IT Glossary - A - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Agile Software Engineering

Agile Software Engineering is an approach to software development that emphasizes flexibility, customer involvement, and the frequent delivery of working software, using methodologies like Scrum and Kanban.

You will find this term commonly used in Software Development

Agile Software Testing

A software testing approach that follows the principles of agile software development, emphasizing early and continuous testing, flexibility, and collaboration between developers and testers.

You will find this term commonly used in Agile Methodology, Quality Assurance

Agile Test Automation

The practice of using software to perform test cases automatically, managing test data, and utilizing results to improve software quality, integrated within an agile development process for continuous testing and feedback.

You will find this term commonly used in Software Testing, Agile Development

Agile Test Data Management

The practice of managing and provisioning data in a flexible and efficient manner for testing purposes within agile software development environments, aiming to ensure that high-quality, relevant test data is available on demand.

You will find this term commonly used in Agile Methodology, Software Testing

Agile Testing

Agile Testing is a software testing process that follows the principles of agile software development, involving continuous feedback, short, fast cycles, and adaptability to changes, aligning closely with the development process.

You will find this term commonly used in Software Development, Quality Assurance

Agile Value Stream Mapping

A lean-management method for analyzing the current state and designing a future state for the series of events that take an idea to a delivered product or service, emphasizing the identification and elimination of waste within an agile context.

You will find this term commonly used in Agile Methodology, Process Improvement

AI (Artificial Intelligence)

AI involves creating computer systems that can perform tasks typically requiring human intelligence, such as visual perception, speech recognition, decision-making, and language translation.

You will find this term commonly used in AI, General IT

AI Accelerators

AI Accelerators are specialized hardware designed to speed up AI applications, particularly in the fields of deep learning and machine learning, by providing faster processing for tasks like neural network computations.

You will find this term commonly used in AI, Hardware

AI Active Learning

Active Learning in AI is a technique where the learning algorithm selectively queries the user or a data source to label new data points with the aim of improving the learning accuracy with fewer training labels.

You will find this term commonly used in AI, Machine Learning

AI Ethics

AI Ethics refers to the moral principles and techniques to ensure artificial intelligence systems work for the benefit of society, addressing issues like bias, fairness, transparency, and accountability.

You will find this term commonly used in AI, Ethics

AI Governance

AI Governance involves frameworks and guidelines to ensure responsible use and development of AI technologies, focusing on ethics, fairness, transparency, and accountability to mitigate risks associated with AI systems.

You will find this term commonly used in AI, Ethics

Air Interface

The Air Interface is the radio frequency portion of the circuit between the mobile device and the active base station, crucial in cellular networks to define the transmission and reception of signals over the air.

You will find this term commonly used in Telecommunications, Networking

Air-Gap Security

Air-Gap Security refers to the practice of isolating a computer or network and ensuring it is not connected to the internet or any other unsecured network, significantly reducing the risk of cyber attacks.

You will find this term commonly used in Security, Cybersecurity

AJAX (Asynchronous JavaScript and XML)

AJAX is a set of web development techniques enabling web applications to send and retrieve data from a server asynchronously, without interfering with the display and behavior of the existing page.

You will find this term commonly used in Web Development

Algorithm

An algorithm is a step-by-step procedural instruction set used for calculations, data processing, and automated reasoning tasks, serving as the foundation for programming logic and problem-solving.

You will find this term commonly used in AI, General IT

Algorithm Analysis

Algorithm Analysis is the process of determining the computational complexity of algorithms, their efficiency in terms of time and space, ensuring the selection of the most appropriate algorithm for data processing.

You will find this term commonly used in Software Development, AI

Algorithm Optimization

The process of making an algorithm more efficient by improving its execution time, reducing memory usage, or enhancing other aspects of its performance.

You will find this term commonly used in Software Development, Computer Science

Algorithm Visualization

The use of graphical representations to illustrate the steps and processes involved in an algorithm, aiding in teaching, understanding, and debugging complex algorithms.

You will find this term commonly used in Computer Science Education, Development

Algorithmic Bias

Algorithmic Bias refers to unintended and systematic errors in the operation and outcomes of algorithms, often reflecting biases in data collection, algorithm design, or interpretation, leading to unfair results.

You will find this term commonly used in AI, Ethics

Algorithmic Complexity

Algorithmic Complexity, or Computational Complexity, refers to the study of the amount of computational resources (time and space) required for the execution of algorithms, aiming to understand the efficiency and scalability of algorithms.

You will find this term commonly used in Computer Science, Software Engineering

Algorithmic Complexity Theory

A branch of computer science that studies the intrinsic complexity of computational problems and algorithms, including the resources required (such as time and space) for solving problems.

You will find this term commonly used in Computer Science, Theory

Algorithmic Efficiency

Algorithmic Efficiency refers to the optimization of algorithm performance, considering factors like time complexity and space complexity, aiming to reduce resource consumption and improve execution speed for software applications.

You will find this term commonly used in Software Engineering, Computer Science

Algorithmic Game Theory

The study of mathematical models of strategic interaction among rational decision-makers, using algorithms and computational techniques, often applied in economics, computer science, and social sciences.

You will find this term commonly used in Computer Science, Economics

Algorithmic Trading

Algorithmic Trading involves using computer algorithms to execute trading strategies at high speed and volume, analyzing market data to make financial trading decisions automatically.

You will find this term commonly used in AI, Finance

Algorithmic Trading System

A system that uses advanced mathematical models for making transaction decisions in the financial markets, capable of executing trades at high speeds and volumes.

You will find this term commonly used in Finance, AI

Alias Analysis

Alias Analysis in programming languages is the process of determining whether two variables refer to the same location in memory, impacting optimizations and correctness in compiler design and static analysis tools.

You will find this term commonly used in Software Development, Programming

Amazon Web Services (AWS)

Provides certifications that validate expertise in cloud architecture, operations, and security on AWS platforms, suitable for cloud practitioners, architects, developers, and operations roles.

You will find this term commonly used in Cloud Computing

Ambient Computing

Ambient Computing refers to the integration of digital technology into the environment in a way that is unobtrusive and anticipatory, providing seamless interaction and services based on the context and user needs.

You will find this term commonly used in Smart Environments, AI

Ambient Intelligence

Ambient Intelligence (AmI) refers to electronic environments that are sensitive and responsive to the presence of people, integrating embedded devices, sensors, and AI to respond intelligently to human presence.

You will find this term commonly used in AI, Smart Environments

Ambient User Experience

The creation of seamless and continuous user experiences that flow across and between devices, locations, and contexts, often leveraging data, sensors, and AI to anticipate user needs and actions.

You will find this term commonly used in Human-Computer Interaction, Design

AMI (Amazon Machine Image)

An AMI is a template that provides the information required to launch an instance in AWS, including the operating system, application server, and applications.

You will find this term commonly used in Cloud Computing

Analog-to-Digital Converter (ADC)

An ADC is a device that converts analog signals, such as sound or light, into a digital format that computers and electronic devices can understand, enabling the processing, storage, and transmission of analog information in digital form.

You will find this term commonly used in Hardware, Electronics

Anomaly Detection

Anomaly Detection is the identification of unusual patterns or outliers in datasets that do not conform to expected behavior, widely used in fraud detection, network security, and system health monitoring.

You will find this term commonly used in AI, Security

Anomaly-Based Intrusion Detection System

A security system that identifies potential threats by monitoring network traffic and comparing it against an established baseline of normal activity, looking for anomalies.

You will find this term commonly used in Security, Cybersecurity

Anonymization

Anonymization is the process of removing or modifying personal information from data sets, so that individuals cannot be readily identified, ensuring privacy and compliance with data protection regulations.

You will find this term commonly used in Data Privacy, Security

Anonymizing Proxy

An Anonymizing Proxy is a proxy server that anonymizes users' web browsing activities by hiding their IP address from the websites and services they access, enhancing privacy and security online.

You will find this term commonly used in Networking, Security

Ansible

Ansible is an open-source automation tool for software provisioning, configuration management, and application deployment, simplifying complex IT tasks and making them more reproducible.

You will find this term commonly used in DevOps, IT Management

Ansible Tower

Ansible Tower is an enterprise framework for controlling, securing, managing, and extending your Ansible automation tasks to your team, providing a web-based console and REST API for Ansible.

You will find this term commonly used in DevOps, IT Management

Antivirus Software

Antivirus software is a program designed to detect, prevent, and remove malware, including viruses, worms, and Trojan horses, enhancing computer security.

You will find this term commonly used in Security, Cybersecurity

Anycast Routing

Anycast Routing is a network addressing and routing method in which a single destination address has multiple routing paths, allowing data packets to be routed to the nearest or best destination.

You will find this term commonly used in Networking

Apache

Apache is a widely used open-source web server software system that plays a pivotal role in the hosting and delivery of web content, supporting various features like SSL, proxying, and virtual hosting.

You will find this term commonly used in Web Development

Apache Hadoop

Apache Hadoop is an open-source software framework used for distributed storage and processing of big data sets using the MapReduce programming model, across clusters of computers.

You will find this term commonly used in Data Management, Cloud Computing

Apache Kafka

Apache Kafka is a distributed event streaming platform used for high-performance data pipelines, streaming analytics, data integration, and mission-critical applications.

You will find this term commonly used in Data Management

Apache Spark

A unified analytics engine for large-scale data processing, with built-in modules for streaming, SQL, machine learning, and graph processing.

You will find this term commonly used in Data Processing, Big Data

API (Application Programming Interface)

An API acts as a mediator allowing two applications to communicate with each other, enabling data exchange and functionality sharing. It's crucial for developing software applications and integrating different systems.

You will find this term commonly used in General IT, Development

API Call

A request sent by a client application to a server, often over the internet, using an Application Programming Interface (API) to request data or execute a function, allowing for interaction between different software systems.

You will find this term commonly used in Web Development, APIs

API Contract Testing

A testing method that verifies whether a particular API adheres to its documented contract, ensuring that it meets the agreed-upon expectations for functionality, performance, and security between the API provider and consumers.

You will find this term commonly used in Software Testing, API Development

API Discovery and Cataloging

The process of identifying all the APIs within an organization, documenting their functionalities, and organizing them into a searchable catalog for developers and stakeholders, facilitating reuse and collaboration.

You will find this term commonly used in API Management, Software Development

API Economy

The API Economy refers to the way APIs can positively affect an organization's profitability by allowing the use of services across different applications and platforms, enhancing connectivity and integration.

You will find this term commonly used in Web Development, Business

API Endpoint

A specific point at the end of an API that references a specific resource or operation the API can perform.

You will find this term commonly used in Web Development, API Management

What's Your
Career Path?
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart