Advertisement

Definition of "document" []

  • A written or printed paper that bears the original, official, or legal form of something and can be used to furnish decisive evidence or information. (noun)
  • Something, such as a recording or a photograph, that can be used to furnish evidence or information. (noun)
  • A writing that contains information. (noun)
  • Computer Science A piece of work created with an application, as by a word processor. (noun)
  • Computer Science A computer file that is not an executable file and contains data for use by applications. (noun)
  • A piece of paper, booklet, etc, providing information, esp of an official or legal nature (noun)

American Heritage(R) Dictionary of the English Language, Fifth Edition. Copyright (c) 2011 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.

  • A piece of text or text and graphics stored in a computer as a file for manipulation by document processing software (noun)
  • Evidence; proof (noun)
  • To record or report in detail, as in the press, on television, etc (verb)
  • To support (statements in a book) with citations, references, etc (verb)
  • To support (a claim, etc) with evidence or proof (verb)
  • To furnish (a vessel) with official documents specifying its ownership, registration, weight, dimensions, and function (verb)

www.Collinsdictionary.com (c) HarperCollins Publishers Ltd 2016

Use "document" in a sentence
  • "- a normative document is a: «document that provides rules, guidelines or characteristics for activities or their results» and therefore does not have the same scope, nor the same endorsement, but can become a «standard»."
  • "It is also possible to navigate the message tree using a method on MbsElement (Listing getChild ( "XMLNSC"); $document = $xml - > getChild ( "document"); $chapter = $document - > getChild ( "chapter", 1); $title = $chapter - > getAttribute ( "title");"
  • "If a recipient opened the Word document and infected the PC, the attacker could take control of the machine and reach into an organization's network to propagate itself and hunt for data, Symantec researcher Kevin Haley told Reuters."