Separation
A principle of imperative computer programming. CQS was devised by Bertrand Meyer as part of his pioneering work on the Eiffel programming language. The principle states that every method should either be a command that performs an action, or a query that returns data to the caller, but not both. In other words, “Asking a question should not change the answer.” More formally, methods should return a value only if they are referentially transparent and hence possess no side effects. ← Wikipedia
Comment
A developer-readable explanation or annotation in the source code of a computer program. Comments are added with the purpose of making the source code easier for humans to understand, and are generally ignored by compilers and interpreters. The syntax of comments in various programming languages varies considerably. ← Wikipedia
Commit
An operation which sends the latest changes of source code to the respective repository, making these changes part of the head revision of the repository. Unlike commits in data management, commits in version control systems are kept in the repository indefinitely. Thus, when other users do an update or a checkout from the repository, they will receive the latest committed version, unless they specify that they wish to retrieve a previous version of the source code in the repository. ← Wikipedia
Common Gateway Interface
An interface specification for web servers to execute programs that execute like console applications (also called command-line interface programs) running on a server that generates web pages dynamically. Such programs are known as CGI scripts, or simply as CGIs. The specifics of how the script is executed by the server are determined by the server. In the common case, a CGI script executes at the time a request is made and generates HTML. ← Wikipedia
Common Locale Data Repository
A project of the Unicode Consortium to provide locale data in XML format for use in computer applications. The CLDR contains locale-specific information that an operating system will typically provide to applications. The first version of the CLDR was released in 2003. ← Wikipedia ↑ cldr.unicode.org
Common Log Format
A standardized text file format used by web servers when generating server log files. Because the format is standardized, the files can be readily analyzed by a variety of web analysis programs. Each line in a file stored in the Common Log Format has the following syntax: host ident authuser date request status bytes. The format is extended by the Combined Log Format with referer and user-agent fields. ← Wikipedia
Common Object Request Broker Architecture
A standard defined by the Object Management Group (OMG) designed to facilitate the communication of systems that are deployed on diverse platforms. CORBA enables collaboration between systems on different operating systems, programming languages, and computing hardware. CORBA uses an object-oriented model, although the systems that use the CORBA do not have to be object-oriented. CORBA is an example of the distributed object paradigm. Version 1.0 of CORBA was released in 1991. ← Wikipedia ↑ corba.org
Common Vulnerabilities and Exposures
A system that provides a reference method for publicly known information security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security. The CVE system was officially launched for the public in 1999. ← Wikipedia ↑ cve.mitre.org
Common Vulnerability Scoring System
An industry standard for assessing the severity of computer system security vulnerabilities. CVSS assigns severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. Scores are calculated based on a formula that depends on several metrics that approximate the ease and impact of an exploit. Scores range from 0 to 10, with 10 being the most severe. CVSS version 1 (CVSSv1) was released in 2005. ← Wikipedia ↑ first.org/cvss
CommonJS
A project to standardize the module ecosystem for JavaScript outside of web browsers. CommonJS is widely used for server-side JavaScript with Node.js. It is also used for browser-side JavaScript, though that code must be packaged with a transpiler as browsers don’t support CommonJS. The other major module specification in use is the ES Modules (ESM) specification. CommonJS can be recognized by the use of the require() function and module.exports, while ES Modules use import and export statements for similar (though not identical) functionality. Work on CommonJS started in 2009 under the name “ServerJS.” ← Wikipedia
CommonMark
A plain-text format compatible with Markdown. CommonMark was started as a standardization effort in 2012. ↑ commonmark.org
Community of practice
A group of people who share a craft or a profession. The concept was first proposed in 1991 by Jean Lave and Etienne Wenger. A COP can evolve naturally because of the members’ common interest in a particular domain or area, or it can be created deliberately with the goal of gaining knowledge related to a specific field. It is through the process of sharing information and experiences with the group that members learn from each other, and have an opportunity to develop personally and professionally. CoPs can exist in physical settings, for example, a lunchroom at work, a field setting, a factory floor, or elsewhere in the environment, but members of COPs do not have to be co-located. ← Wikipedia
Compact HTML
A subset of HTML for small devices, such as mobile phones and personal digital assistants (PDAs). cHTML was developed by NTT DOCOMO for i-mode, a mobile Internet service, and was a subset of HTML 2.0, with features of HTML 3.2. It was introduced in 1999.
Compared to what?
A question data graphics must be able to answer, according to distinguished information design expert Erward Tufte. Comparisons provide context and enable deeper understanding.
Compass
A former CSS authoring framework for Sass, which had been developed until 2016.
Compatibility
The ability of software to run on a particular architecture or operating system, and the ability of hardware to work with a particular CPU architecture, bus, motherboard, or operating system. Compatible software and hardware may not always run at its highest stated performance. ← Wikipedia
Compatibility equivalence
The assuming of code point sequences to have possibly distinct appearances, but the same meaning in some contexts. ← Wikipedia
Compatibility mode
A software mechanism in which a software either emulates an older version of software, or mimics another operating system in order to allow older or incompatible software or files to remain compatible with the computer’s newer hardware or software. Examples of software using this mode are operating systems and the Internet Explorer web browser. ← Wikipedia
Compiler
A computer program that translates computer code written in one programming language (the source language) into another language (the target language). The name “compiler” is primarily used for programs that translate source code from a high-level programming language to a lower level language (e.g., assembly language, object code, or machine code) to create an executable program. ← Wikipedia
Compiling
The translating of computer code written in one programming language into another language. ← Wikipedia
Complementary colors
Pairs of colors which, when combined or mixed, cancel each other out (lose hue) by producing a grayscale color like white or black. When placed next to each other, they create the strongest contrast for those two colors. Complementary colors may also be called opposite colors. Modern color theory uses either the RGB additive color model or the CMY subtractive color model, and in these, the complementary pairs are red-cyan, green-magenta, and blue-yellow. In the traditional RYB color model, the complementary color pairs are red-green, yellow-purple, and blue-orange. Opponent process theory suggests that the most contrasting color pairs are red-green and blue-yellow. ← Wikipedia
Complex event processing
A method of tracking and analyzing (processing) streams of information (data) about things that happen (events), and deriving a conclusion from them. CEP consists of a set of concepts and techniques developed in the early 1990s. The goal of complex event processing is to identify meaningful events (such as opportunities or threats) in real-time situations and respond to them as quickly as possible. ← Wikipedia
Component
A software package, a web service, a web resource, or a module that encapsulates a set of related functions or data. All system processes are placed into separate components so that all of the data and functions inside each component are semantically related (just as with the contents of classes). Because of this principle, it is often said that components are modular and cohesive. ← Wikipedia
Component library
Component Object Model
A binary-interface technology for software components from Microsoft that enables using objects in a language-neutral way between different programming languages, contexts, processes, and machines. COM is the basis for other Microsoft domain-specific component technologies including OLE, OLE Automation, ActiveX, COM+, and DCOM as well as implementations such as DirectX, Windows shell, UMDF, Windows Runtime, and the Browser Helper Object. ← Wikipedia
Component-based development
Component-based software engineering
A style of software engineering that aims to construct a software system from components that are loosely coupled and reusable. This emphasizes the separation of concerns among components. To determine the appropriate level of component granularity, software architects must consider user requirements, responsibilities, and architecture characteristics, and iterate on their component designs with developers. ← Wikipedia
Component-driven user interface
A user interface put together by developing and arranging components, and the practice of basing user interfaces on components.
Composite Capability/Preference Profiles
A specification for defining capabilities and preferences of user agents, establishing a delivery context that can be used to guide the process of tailoring content. CC/PP is a vocabulary extension of the Resource Description Framework (RDF). ← Wikipedia ↑ w3.org/TR/CCPP-struct-vocab2
Compression
The process of encoding information using fewer bits than the original representation. Any particular compression is either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by removing unnecessary or less important information. Typically, a device that performs data compression is referred to as an encoder, and one that performs the reversal of the process (decompression) as a decoder. ← Wikipedia
Computational irreducibility
A property of computations that cannot be sped up by a shortcut, i.e., which cannot be predicted. Computational irreducibility can be used to explain observed limitations of existing mainstream science. In cases of computational irreducibility, only observation and experiment can be used. ← Wikipedia
Computed value
The result of resolving the specified value of a CSS property. It is made absolute so as to prepare for inheritance.
Computer programming
Concurrency
The ability of different parts or units of a program, algorithm, or problem to be executed out-of-order or in partial order, without affecting the final outcome. This allows for parallel execution of the concurrent units, which can significantly improve overall speed of the execution in multi-processor and multi-core systems. ← Wikipedia
Concurrent Versioning System
Concurrent Versions System
A client–server version control system. CVS was developed in 1986 by Dick Grune. ← Wikipedia ↑ savannah.nongnu.org/projects/cvs
Condition coverage
Condition variable
A container of threads that are waiting for a certain condition. ← Wikipedia
Conditional
A feature of a programming language which perform different computations or actions depending on whether a programmer-specified Boolean condition evaluates to true or false. Apart from the case of branch predication, this is achieved by selectively altering the control flow based on some condition. In imperative programming languages, the term “conditional statement” is usually used, whereas in functional programming, “conditional expression” or “conditional construct” are preferred. ← Wikipedia
Conditional Comments
Conditional statements in HTML, interpreted by Microsoft Internet Explorer 5–9. Conditional comments can be used to provide and hide code to and from Internet Explorer. Conditional comments are no longer supported in Internet Explorer 10 and 11. ← Wikipedia
Cone of Uncertainty
A model for the evolution of the amount of best case uncertainty during a project. At the beginning of a project, comparatively little is known about the product or work results, and so estimates are subject to large uncertainty. As more research and development is done, more information is learned about the project, and the uncertainty then tends to decrease. The change in uncertainty makes for the shape of a cone. ← Wikipedia
Confidence interval
An interval which is expected to contain the parameter being estimated. More specifically, given a confidence level γ (95% and 99% are typical values), a CI is a random interval which contains the parameter being estimated γ% of the time. The confidence level, degree of confidence, or confidence coefficient represents the long-run proportion of CIs (at the given confidence level) that theoretically contain the true value of the parameter. For example, out of all intervals computed at the 95% level, 95% of them should contain the parameter’s true value. ← Wikipedia
Confidence testing
Confidentiality agreement
Confidentiality, integrity, and availability
An information security model to guide an organization’s security policies and procedures. The CIA triad is used to evaluate threats and vulnerabilities based on confidentiality, integrity, and availability of an organization’s assets.
Configuration drift
The phenomenon of servers to become more and more different after some time, because of manual changes as well as entropy.
Conflict of interest
A situation in which a person or organization is involved in multiple interests, financial or otherwise, and serving one interest could involve working against another. Typically, this relates to situations in which the personal interest of an individual or organization might adversely affect a duty owed to make decisions for the benefit of a third party. ← Wikipedia
Conflict-free replicated data type
A data structure that is replicated across multiple computers in a network, with the following features: 1) The application can update replica independently, concurrently, and without coordinating with other replicas. 2) An algorithm (itself part of the data type) automatically resolves inconsistencies that might occur. 3) Although replicas may have different state at any particular point in time, they are guaranteed to eventually converge. The CRDT concept was formally defined in 2011. ← Wikipedia
Conformance
The meeting of a specified standard by a product, service, or system. ← Wikipedia
Conformance testing
Activities that determine whether a process, product, or service complies with the requirements of a specification, technical standard, contract, or regulation. Beyond simple conformance, other requirements for compliance, efficiency, or interoperability may apply. ← Wikipedia
Confounding variable
A variable that influences both the dependent variable and independent variable, causing a spurious association. Confounding is a causal concept, and as such, cannot be described in terms of correlations or associations. The existence of confounders is an important quantitative explanation why correlation does not imply causation. Some notations are explicitly designed to identify the existence, possible existence, or non-existence of confounders in causal relationships between elements of a system. ← Wikipedia
Connascence
A software quality metric invented by Meilir Page-Jones to enable reasoning about the complexity caused by dependency relationships in object-oriented design, much like coupling did for structured design. In software engineering, two components are connascent if a change in one would require the other to be modified in order to maintain the overall correctness of the system. In addition to allowing categorization of dependency relationships, connascence provides a system for comparing different types of dependency. Such comparisons between potential designs can hint at ways to improve the quality of the software. ← Wikipedia
Connection draining
In load balancing, the allowing of existing requests to complete, while no new requests are being sent to the respective machine.
Consent management platform
A platform that requests, stores, and manages user consent. A CMP helps ensure the privacy of user data in compliance with regulation like the European Union’s GDPR or California’s CCPA/CPRA.
Consistency
A model (the consistency model) that specifies a contract between the programmer and a system, wherein the system guarantees that if the programmer follows the rules for operations on memory, memory will be consistent and the results of reading, writing, or updating memory will be predictable. ← Wikipedia
Consistent hashing
A special kind of hashing technique such that when a hash table is resized, only n/m keys need to be remapped on average where n is the number of keys and m is the number of slots. In contrast, in most traditional hash tables, a change in the number of array slots causes nearly all keys to be remapped, because the mapping between the keys and the slots is defined by a modular operation. ← Wikipedia
Console
A computer program designed to be used via a text-only computer interface, such as a text terminal, the command-line interface of some operating systems (Unix, DOS, etc.), or the text-based interface included with most graphical user interface (GUI) operating systems, such as the Win32 console in Windows, the Terminal in macOS, and xterm in Unix. A user typically interacts with a console application using only a keyboard and display screen. ← Wikipedia
Constant
A value that cannot be altered by the program during normal execution, i.e., the value is constant. When associated with an identifier, a constant is said to be “named,” although the terms “constant” and “named constant” are often used interchangeably. This is contrasted with a variable. ← Wikipedia
Constructive ambiguity
The deliberate use of ambiguous language on a sensitive issue in order to advance some political purpose. It might be employed in a negotiation, to disguise an inability to resolve a contentious issue on which the parties remain far apart, and to do so in a manner that enables each to claim obtaining some concession on it. Constructive ambiguity warrants hopes that the ensuing postponement of resolution on the particular point, in a way that causes neither side excessive discomfort, will enable them to make progress on other matters. ← Wikipedia
Constructor
A special type of subroutine called to create an object. It prepares the new object for use, often accepting arguments that the constructor uses to set required member variables. ← Wikipedia
Container
A fully functional and portable cloud or non-cloud computing environment surrounding an application, keeping it independent of other parallelly running environments. Individually, each container simulates a different software application and runs isolated processes by bundling related configuration files, libraries, and dependencies. ← Wikipedia
An HTML element that contains other elements.
Container query
A CSS way of applying styles to a container’s contents based on the size of the container, rather than the viewport or other device characteristics. If a container has less space in the surrounding context, container queries allow to hide certain elements or work with smaller fonts, for example. Given a containment context, the @container at-rule is used to write a container query. ← MDN Web Docs
Containerization
An operating system paradigm in which the kernel allows the existence of multiple isolated user space instances. Such instances, called containers (Solaris, Docker), zones (Solaris), virtual private servers (OpenVZ), partitions, virtual environments (VEs), virtual kernels (DragonFly BSD), or jails (FreeBSD jail or chroot jail) may look like actual computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside a container can only see the container’s contents and devices assigned to the container. Containerization is used to securely allocate finite hardware resources among a large number of mutually-distrusting users, to consolidate server hardware by moving services on separate hosts into containers on the one server, or to separate several programs to separate containers for improved security, hardware independence, and added resource management features. ← Wikipedia
Containing block
The block (element) in which a box resides.
Containment
A CSS mechanism to indicate that an element’s subtree is independent of the rest of the respective page. This isolation of a subtree allows a browser to optimize rendering and improve performance. ↑ w3.org/TR/css-contain-3
Content
The information and experiences that are directed toward an end user or audience. Content is “something that is to be expressed through some medium, as speech, writing, or any of various arts.” Content can be delivered via many different media including the Internet, cinema, television, radio, smartphones, audio CDs, books, ebooks, magazines, and live events, such as speeches, conferences, and stage performances. ← Wikipedia
Content Authenticity Initiative
An initiative of more than 100 member organizations to develop an industry standard for digital content attribution. The CAI was started in 2019 by Adobe, The New York Times Company, and Twitter. ↑ contentauthenticity.org
Content box
Box
Content category
A category that HTML puts elements in. The main categories are metadata content, flow content, sectioning content, heading content, phrasing content, embedded content, and interactive content.
Content Credentials
Metadata and validation technology to document how content was produced—including whether it was AI-generated—and when it was created or edited. Content Credentials were presented in 2023 by the Coalition for Content Provenance and Authenticity (C2PA). ↑ contentcredentials.org
Content delivery network
A geographically distributed network of proxy servers and their data centers that has the goal to provide high availability and high performance by distributing the service spatially relative to end users. CDNs came into existence in the late 1990s as a means for alleviating performance bottlenecks of the Internet. They are a layer in the Internet ecosystem. ← Wikipedia
Content management system
A software application that can be used to manage the creation and modification of digital content. CMSs are typically used for enterprise content management (ECM) and web content management (WCM). ECM typically supports multiple users in a collaborative environment by integrating document management, digital asset management and record retention. Alternatively, WCM is the collaborative authoring for websites and may include text and embed graphics, photos, video, audio, maps, and program code that display content and interact with the user. ← Wikipedia
Content MathML
MathML markup that focuses on the semantics of the expression, rather than its layout. Central to Content MathML is the apply element that represents function application. The function being applied is the first child element under apply. Content MathML uses only a few attributes. ← Wikipedia
Content negotiation
Server- or agent-driven mechanisms that allow to serve different versions of a document (or more generally, representations of a resource) at the same URL, so that user agents can specify which version fits their capabilities the best. Examples include requesting and receiving documents in a preferred language, or media files in a particular format. ← Wikipedia
Content network
A network of websites that uses and is accessible through a particular advertising platform, that is, that can be advertised on through the respective ad platform.
Content optimization
The process of improving content, making it as relevant and interesting as possible for users and search engines, and increasing its reach.
Content parity
The principle of providing the same content and functionality across different devices and platforms (as opposed to delivering different content to, for example, users on desktop and on mobile).
Content projection
A design pattern in which content from one component is included in (projected to) another component.
Content Security Policy
A computer security standard introduced to prevent cross-site scripting (XSS), clickjacking, and other code injection attacks resulting from execution of malicious content in the trusted web page context. CSP provides a standard method for website owners to declare approved origins of content that browsers should be allowed to load on that website—covered types are JavaScript, CSS, HTML frames, web workers, fonts, images, embeddable objects such as Java applets, ActiveX, audio and video files, and other HTML features. ← Wikipedia ↑ w3.org/TR/CSP
Content sniffing
Context menu
A menu in a graphical user interface (GUI) that appears upon user interaction, such as a right-click mouse operation. A context menu offers a limited set of choices that are available in the current state, or context, of the operating system or application to which the menu belongs. Usually the available choices are actions related to the selected object. ← Wikipedia
Context switch
The process of storing the state of a process or thread, so that it can be restored and resume execution at a later point. Context switching allows multiple processes to share a single CPU, and is an essential feature of a multi-tasking operating system. The precise meaning of the phrase “context switch” varies. In the multi-tasking context, it refers to the process of storing the system state for one task, so that task can be paused and another task resumed. A context switch can also occur as the result of an interrupt, such as when a task needs to access disk storage, freeing up CPU time for other tasks. Some operating systems also require a context switch to move between user mode and kernel mode tasks. The process of context switching can have a negative impact on system performance. ← Wikipedia
Continuous delivery
A software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time and, when releasing the software, doing so manually. CD aims at building, testing, and releasing software with greater speed and frequency, and helps reduce the cost, time, and risk of delivering changes by allowing for more incremental updates to applications in production. A straightforward and repeatable deployment process is important for continuous delivery. ← Wikipedia
Continuous deployment
A software engineering approach in which software functionalities are delivered frequently through automated deployments. ← Wikipedia
Continuous integration
The practice of merging all developers’ working copies to a shared mainline (version control) several times a day. ← Wikipedia
Continuous media
Data for which there is a timing relationship between source and destination. The most common examples of continuous media are audio and motion video. Continuous media can be real-time (interactive), where there is a “tight” timing relationship between source and sink, or streaming (playback), where the relationship is less strict. ← MDN Web Docs
Contrast
The difference in appearance of two or more parts of a field seen simultaneously or successively (hence: brightness contrast, lightness contrast, color contrast, simultaneous contrast, successive contrast, etc.). Visual information is always contained in some kind of visual contrast, thus contrast is an essential performance (and accessibility) feature of electronic visual displays. ← Wikipedia
Control flow
The order in which individual statements, instructions, or function calls of an imperative program are executed or evaluated. ← Wikipedia
Control stack
Convention Over Configuration
A software design paradigm used by software frameworks that attempts to decrease the number of decisions that a developer using the framework is required to make without necessarily losing flexibility. The concept was introduced by David Heinemeier Hansson to describe the philosophy of the Ruby on Rails web framework, but is related to earlier ideas like the concept of “sensible defaults” and the Principle of Least Astonishment in user interface design. ← Wikipedia
Conventional Commits
A standard format for both human- and machine-readable commit messages. Conventional Commits work with a type and a description, as in “feat: launch new video embed” or “docs: correct spelling mistakes,” but also take optional information like scope, a message body, and a message footer. The format was inspired by the Angular commit guidelines, and first published in 2017. ↑ conventionalcommits.org
Conversion
In engineering, the converting of data from one format to another.
In marketing, the converting of visitors into customers (or into visitors who meet another conversion goal).
Conway’s Law
The adage that organizations design systems that mirror their own communication structure. Conway’s Law is named after computer programmer Melvin Conway, who introduced the idea in 1967. His original wording was: “Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization’s communication structure.” ← Wikipedia
Cookie
A small piece of data sent from a website and stored on a user’s computer by the user’s web browser while the user is browsing. Cookies were designed to be a reliable mechanism for websites to remember stateful information or to record the user’s browsing activity. They can also be used to remember arbitrary pieces of information that the user previously entered. Cookies perform essential functions in the modern Web. Perhaps most importantly, authentication cookies are the most common method used by web servers to know whether a user is logged in or not, and which account they are logged in with. ← Wikipedia
Cookie banner
A web page notification alerting and informing about the respective site’s use of cookies. Cookie banners are common on European websites because of European cookie regulations.
Cookie consent
The agreement to but also a term for the requirement for informing about the use of cookies (also known as a cookie consent form, or cookie banner).
Cookie hijacking
Coordinated Universal Time
The primary time standard by which the world regulates clocks and time. UTC is within about one second of mean solar time (such as UT1) at 0° longitude (at the IERS Reference Meridian as the currently used prime meridian), and is not adjusted for daylight saving time. It is effectively a successor to Greenwich Mean Time (GMT). The coordination of time and frequency transmissions around the world began on January 1, 1960. UTC was first officially adopted as CCIR Recommendation 374, Standard-Frequency and Time-Signal Emissions, in 1963, but the official abbreviation “UTC” and the official English name of “Coordinated Universal Time” were not adopted until 1967. ← Wikipedia
COP
CORB
CORBA
Core Web Vitals
CORP
Corporate design
The official graphical design of the logo and name of a company or institution (or government) used on letterheads, envelopes, forms, folders, brochures, etc. ← Wikipedia
Corporate identity
The manner in which a corporation, firm, or business enterprise presents itself to the public. The corporate identity is typically visualized by branding and with the use of trademarks, but it can also include things like product design, advertising, public relations, etc. Corporate identity is a primary goal of corporate communications, in order to maintain and build the identity to accord with and facilitate the corporate business objectives. ← Wikipedia
Correction of Errors
A post-incident analysis and process started after the respective incident has been mitigated. A COE documents the events leading up to the incident; identifies the root cause of the problem as well as corrective actions; analyzes the impact of the incident; and tracks action items to prevent the incident from reoccurring. A COE is similar to a post mortem but goes beyond it by its focus on corrective actions.
CORS
Cost-per-click
Country code top-level domain
An Internet top-level domain generally used or reserved for a country, sovereign state, or dependent territory identified with a country code. All ASCII ccTLD identifiers are two letters long, and all two-letter top-level domains are ccTLDs. There are 312 ccTLDs in active use totally. .cn, .tk, .de and .uk contain the highest number of domains. ← Wikipedia
Coupling
The degree of interdependence between software modules, a measure of how closely connected two routines or modules are, and the strength of the relationships between modules. Coupling is not binary but multi-dimensional. It is usually contrasted with cohesion. Low coupling often correlates with high cohesion, and vice versa. Low coupling is often thought to be a sign of a well-structured computer system and a good design, and when combined with high cohesion, supports the general goals of high readability and maintainability. ← Wikipedia
CPA
CPC
CPH
Continuous product health.
CPM
CQRS
CQS
CR
CRA
Craft
A pastime or a profession that requires particular skills and knowledge of skilled work. ← Wikipedia
CRAP
Crawler
An Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering). Web search engines and some other sites use Web crawling or spidering software to update their web content or indices of others sites’ web content. ← Wikipedia
Crawler trap
Crawling
The systematic browsing of the World Wide Web for the purpose of indexing. ← Wikipedia
CRDT
Create React App
A script-based command-line helper to make it easier to set up a React application (npx create-react-app my-app). ↑ create-react-app.dev
Create, read, update, delete
The four basic functions of persistent storage. ← Wikipedia
Create, replicate, append, process
A variation of CRUD. ← Wikipedia
Critical CSS
The minimum of CSS needed to show a styled web page. Focus is usually on the immediately visible part of a page at the top and “above the fold.” The respective CSS rules are then inlined, that is, embedded in a style element within the page’s head element.
Critical design
A design methodology that uses design fiction and speculative design proposals to challenge assumptions and conceptions about the role objects play in everyday life. Critical design is mainly used to share a critical perspective or inspire debate, while increasing awareness of social, cultural, or ethical issues in the eyes of the public. Critical design was popularized by Anthony Dunne and Fiona Raby. ← Wikipedia
Critical path
The longest stretch of dependent project activities and the time required to complete them from start to finish. ← Wikipedia
Critical path analysis
Critical path method
Critical rendering path
A model for the steps needed to render a web page, and optimize its rendering. The critical rendering path includes the building of DOM (Document Object Model) and CSSOM (CSS Object Model), changes to both through the execution of JavaScript, the construction of the render tree, layout, and paint.
CRL
CRM
cron
A time-based job scheduler on Unix-like computer operating systems. Users that set up and maintain software environments use cron to schedule jobs (commands or shell scripts) to run periodically at fixed times, dates, or intervals. cron is most suitable for scheduling repetitive tasks. Scheduling one-time tasks can be accomplished using the associated at utility. cron was first released in 1975. ← Wikipedia
Cron job
A job (command) to be executed by cron.
Crontab
A configuration file that specifies shell commands to run periodically on a given schedule. The crontab files are stored where the lists of jobs and other instructions to the cron daemon are kept. Users can have their own individual crontab files and often there is a system-wide crontab file (usually in /etc or a subdirectory of /etc) that only system administrators can edit. ← Wikipedia
Cross-Origin Read Blocking
A security feature that helps mitigate side-channel attacks. CORB prevents the browser from delivering certain cross-origin responses to a web page, for example, when these responses would contain sensitive information.
Cross-Origin Resource Sharing
A mechanism that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served. A web page may freely embed cross-origin images, style sheets, scripts, iframes, and videos. Certain “cross-domain” requests are forbidden by default by the same-origin security policy. CORS defines a way in which a browser and server can interact to determine whether it is safe to allow the cross-origin request. ← Wikipedia
Cross-Origin Resource Policy
A policy set by the Cross-Origin-Resource-Policy HTTP header that lets websites and applications opt into protection against certain requests from other origins (such as those issued with elements like script and img), to mitigate speculative side-channel as well as cross-site script inclusion attacks. CORP is an additional layer of protection beyond the default same-origin policy. ← MDN Web Docs
Cross-Origin-Embedder-Policy
An HTTP response header to configure the embedding of cross-origin resources in a document. ← MDN Web Docs
Cross-site request forgery
A type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts. There are many ways in which a malicious website can transmit such commands; specially-crafted image elements, hidden forms, and JavaScript XMLHttpRequests, for example, can all work without the user’s interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user’s browser. ← Wikipedia
Cross-site script inclusion
A vulnerability which uses the circumstance that a script referenced through a script element is exempt from the same-origin policy, as scripts need to work across domains. An attacker may access and use what is being loaded using the respective script, and thus leaked across origins.
Cross-site scripting
A type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. ← Wikipedia
Cross-site WebSocket hijacking
An attack similar to cross-site request forgery (CSRF), on a WebSocket handshake, which may allow read/write communication on the respective WebSocket connection. ↑ is.gd/cGQ4bj
CRP
CRUD
Cruft
A jargon word for anything that is left over, redundant, and getting in the way. It is used particularly for defective, superseded, useless, superfluous, or dysfunctional elements in computer software. ← Wikipedia
CrUX
Cryptography
The practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security (data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. The first use of the term “cryptograph” (as opposed to “cryptogram”) dates back to the 19th century, originating from The Gold-Bug, a story by Edgar Allan Poe. ← Wikipedia
CSCS
CSP
CSR
CSRF
CSS
CSS Action Committee
CSS framework
CSS lock
CSS code that results in a lower and an upper bound for a particular styling, like a minimum and maximum font size that is otherwise fluid. CSS locks can rely on a single declaration but may include both more declarations as well as media queries. The term “CSS lock” may have first been coined in 2016 by Tim Brown. ↑ is.gd/FjK3B8
CSS Module
A CSS file in which all class and animation names are by default scoped locally. ↑ github.com/css-modules/css-modules
CSS Naked Day
A full-day online community event observed annually on April 9, to promote web standards and maintainability. During CSS Naked Day, participating websites don’t apply any CSS, and therefore appear “naked,” i.e., unstyled and not designed. CSS Naked Day was initiated in 2006 by Dustin Diaz. ↑ css-naked-day.org
CSS Object Model
A set of APIs allowing the manipulation of CSS through JavaScript. CSSOM is much like the DOM, but for CSS rather than HTML. It enables developers to read and modify CSS styles dynamically. ← MDN Web Docs
CSS pixel
A synonym for the CSS unit px, which is defined as being 1/96th of 1 CSS inch (in). ← MDN Web Docs
CSS preprocessor
A program that generates CSS from the preprocessor’s own unique syntax. There are many CSS preprocessors to choose from, however most CSS preprocessors add features that do not exist in pure CSS, such as mixins, selector nesting, or inheritance selectors. These features make the CSS structure more readable and easier to maintain. ← MDN Web Docs
CSS Samurai
A subgroup of the Web Standards Project that focused on advocacy for CSS, as with reporting on CSS support issues. The CSS Samurai disbanded in 1999. ↑ is.gd/vYNvVA
CSS Zen Garden
A web development resource “built to demonstrate what can be accomplished visually through CSS-based design.” Style sheets contributed by web designers and developers from around the world are used to change the visual presentation of a single HTML file, producing hundreds of different designs. Aside from reference to an external CSS file, the HTML markup itself never changes. All visual differences are the result of the CSS (and supporting imagery). CSS Zen Garden is a poster child for CSS-only redesigning. It was created in 2003 by Dave Shea. ← Wikipedia ↑ csszengarden.com
CSS-in-JS
A styling technique in which JavaScript is used to style components. When this JavaScript is parsed, CSS is generated (usually as a style element) and attached to the DOM. CSS-in-JS abstracts CSS to the component level itself, using JavaScript to describe styles in a declarative and maintainable way. There are multiple implementations of this concept such as styled components or JSS. ← Wikipedia ↑ cssinjs.org
CSS-Tricks
A web development online magazine and CSS resource. CSS-Tricks was founded in 2007 by Chris Coyier, and sold in 2022 to DigitalOcean. ↑ css-tricks.com
CSSOM
CSV
CSWSH
CTA
CTR
Cumulative Layout Shift
A metric, the so-called layout shift score, for measuring visual stability. The layout shift score is based on a multiplication of impact fraction and distance fraction. CLS is a Core Web Vital metric. ↑ web.dev/cls
curl
A computer software project providing a library (libcurl) and command-line tool (curl) for transferring data using various network protocols. The name stands for “Client URL,” which was first released in 1997. ← Wikipedia ↑ curl.se
Curly’s Law
“Just one thing,” a film character’s advice from the movie City Slickers. Curly’s Law is sometimes used instead of, or as a corollary to, the Single Responsibility Principle.
Currying
The technique of converting a function that takes multiple arguments into a sequence of functions that each take a single argument. ← Wikipedia
cursive
One of the original generic font families of CSS (beside serif, sans-serif, fantasy, and monospace).
Custom data attribute
An attribute in no namespace whose name starts with the string data-, has at least one character after the hyphen, is XML-compatible, and contains no ASCII upper alphas. Custom data attributes are intended to store custom data, state, annotations, and similar, private to the page or application, for which there are no more appropriate attributes or elements. ← HTML
Custom element
Custom property
A CSS property that is prefixed with --, like --example-name, and whose value can be used in other declarations using the var() function. Custom properties are scoped to the element(s) they are declared on, and participate in the cascade: The value of a custom property is that from the declaration decided by the cascading algorithm. Custom properties are also known as CSS variables. ← MDN Web Docs ↑ w3.org/TR/css-variables-1
Customer Effort Score
A customer service metric that measures the experience with a product or service. Customers document their experience on a 7-point Likert scale ranging from “Very Difficult” to “Very Easy.” The result can be used to assess how much effort is needed to use the respective product or service, and to predict further use.
Customer relationship management
An approach to manage a company’s interaction with current and potential customers. It uses data analysis about customers’ history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth. ← Wikipedia
Customized built-in element
A type of custom element for a web component. Customized built-in elements inherit from basic HTML elements. To create a customized built-in element one has to specify which element it extends, and to use it one writes out the basic element but specifies the name of the custom element through an is property. ← MDN Web Docs
Customized Scripting in C#
A basic scripting language based on C#. CSCS features no functions, methods, and Boolean values. It was presented in 2016 by Vassili Kaplan. ↑ github.com/vassilych/cscs
Cutting the mustard
The succeeding under difficult circumstances, an expression attributed to BBC developers in the context of user agent detection.
CVE
CVS
CVSS
Cyan, magenta, yellow, and key
As the CMYK color model, a subtractive color model used in color printing, and also used to describe the printing process itself. CMYK refers to the four ink plates used in some color printing: cyan, magenta, yellow, and key (black). The CMYK model works by partially or entirely masking colors on a lighter, usually white, background. The ink reduces the light that would otherwise be reflected. Such a model is called subtractive because inks “subtract” the colors red, green, and blue from white light. White light minus red leaves cyan, white light minus green leaves magenta, and white light minus blue leaves yellow. ← Wikipedia
Cybersquatting
The practice of registering, trafficking in, or using an Internet domain name, with a bad faith intent to profit from the goodwill of a trademark belonging to someone else. The term is derived from “squatting,” which is the act of occupying an abandoned or unoccupied space or building that the squatter does not own, rent, or otherwise have permission to use. ← Wikipedia
Cycle time
The amount of time between the start of work on a task to the time it is delivered.
Cyclomatic complexity
A software metric used to indicate the complexity of a program. It is a quantitative measure of the number of linearly independent paths through a program’s source code, and is computed using the control-flow graph of the program. The nodes of the graph correspond to indivisible groups of commands of a program, and a directed edge connects two nodes if the second command might be executed immediately after the first command. Cyclomatic complexity may also be applied to individual functions, modules, methods, or classes. It was developed in 1976 by Thomas J. McCabe, Sr. ← Wikipedia
Cypress
A frontend test automation tool for regression testing of web applications. Cypress was released in 2017. ← Wikipedia ↑ cypress.io
An icon of a question-circle1