IT Glossary - B - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Blockchain Consensus

The mechanism used in blockchain networks to achieve agreement on the validity of transactions and the current state of the distributed ledger. Common consensus algorithms include Proof of Work (PoW) and Proof of Stake (PoS), ensuring trust and integrity in decentralized systems.

You will find this term commonly used in Blockchain, Security

Blockchain Developer

Specializes in developing and implementing architecture and solutions using blockchain technology.

You will find this term commonly used in Blockchain, Software Development

Blockchain Network

A collective of nodes that together maintain a distributed ledger for a blockchain application. Blockchain networks can be public or private and are used in a variety of applications beyond cryptocurrencies, including supply chain management and secure transactions.

You will find this term commonly used in Blockchain, General IT

Blockchain Platform

A software infrastructure that enables the development, deployment, and management of blockchain systems and applications. Blockchain platforms provide the necessary tools and libraries for creating decentralized applications and smart contracts on a blockchain network.

You will find this term commonly used in Blockchain, Development

Blockchain Smart Contracts

Self-executing contracts with the terms of the agreement directly written into lines of code. They automatically enforce and verify the terms of a contract on a blockchain network.

You will find this term commonly used in Blockchain, Legal Tech

Blockchain-as-a-Service (BaaS)

A cloud-based service that enables users to build, host, and use their own blockchain apps, contracts, and functions on the blockchain while the cloud service provider manages all the necessary tasks and activities to keep the infrastructure agile and operational.

You will find this term commonly used in Cloud Computing, Blockchain

Blogosphere Analysis

The examination and analysis of the blogosphere (the collective community of all blogs and bloggers) to gauge public opinion, trends, and influential content within specific topics or industries.

You will find this term commonly used in Data Analysis, Digital Marketing

Blue Screen of Death (BSOD)

A stop error screen displayed on a Windows computer system after a fatal system error or crash. The BSOD indicates a system crash in which the operating system has reached a condition where it can no longer operate safely.

You will find this term commonly used in Hardware, Software Development

Bluejacking

The practice of sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, tablets, or laptop computers. Bluejacking is typically used for marketing or social purposes and is not harmful; however, it can be exploited for malicious attacks in some cases.

You will find this term commonly used in Networking, Security

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, creating personal area networks. It's widely used in connecting peripherals, such as headsets, keyboards, and speakers, to computers and smartphones.

You will find this term commonly used in Networking, General IT

Bluetooth 5.0

The latest version of the Bluetooth wireless technology, designed to improve speed, range, and bandwidth over previous versions. Bluetooth 5.0 enables more robust wireless connections for devices, supporting the IoT ecosystem with improved data transmission capabilities.

You will find this term commonly used in Networking, IoT

Bluetooth Beacon Technology

Small devices that transmit Bluetooth signals to nearby smart devices, enabling location-based services and information sharing. They are used in retail, navigation, and asset tracking applications.

You will find this term commonly used in Wireless Communication, IoT

Bluetooth Low Energy (BLE)

A power-conserving variant of Bluetooth personal area network (PAN) technology, designed for use in applications that do not require constant data streaming. BLE is used in IoT devices, healthcare, fitness, beacons, and security applications.

You will find this term commonly used in Networking, IoT

Bluetooth Profiles

Specifications that define the minimum requirements that Bluetooth-enabled devices must support to communicate with each other for specific types of applications or use cases.

You will find this term commonly used in Networking, Wireless Communication

Bluetooth SIG (Special Interest Group)

An organization that oversees the development of Bluetooth standards and the licensing of Bluetooth technologies and trademarks to manufacturers.

You will find this term commonly used in Networking, Standards Organizations

Body Area Network (BAN)

A network of wearable computing devices. This technology is often used in health monitoring systems, where sensors collect data on various body parameters for medical analysis.

You will find this term commonly used in Networking, Health IT

Boolean Logic

A subset of algebra used for creating true/false statements. Boolean logic is fundamental to digital circuits and computer programming, as it underpins the operations of binary systems.

You will find this term commonly used in Software Development, General IT

Boot Integrity Services

A set of security measures and technologies designed to ensure that a device's boot process is secure from unauthorized modifications, protecting the system from boot-time malware and ensuring the integrity of the operating system.

You will find this term commonly used in Cybersecurity, Hardware

Boot Sector Virus

A type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks (part of a hard disk that contains machine code to be loaded into RAM by a computer system's built-in firmware).

You will find this term commonly used in Cybersecurity, Hardware

Boot Volume

The disk volume or partition that contains the operating system and its support files. The boot volume is accessed by the computer's firmware or bootloader during the startup process to load the operating system into memory.

You will find this term commonly used in Hardware, Software Development

Bootloader

A small program that manages a dual boot, helping a computer to start up the operating system. It loads the operating system kernel into memory, initiating the boot process. Bootloaders are essential for ensuring the correct and secure start-up of the system.

You will find this term commonly used in Hardware, General IT

Bootstrap Loader

A small program that initiates the loading of the operating system or other larger programs. It resides in the computer's read-only memory (ROM) or firmware.

You will find this term commonly used in Operating Systems, Software Development

Bootstrapping (Computing)

The process of starting up a computer from a halted or powered-down condition, often involving loading the initial software, or bootloader, which then initializes the operating system.

You will find this term commonly used in Software Development, Operating Systems

Border Gateway Protocol (BGP)

An Internet protocol that enables the exchange of routing information between autonomous systems (AS) on the Internet. It's crucial for determining the best paths for data transmission.

You will find this term commonly used in Networking, Internet Technology

Bot

A software application that automates repetitive tasks on the internet. Bots can range from performing simple tasks, like indexing web content for search engines, to more complex activities, such as automating interactions in chat applications or managing social media accounts.

You will find this term commonly used in Software Development, Cybersecurity

Bot Detection

The technology and processes used to identify and mitigate automated software agents (bots) that perform tasks on websites or networks, often for malicious purposes. Bot detection is crucial for preventing fraud, spam, and denial-of-service attacks on web services.

You will find this term commonly used in Cybersecurity, Web Development

Bot Detection and Mitigation

Technologies and practices designed to identify, block, and mitigate the impact of malicious automated software agents (bots) on websites, networks, and applications.

You will find this term commonly used in Cybersecurity, Web Development

Botnet

A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam or launch denial-of-service attacks. It's a significant cybersecurity threat, leveraging the combined computing power for nefarious purposes.

You will find this term commonly used in Security, Cybersecurity

Botnet C&C (Command and Control)

The infrastructure through which botnets are controlled and managed by attackers. C&C servers send commands to compromised machines (bots) to execute malicious activities.

You will find this term commonly used in Cybersecurity, Network Security

Botnet Detection

The process of identifying a collection of bots that are remotely controlled by a central authority, used mainly for malicious purposes like launching DDoS attacks or spreading malware. Detection is crucial for cybersecurity defenses.

You will find this term commonly used in Cybersecurity, Networking

Bounce Message

An email message that is returned to the sender because it cannot be delivered for some reason. Bounce messages are a form of network administrative messages.

You will find this term commonly used in Networking, Email Systems

Bounce Rate

In web analytics, the percentage of visitors to a particular website who navigate away from the site after viewing only one page. A high bounce rate indicates that the site failed to convince the user to stay and explore more, often used as a metric for website effectiveness.

You will find this term commonly used in Web Development, SEO

Boundary Defense Mechanisms

Security measures implemented at the perimeter of a network to defend against external threats and unauthorized access. These mechanisms include firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS).

You will find this term commonly used in Cybersecurity, Network Security

Boundary Scan

A method for testing interconnections on printed circuit boards (PCBs) or integrated circuits using a standard JTAG (Joint Test Action Group) interface. Boundary scan helps in diagnosing hardware failures and verifying that components are correctly installed.

You will find this term commonly used in Hardware, Testing

Bounded Context

A central pattern in Domain-Driven Design. It is the focus of DDD's strategic design section which is all about dealing with large models and teams. Bounded Context is a boundary within which a particular model is defined and applicable.

You will find this term commonly used in Software Development

Bounded Service

In computing, a service that offers a defined interface and is bound by specific contractual agreements in terms of its functionalities and performance metrics. Bounded services are common in Service-Oriented Architecture (SOA) and microservices architectures, ensuring clear service boundaries.

You will find this term commonly used in Software Development, Networking

Branch Cache

A feature in some versions of Microsoft Windows that allows computers in a network to store cached copies of files accessed from a central server, reducing bandwidth usage and improving access times for users.

You will find this term commonly used in Networking, Performance Optimization

Branch Office VPN

A virtual private network (VPN) configuration used to securely connect remote branch offices to a company's main network, ensuring safe and reliable communication over the internet.

You will find this term commonly used in Networking, Cybersecurity

Branch Prediction

A technique used in computer architecture to improve the flow of instruction execution by guessing the outcome of conditional operations and preparing the execution path accordingly. Branch prediction enhances CPU performance by reducing execution stalls.

You will find this term commonly used in Hardware, Software Development

Branching Strategy

In version control, a methodology for how branches are created, used, and merged back into the main code base. It's critical for managing features, fixes, and releases in software development.

You will find this term commonly used in Software Development, Version Control

Branchless Programming

A programming paradigm that minimizes or eliminates the use of conditional branching (if-else statements, loops) in favor of straight-line code to improve execution predictability and efficiency.

You will find this term commonly used in Software Development, Programming Techniques

Brand Safety

The practice of ensuring that online advertising does not appear alongside content that is detrimental to the brand's image or reputation. Brand safety involves using technologies and policies to protect brands from association with harmful or inappropriate content.

You will find this term commonly used in Web Development, Marketing

Branded Keywords

In digital marketing and SEO, specific words or phrases that include the brand's name or unique product names. These keywords are used to capture traffic from search queries directly related to the brand or its products.

You will find this term commonly used in Marketing, SEO

Breadcrumbs

In web development, a navigational aid that allows users to keep track of their locations within programs, documents, or websites. Breadcrumbs typically appear horizontally across the top of a web page, providing links back to each previous page the user navigated through.

You will find this term commonly used in Web Development, UX/UI Design

Breadth-First Search (BFS)

An algorithm for traversing or searching tree or graph data structures. It starts at the tree root and explores all neighbor nodes at the present depth prior to moving on to the nodes at the next depth level.

You will find this term commonly used in Algorithms, Data Structures

Breakpoint

A debugging tool that allows developers to temporarily halt the execution of a program at a specific point so they can examine the current state of the program, including variable values, the execution stack, and the system's state.

You will find this term commonly used in Software Development

Breakpoint Debugging

A debugging method that involves setting breakpoints in the code, which temporarily halt the execution of a program at specific points. This allows developers to inspect the state of the application at various stages of execution to identify and troubleshoot issues.

You will find this term commonly used in Software Development

Bridge

A network device that divides a network into segments or connects different networks together, such as connecting a local area network (LAN) to another local area network that uses the same protocol (Ethernet, for instance).

You will find this term commonly used in Networking

Bring Your Own Cloud (BYOC)

A policy where employees are allowed to use their personal cloud storage services for storing and accessing work-related data. It poses potential security risks and challenges in data management and compliance.

You will find this term commonly used in Cloud Computing, Security

Bring Your Own Key (BYOK)

A cloud security model that allows cloud service customers to use their own encryption keys, giving them control over the security of their data in the cloud.

You will find this term commonly used in Cloud Computing, Security

What's Your
Career Path?
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart

CompTIA CySA Plus Certification Training

Learn how to identify and respond to cybersecurity threats with our CompTIA CySA+ (CS0-002) Cybersecurity Analyst course. Enroll now!
Total Hours
14 Hrs 35 Min
icons8-video-camera-58
36 On-demand Videos

$49.00

Add To Cart

Google Cloud Digital Leader Certification Training

Become a certified Google Cloud Digital Leader with our comprehensive online training cloud certification course. Learn the skills you need to succeed today!
Total Hours
6 Hrs 46 Min
icons8-video-camera-58
80 On-demand Videos

$49.00

Add To Cart

CKAD : Certified Kubernetes Application Developer

Become a Certified Kubernetes Application Developer (CKAD). Enroll now and learn how to build, deploy, and manage Kubernetes applications.
Total Hours
4 Hrs 1 Min
icons8-video-camera-58
68 On-demand Videos

$49.00

Add To Cart

Sage 50 Certification Course

Become a Sage 50 expert with our comprehensive online course. Enroll today and earn your Sage 50 Certification.
Total Hours
9 Hrs 60 Min
icons8-video-camera-58
215 On-demand Videos

$49.00

Add To Cart

Microsoft 70-332: Advanced Solutions of SharePoint Server

Become a SharePoint expert with our Microsoft 70-332 course. Get certified in Advanced Solutions of SharePoint Server 2013 with ITU Online.
Total Hours
5 Hrs 41 Min
icons8-video-camera-58
65 On-demand Videos

$49.00

Add To Cart

ASP Net Free Course

Build your skills in developing ASP.NET MVC web applications with the Microsoft 70-486 certification course from ITU Online.
Total Hours
18 Hrs 39 Min
icons8-video-camera-58
92 On-demand Videos

$0.00

Add To Cart

CompTIA CASP +: Advanced Security Practitioner

Become a CompTIA CASP + certified professional with our online training course. Get started today and learn advanced security techniques.
Total Hours
19 Hrs 31 Min
icons8-video-camera-58
136 On-demand Videos

$49.00

Add To Cart

Social Media Marketing

Learn the latest social media marketing strategies and techniques to grow your brand. Boost your online presence now!
Total Hours
8 Hrs 30 Min
icons8-video-camera-58
30 On-demand Videos

$49.00

Add To Cart

Microsoft Access 2010 Training

Learn Microsoft Access with our comprehensive online course. Master the skills to create, design and manage a database. Enroll now!
Total Hours
4 Hrs 37 Min
icons8-video-camera-58
33 On-demand Videos

$49.00

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart

CSS Training

Enhance your web dev skills with our CSS online course. From basic concepts to advanced techniques, everything you need to know to create stunning websites.
Total Hours
8 Hrs 21 Min
icons8-video-camera-58
31 On-demand Videos

$49.00

Add To Cart