IT Glossary - B - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Blockchain Consensus

The mechanism used in blockchain networks to achieve agreement on the validity of transactions and the current state of the distributed ledger. Common consensus algorithms include Proof of Work (PoW) and Proof of Stake (PoS), ensuring trust and integrity in decentralized systems.

You will find this term commonly used in Blockchain, Security

Blockchain Developer

Specializes in developing and implementing architecture and solutions using blockchain technology.

You will find this term commonly used in Blockchain, Software Development

Blockchain Network

A collective of nodes that together maintain a distributed ledger for a blockchain application. Blockchain networks can be public or private and are used in a variety of applications beyond cryptocurrencies, including supply chain management and secure transactions.

You will find this term commonly used in Blockchain, General IT

Blockchain Platform

A software infrastructure that enables the development, deployment, and management of blockchain systems and applications. Blockchain platforms provide the necessary tools and libraries for creating decentralized applications and smart contracts on a blockchain network.

You will find this term commonly used in Blockchain, Development

Blockchain Smart Contracts

Self-executing contracts with the terms of the agreement directly written into lines of code. They automatically enforce and verify the terms of a contract on a blockchain network.

You will find this term commonly used in Blockchain, Legal Tech

Blockchain-as-a-Service (BaaS)

A cloud-based service that enables users to build, host, and use their own blockchain apps, contracts, and functions on the blockchain while the cloud service provider manages all the necessary tasks and activities to keep the infrastructure agile and operational.

You will find this term commonly used in Cloud Computing, Blockchain

Blogosphere Analysis

The examination and analysis of the blogosphere (the collective community of all blogs and bloggers) to gauge public opinion, trends, and influential content within specific topics or industries.

You will find this term commonly used in Data Analysis, Digital Marketing

Blue Screen of Death (BSOD)

A stop error screen displayed on a Windows computer system after a fatal system error or crash. The BSOD indicates a system crash in which the operating system has reached a condition where it can no longer operate safely.

You will find this term commonly used in Hardware, Software Development

Bluejacking

The practice of sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, tablets, or laptop computers. Bluejacking is typically used for marketing or social purposes and is not harmful; however, it can be exploited for malicious attacks in some cases.

You will find this term commonly used in Networking, Security

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, creating personal area networks. It's widely used in connecting peripherals, such as headsets, keyboards, and speakers, to computers and smartphones.

You will find this term commonly used in Networking, General IT

Bluetooth 5.0

The latest version of the Bluetooth wireless technology, designed to improve speed, range, and bandwidth over previous versions. Bluetooth 5.0 enables more robust wireless connections for devices, supporting the IoT ecosystem with improved data transmission capabilities.

You will find this term commonly used in Networking, IoT

Bluetooth Beacon Technology

Small devices that transmit Bluetooth signals to nearby smart devices, enabling location-based services and information sharing. They are used in retail, navigation, and asset tracking applications.

You will find this term commonly used in Wireless Communication, IoT

Bluetooth Low Energy (BLE)

A power-conserving variant of Bluetooth personal area network (PAN) technology, designed for use in applications that do not require constant data streaming. BLE is used in IoT devices, healthcare, fitness, beacons, and security applications.

You will find this term commonly used in Networking, IoT

Bluetooth Profiles

Specifications that define the minimum requirements that Bluetooth-enabled devices must support to communicate with each other for specific types of applications or use cases.

You will find this term commonly used in Networking, Wireless Communication

Bluetooth SIG (Special Interest Group)

An organization that oversees the development of Bluetooth standards and the licensing of Bluetooth technologies and trademarks to manufacturers.

You will find this term commonly used in Networking, Standards Organizations

Body Area Network (BAN)

A network of wearable computing devices. This technology is often used in health monitoring systems, where sensors collect data on various body parameters for medical analysis.

You will find this term commonly used in Networking, Health IT

Boolean Logic

A subset of algebra used for creating true/false statements. Boolean logic is fundamental to digital circuits and computer programming, as it underpins the operations of binary systems.

You will find this term commonly used in Software Development, General IT

Boot Integrity Services

A set of security measures and technologies designed to ensure that a device's boot process is secure from unauthorized modifications, protecting the system from boot-time malware and ensuring the integrity of the operating system.

You will find this term commonly used in Cybersecurity, Hardware

Boot Sector Virus

A type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks (part of a hard disk that contains machine code to be loaded into RAM by a computer system's built-in firmware).

You will find this term commonly used in Cybersecurity, Hardware

Boot Volume

The disk volume or partition that contains the operating system and its support files. The boot volume is accessed by the computer's firmware or bootloader during the startup process to load the operating system into memory.

You will find this term commonly used in Hardware, Software Development

Bootloader

A small program that manages a dual boot, helping a computer to start up the operating system. It loads the operating system kernel into memory, initiating the boot process. Bootloaders are essential for ensuring the correct and secure start-up of the system.

You will find this term commonly used in Hardware, General IT

Bootstrap Loader

A small program that initiates the loading of the operating system or other larger programs. It resides in the computer's read-only memory (ROM) or firmware.

You will find this term commonly used in Operating Systems, Software Development

Bootstrapping (Computing)

The process of starting up a computer from a halted or powered-down condition, often involving loading the initial software, or bootloader, which then initializes the operating system.

You will find this term commonly used in Software Development, Operating Systems

Border Gateway Protocol (BGP)

An Internet protocol that enables the exchange of routing information between autonomous systems (AS) on the Internet. It's crucial for determining the best paths for data transmission.

You will find this term commonly used in Networking, Internet Technology

Bot

A software application that automates repetitive tasks on the internet. Bots can range from performing simple tasks, like indexing web content for search engines, to more complex activities, such as automating interactions in chat applications or managing social media accounts.

You will find this term commonly used in Software Development, Cybersecurity

Bot Detection

The technology and processes used to identify and mitigate automated software agents (bots) that perform tasks on websites or networks, often for malicious purposes. Bot detection is crucial for preventing fraud, spam, and denial-of-service attacks on web services.

You will find this term commonly used in Cybersecurity, Web Development

Bot Detection and Mitigation

Technologies and practices designed to identify, block, and mitigate the impact of malicious automated software agents (bots) on websites, networks, and applications.

You will find this term commonly used in Cybersecurity, Web Development

Botnet

A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam or launch denial-of-service attacks. It's a significant cybersecurity threat, leveraging the combined computing power for nefarious purposes.

You will find this term commonly used in Security, Cybersecurity

Botnet C&C (Command and Control)

The infrastructure through which botnets are controlled and managed by attackers. C&C servers send commands to compromised machines (bots) to execute malicious activities.

You will find this term commonly used in Cybersecurity, Network Security

Botnet Detection

The process of identifying a collection of bots that are remotely controlled by a central authority, used mainly for malicious purposes like launching DDoS attacks or spreading malware. Detection is crucial for cybersecurity defenses.

You will find this term commonly used in Cybersecurity, Networking

Bounce Message

An email message that is returned to the sender because it cannot be delivered for some reason. Bounce messages are a form of network administrative messages.

You will find this term commonly used in Networking, Email Systems

Bounce Rate

In web analytics, the percentage of visitors to a particular website who navigate away from the site after viewing only one page. A high bounce rate indicates that the site failed to convince the user to stay and explore more, often used as a metric for website effectiveness.

You will find this term commonly used in Web Development, SEO

Boundary Defense Mechanisms

Security measures implemented at the perimeter of a network to defend against external threats and unauthorized access. These mechanisms include firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS).

You will find this term commonly used in Cybersecurity, Network Security

Boundary Scan

A method for testing interconnections on printed circuit boards (PCBs) or integrated circuits using a standard JTAG (Joint Test Action Group) interface. Boundary scan helps in diagnosing hardware failures and verifying that components are correctly installed.

You will find this term commonly used in Hardware, Testing

Bounded Context

A central pattern in Domain-Driven Design. It is the focus of DDD's strategic design section which is all about dealing with large models and teams. Bounded Context is a boundary within which a particular model is defined and applicable.

You will find this term commonly used in Software Development

Bounded Service

In computing, a service that offers a defined interface and is bound by specific contractual agreements in terms of its functionalities and performance metrics. Bounded services are common in Service-Oriented Architecture (SOA) and microservices architectures, ensuring clear service boundaries.

You will find this term commonly used in Software Development, Networking

Branch Cache

A feature in some versions of Microsoft Windows that allows computers in a network to store cached copies of files accessed from a central server, reducing bandwidth usage and improving access times for users.

You will find this term commonly used in Networking, Performance Optimization

Branch Office VPN

A virtual private network (VPN) configuration used to securely connect remote branch offices to a company's main network, ensuring safe and reliable communication over the internet.

You will find this term commonly used in Networking, Cybersecurity

Branch Prediction

A technique used in computer architecture to improve the flow of instruction execution by guessing the outcome of conditional operations and preparing the execution path accordingly. Branch prediction enhances CPU performance by reducing execution stalls.

You will find this term commonly used in Hardware, Software Development

Branching Strategy

In version control, a methodology for how branches are created, used, and merged back into the main code base. It's critical for managing features, fixes, and releases in software development.

You will find this term commonly used in Software Development, Version Control

Branchless Programming

A programming paradigm that minimizes or eliminates the use of conditional branching (if-else statements, loops) in favor of straight-line code to improve execution predictability and efficiency.

You will find this term commonly used in Software Development, Programming Techniques

Brand Safety

The practice of ensuring that online advertising does not appear alongside content that is detrimental to the brand's image or reputation. Brand safety involves using technologies and policies to protect brands from association with harmful or inappropriate content.

You will find this term commonly used in Web Development, Marketing

Branded Keywords

In digital marketing and SEO, specific words or phrases that include the brand's name or unique product names. These keywords are used to capture traffic from search queries directly related to the brand or its products.

You will find this term commonly used in Marketing, SEO

Breadcrumbs

In web development, a navigational aid that allows users to keep track of their locations within programs, documents, or websites. Breadcrumbs typically appear horizontally across the top of a web page, providing links back to each previous page the user navigated through.

You will find this term commonly used in Web Development, UX/UI Design

Breadth-First Search (BFS)

An algorithm for traversing or searching tree or graph data structures. It starts at the tree root and explores all neighbor nodes at the present depth prior to moving on to the nodes at the next depth level.

You will find this term commonly used in Algorithms, Data Structures

Breakpoint

A debugging tool that allows developers to temporarily halt the execution of a program at a specific point so they can examine the current state of the program, including variable values, the execution stack, and the system's state.

You will find this term commonly used in Software Development

Breakpoint Debugging

A debugging method that involves setting breakpoints in the code, which temporarily halt the execution of a program at specific points. This allows developers to inspect the state of the application at various stages of execution to identify and troubleshoot issues.

You will find this term commonly used in Software Development

Bridge

A network device that divides a network into segments or connects different networks together, such as connecting a local area network (LAN) to another local area network that uses the same protocol (Ethernet, for instance).

You will find this term commonly used in Networking

Bring Your Own Cloud (BYOC)

A policy where employees are allowed to use their personal cloud storage services for storing and accessing work-related data. It poses potential security risks and challenges in data management and compliance.

You will find this term commonly used in Cloud Computing, Security

Bring Your Own Key (BYOK)

A cloud security model that allows cloud service customers to use their own encryption keys, giving them control over the security of their data in the cloud.

You will find this term commonly used in Cloud Computing, Security

What's Your
Career Path?

Microsoft MCSA: SQL Server Solutions Associate

Get certified as a Microsoft MCSA: SQL Server Solutions Associate with our comprehensive training program. Implement SQL Server solutions with ease.
Total Hours
27 Hrs 42 Min
icons8-video-camera-58
215 On-demand Videos

$49.00

Add To Cart

AWS Cloud Practitioner Training

Learn the fundamentals of cloud computing with our AWS Certified Cloud Practitioner Course. Start your cloud career today!
Total Hours
17 Hrs 17 Min
icons8-video-camera-58
171 On-demand Videos

$49.00

Add To Cart

Adobe Dreamweaver Training

Learn Adobe Dreamweaver and create stunning websites with our online training. Enroll now and gain the skills to design and code websites.
Total Hours
1 Hr 45 Min
icons8-video-camera-58
12 On-demand Videos

$49.00

Add To Cart

CompTIA Linux Certification Prep Course – LX0-101 & LX0-102

Get certified with the CompTIA Linux Certification Prep Course – LX0-101 & LX0-102. Learn the fundamentals of Linux and enroll now!
Total Hours
16 Hrs 31 Min
icons8-video-camera-58
98 On-demand Videos

$49.00

Add To Cart

Scrum Master Course

Learn Scrum principles and practices with our Scrum Master online course. Enhance your career and improve team performance. Enroll now!
Total Hours
3 Hrs 22 Min
icons8-video-camera-58
32 On-demand Videos

$49.00

Add To Cart

Kubernetes Container – Containerizing Apps in the Cloud

For Kubernetes online course: “Learn how to deploy and containerize applications in the next cloud environments with our Kubernetes Online Course. Start today!
Total Hours
1 Hr 55 Min
icons8-video-camera-58
34 On-demand Videos

$49.00

Add To Cart
ON SALE 40% OFF
Microsoft Office 2016

Microsoft Office 2016 Certification Training Bundle

Gain expertise in Microsoft Office 2016 with our Certification Training Bundle. Enroll now to enhance your skills and boost your career prospects!
Total Hours
45 Hrs 43 Min
icons8-video-camera-58
161 On-demand Videos

$47.40

Add To Cart

Six Sigma Green Belt

Enhance your project management skills with our Green Six Sigma Belt online course. Gain the knowledge and expertise to succeed in any industry.
Total Hours
20 Hrs 26 Min
icons8-video-camera-58
55 On-demand Videos

$49.00

Add To Cart

All Access – Annual Subscription

Get access to all ITU courses with an All Access Annual Subscription. Advance your IT career with our comprehensive online training!
Total Hours
2635 Hrs 32 Min
icons8-video-camera-58
13,488 On-demand Videos

$279.00 / year

Microsoft 70-686: Windows 7 Administrator

Prepare for the Microsoft 70-686 Pro: Windows 7, Enterprise Desktop Administrator exam with our expert-led training. Enroll now!
Total Hours
14 Hrs 42 Min
icons8-video-camera-58
37 On-demand Videos

$49.00

Add To Cart

Microsoft Word 2013 Training

Master Microsoft Word with our online training course. Learn valuable skills and boost your resume. Enroll now and get certified!
Total Hours
8 Hrs 27 Min
icons8-video-camera-58
46 On-demand Videos

$49.00

Add To Cart

Cisco CCNP Troubleshooting IP Networks 300-135

Master the art of network troubleshooting with Cisco CCNP Troubleshooting IP Networks 300-135 training. Enroll today!
Total Hours
26 Hrs 8 Min
icons8-video-camera-58
62 On-demand Videos

$49.00

Add To Cart