IT Glossary - A - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Asynchronous Learning Networks

Online learning environments that allow participants to engage with educational content and activities at their own pace, without the need for real-time interaction.

You will find this term commonly used in E-Learning, Education Technology

Asynchronous Messaging

Asynchronous Messaging refers to a communication method where messages are sent between parties without requiring the sender and receiver to be simultaneously active, facilitating decoupled communication processes in distributed systems.

You will find this term commonly used in Networking, Software Development

Asynchronous Replication

A data replication method where changes at the primary site are replicated to the secondary site without waiting for confirmation that each change has been received, suitable for disaster recovery over long distances.

You will find this term commonly used in Data Management, Disaster Recovery

Asynchronous System

A system in which operations are executed without requiring synchronization in time, allowing processes to operate independently and proceed at their own pace.

You will find this term commonly used in Computer Science, Networking

Asynchronous Transfer Mode (ATM)

ATM is a networking technology that organizes digital data into small, fixed-sized packets called cells and transmits them over a physical medium using digital signal technology, designed for high-speed broadband networks.

You will find this term commonly used in Networking, Telecommunicati

Asynchronous Video Interview

A recruiting tool that allows job candidates to record answers to interview questions at their convenience, without the need for real-time interaction with the interviewer, enabling flexible and scalable candidate screening.

You will find this term commonly used in Human Resources Technology, Recruitment

ATA (Advanced Technology Attachment)

ATA is an interface standard for connecting storage devices like hard drives and optical drives to a motherboard, known for its simplicity and reliability in data transfer.

You will find this term commonly used in Hardware, IT Infrastructure

ATM (Asynchronous Transfer Mode)

ATM is a networking technology that uses short, fixed-length packets called cells to transport data across networks, designed for high-performance multimedia networking.

You will find this term commonly used in Networking

Atomicity

In computing, atomicity refers to operations that are completed as a single unit of work, such that they are indivisible. This concept is crucial in database transactions and multi-threaded programming to ensure data integrity.

You will find this term commonly used in Database, Software Engineering

Attack Detection Algorithms

Attack Detection Algorithms are computational techniques used to identify patterns of malicious activity within networks or systems, aiming to promptly detect and mitigate potential security threats.

You will find this term commonly used in Security, Cybersecurity

Attack Pattern Recognition

The use of algorithms and machine learning to detect patterns in data that may indicate a cybersecurity threat or attack.

You will find this term commonly used in Cybersecurity, Data Analysis

Attack Signature

An Attack Signature is a pattern that identifies malicious or harmful behavior, such as a sequence of bytes in network traffic, or a series of commands known to be used by malware. It is used in intrusion detection systems to detect threats.

You will find this term commonly used in Security, Cybersecurity

Attack Surface Analysis

Attack Surface Analysis is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system or network that are accessible to attackers, used to strengthen cybersecurity measures.

You will find this term commonly used in Security, Cybersecurity

Attack Surface Reduction

Strategies and techniques used to minimize the ways an attacker can exploit a system or network, often involving the removal of unnecessary services, restricting access, and segmenting networks.

You will find this term commonly used in Cybersecurity, IT Infrastructure

Attack Vector

An Attack Vector is a method or pathway used by a hacker to access or penetrate the defense of a computer or network system to deliver a payload or malicious outcome.

You will find this term commonly used in Security, Cybersecurity

Attribute-Based Access Control (ABAC)

ABAC is a method of access control that decides access rights based on attributes associated with users, resources, and the environment, allowing for more flexible and fine-grained access control policies compared to role-based access control (RBAC).

You will find this term commonly used in Security, Cybersecurity

Audio Codec

An Audio Codec is a device or software that encodes or decodes audio data from one format to another, facilitating the compression and decompression of digital audio data for storage, transmission, and playback.

You will find this term commonly used in Multimedia, IT Infrastructure

Audio Streaming Technology

Audio Streaming Technology enables the real-time transmission and playback of audio content over the internet, allowing users to listen to music, podcasts, and other audio programs without the need for downloading files beforehand.

You will find this term commonly used in Multimedia, Web Development

Audio-Visual Speech Recognition

A technology that combines audio and visual data processing to improve the accuracy of speech recognition systems, particularly in noisy environments.

You will find this term commonly used in AI, Machine Learning

Augmented Analytics

Augmented Analytics uses machine learning and artificial intelligence to automate data analysis processes, making it easier for end-users to gain insights without deep expertise in data science.

You will find this term commonly used in AI, Data Analysis

Augmented Coding

Augmented Coding uses AI and machine learning to assist developers in writing code, suggesting improvements and automating repetitive tasks, thereby increasing efficiency and reducing errors in the software development process.

You will find this term commonly used in Software Development, AI

Augmented Coding Tools

Software tools that leverage AI and machine learning to assist developers in writing code, suggesting improvements, and automating repetitive tasks, thereby enhancing productivity and reducing the potential for errors.

You will find this term commonly used in Software Development, AI

Augmented Data Discovery

Augmented Data Discovery uses machine learning and natural language processing to enhance data analysis processes, making it easier for end users to discover significant patterns and insights in their data without deep technical expertise.

You will find this term commonly used in AI, Data Analysis

Augmented Data Management

The use of AI and machine learning technologies to enhance data quality, metadata management, and data integration processes in an organization.

You will find this term commonly used in Data Management, AI

Augmented Intelligence

The enhancement of human decision-making through AI technologies, emphasizing the assistive role of AI, rather than replacing human intelligence with artificial intelligence.

You will find this term commonly used in AI, Human-Computer Interaction

Augmented Query Processing

Enhancements in database management systems that use AI and machine learning to optimize query execution, improve performance, and provide insights, by dynamically adapting to changing data patterns and workloads.

You will find this term commonly used in Data Management, AI

Augmented Reality (AR)

AR is a technology that overlays digital information, such as images, videos, or sounds, onto the physical world, enhancing real-world environments and offering interactive experiences.

You will find this term commonly used in AI, General IT

Augmented Virtuality

Augmented Virtuality (AV) is the integration of real-world objects into virtual environments, creating a more immersive experience by blending physical elements with digital simulation, often seen in mixed reality scenarios.

You will find this term commonly used in Virtual Reality, Mixed Reality

Authentication

Authentication is the process of verifying the identity of a user or device, typically involving credentials like passwords, biometric data, or security tokens, crucial for ensuring secure access to systems and data.

You will find this term commonly used in Security, Cybersecurity

Authentication Factor

An Authentication Factor is a piece of information used to verify a user's identity before granting access to a system, which can include something the user knows (password), something the user has (token), or something the user is (biometric verification).

You will find this term commonly used in Security, Cybersecurity

Authentication Mechanism

An Authentication Mechanism is a method or system used to verify the identity of a user, device, or entity in a computer system, often involving passwords, biometric verification, or security tokens.

You will find this term commonly used in Security, Cybersecurity

Authentication Protocol

An Authentication Protocol is a system that defines how devices or systems prove their identity to each other across a network, ensuring secure communication.

You will find this term commonly used in Security, Cybersecurity

Authentication, Authorization, and Accounting (AAA)

A framework for mediating network access, enforcing policies, auditing usage, and providing the information necessary to bill for services, commonly used in telecommunications and computer networking.

You will find this term commonly used in Network Security, IT Infrastructure

Authorization

Authorization is the process of granting or denying rights to use specific resources or execute particular operations within a system, based on authenticated user or service identities.

You will find this term commonly used in Security, Cybersecurity

Autoencoder

An autoencoder is a type of artificial neural network used to learn efficient codings of unlabeled data, typically for the purpose of dimensionality reduction or feature learning.

You will find this term commonly used in AI, Machine Learning

Automated Business Process

The use of technology to perform complex business processes automatically, without human intervention, improving efficiency and accuracy.

You will find this term commonly used in Business Process Management, Automation

Automated Code Review

The use of software tools to automatically review and analyze code for potential errors, security vulnerabilities, or deviations from coding standards and best practices.

You will find this term commonly used in Software Development, QA

Automated Compliance Monitoring

The use of software tools to automatically track and report on compliance with regulations, standards, and policies, helping organizations ensure they meet legal and operational requirements.

You will find this term commonly used in Regulatory Compliance, IT Management

Automated Configuration Management

The use of software tools to automate the setup, deployment, and management of hardware and software configurations across an IT environment, ensuring consistency and compliance with defined standards and policies.

You will find this term commonly used in DevOps, IT Management

Automated Data Capture

The use of technologies such as OCR, barcodes, and RFID to automatically collect data from documents or items, reducing the need for manual entry and increasing data accuracy and efficiency.

You will find this term commonly used in Data Management, Automation

Automated Deployment

Automated Deployment refers to the process of automatically deploying software to a staging or production environment, reducing the need for human intervention and increasing the speed and reliability of software releases.

You will find this term commonly used in DevOps, Software Development

Automated Incident Response

The use of software to automatically detect, investigate, and respond to cybersecurity incidents with minimal human intervention.

You will find this term commonly used in Cybersecurity, IT Management

Automated Logic Verification

The use of automated tools to verify the correctness of logic circuits and designs in the field of electronics and computer engineering, ensuring that they meet specified requirements before fabrication.

You will find this term commonly used in Electronics, Computer Engineering

Automated Penetration Testing

The use of software tools and scripts to automatically identify and exploit vulnerabilities in networks and systems as a means of assessing the security posture of an IT infrastructure.

You will find this term commonly used in Cybersecurity, Testing

Automated Reasoning

Automated Reasoning is the area of computer science that is concerned with applying reasoning in the form of logic and mathematics by computers, enabling the solving of complex problems and proving theorems automatically.

You will find this term commonly used in AI, Computer Science

Automated Software Testing

Automated Software Testing involves using software tools to run tests on the software being developed automatically, without manual intervention, to improve efficiency and coverage of the test process.

You will find this term commonly used in Software Development, QA

Automated Software Testing Framework

A set of guidelines, tools, and practices for automating the process of software testing, aiming to reduce manual testing efforts, improve accuracy and consistency, and speed up the testing process.

You will find this term commonly used in Software Testing, DevOps

Automated System Recovery

A feature or process that automatically restores a system to a previous state or configuration after a failure or crash, minimizing downtime and data loss.

You will find this term commonly used in IT Operations, Disaster Recovery

Automated Threat Intelligence

The use of software tools and algorithms to collect, analyze, and manage data about potential security threats, helping organizations to proactively defend against cyber attacks.

You will find this term commonly used in Cybersecurity, Threat Intelligence

Autonomous Control Systems

Systems capable of operating independently of human control, often using AI and machine learning to make decisions and perform tasks based on environmental inputs.

You will find this term commonly used in Robotics, AI

What's Your
Career Path?
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart