IT Glossary - C - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Cloud Services Developer

Develops services and applications that are cloud-native, focusing on scalability, flexibility, and remote accessibility.

You will find this term commonly used in Cloud Computing, Software Development

Cloud Storage

A model of computer data storage in which the digital data is stored in logical pools, said to be on "the cloud". The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible while the physical environment protected.

You will find this term commonly used in Networking, General IT

Cloud Storage Encryption

The process of converting data stored in cloud services into a coded form that can only be accessed and decrypted by authorized users. Encryption protects data privacy and security by ensuring that sensitive information is unreadable to unauthorized individuals or in the event of a data breach.

You will find this term commonly used in Cloud Computing, Data Security

Cloud Storage Gateway

A network appliance or server which translates cloud storage APIs such as SOAP or REST to block-based storage protocols like iSCSI, Fiber Channel, or file-based interfaces such as NFS or SMB. These gateways enable businesses to integrate cloud storage into applications and data centers with existing storage infrastructure, facilitating hybrid cloud storage models.

You will find this term commonly used in Cloud Computing

Cloud Storage Optimization

The process of enhancing the efficiency and cost-effectiveness of cloud storage solutions. Optimization techniques may include data deduplication, compression, tiering, and lifecycle management to reduce storage needs and costs while ensuring data availability and compliance.

You will find this term commonly used in Cloud Computing, Data Management

Cloud Workload Protection

The security measures and technologies implemented to protect applications and data that are run within cloud environments from threats and vulnerabilities. Protection strategies include application security, network security, data encryption, and identity and access management, tailored to the dynamic and scalable nature of cloud workloads.

You will find this term commonly used in Cloud Computing, Security

Cloud Workload Protection Platform (CWPP)

A security solution designed specifically for protecting cloud workloads across various environments, including public, private, and hybrid clouds. CWPPs provide visibility, compliance monitoring, threat detection, and vulnerability management to ensure the security of applications and data across cloud-native architectures.

You will find this term commonly used in Cloud Computing, Security

Cloud-Based Development

The use of cloud environments to develop, deploy, and manage applications. This approach leverages cloud resources for software development, allowing for scalability, collaboration, and access to a wide range of development tools and services.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Based Development Environment

A software development environment hosted on a cloud platform, providing developers with a suite of development tools and resources accessible over the internet. Cloud-based environments facilitate collaboration, scalability, and access from anywhere, enhancing productivity and reducing the need for local hardware resources.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Based Disaster Recovery (CBDR)

A strategy that utilizes cloud computing resources to protect applications and data from the impact of disasters. CBDR enables organizations to quickly recover IT operations by leveraging the cloud's scalability and flexibility, reducing downtime and data loss in the event of system failures, natural disasters, or cyberattacks.

You will find this term commonly used in Cloud Computing, Disaster Recovery

Cloud-Based Integration Platform

A platform that facilitates the integration of cloud-based and on-premises applications, systems, and services. This enables organizations to create cohesive and efficient IT environments by allowing different applications to communicate and share data seamlessly, regardless of where they are hosted.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Based Security Services

Security services that are delivered over the cloud, providing scalable and flexible security solutions to protect against cyber threats. These services can include identity and access management, threat detection, encryption, and more.

You will find this term commonly used in Cloud Computing, Security

Cloud-Based Software Testing

The practice of using cloud resources to conduct software testing, offering scalability, flexibility, and cost savings. Cloud-based testing allows for the simulation of diverse computing environments and user scenarios, facilitating comprehensive testing coverage and the efficient identification of bugs and performance issues.

You will find this term commonly used in Software Development, Cloud Computing

Cloud-Based Virtual Desktop Infrastructure (VDI)

A virtualization technology that hosts desktop environments on a centralized server in the cloud, allowing users to access their desktops over the Internet from any device. Cloud-based VDI provides flexibility, scalability, and centralized management, offering an efficient solution for remote work and BYOD (Bring Your Own Device) policies.

You will find this term commonly used in Cloud Computing, Virtualization

Cloud-Based Virtualization

The use of cloud computing services to create virtual versions of physical computing resources, such as servers, storage, and networks. Cloud-based virtualization offers scalability, cost savings, and flexibility, allowing users to provision and manage virtual resources on-demand.

You will find this term commonly used in Cloud Computing, Virtualization

Cloud-Enabled Application Services

Services that provide the tools and platforms necessary for developing, deploying, and managing applications in the cloud. These services leverage cloud computing's scalability and flexibility to enhance application performance, reliability, and development speed.

You will find this term commonly used in Cloud Computing, Software Development

Cloud-Managed Networking

The management and operation of a network infrastructure entirely through cloud-based software and services. Cloud-managed networking offers simplified administration, enhanced visibility and control, and easy scalability for networks of all sizes.

You will find this term commonly used in Networking, Cloud Computing

Cloud-Native Applications

Applications that are specifically designed and developed to run in the cloud, taking full advantage of the cloud computing model. They are built using services and technologies optimized for the cloud environment, enabling them to be scalable, resilient, and agile.

You will find this term commonly used in Cloud Computing, Development

Code Coverage

A measure used in software testing to describe the degree to which the source code of a program is executed when a particular test suite runs. It helps in identifying untested parts of a codebase and ensuring that the most important parts of an application have been tested.

You will find this term commonly used in Software Testing

Code Dependency

A situation in software development where a piece of code or module requires another code segment to function. Managing dependencies is crucial for ensuring that software builds correctly and behaves as expected across different environments and versions.

You will find this term commonly used in Software Development

Code Dependency Management

The practice of tracking and managing the libraries and external pieces of code that a software project depends on. Dependency management tools help ensure that projects have the correct versions of each dependency and can help automate the updating process.

You will find this term commonly used in Software Development, IT Management

Code Deployment

The process of delivering completed software to a runtime environment, making it available for use. Deployment processes can vary from simple manual copying to automated continuous deployment pipelines, involving stages such as testing, staging, and production.

You will find this term commonly used in Software Development, DevOps

Code Injection

The exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or "inject") code into a computer program to change the course of execution. The results of a code injection attack can be disastrous, as it can allow attackers to execute arbitrary commands on a vulnerable system.

You will find this term commonly used in Security

Code Injection Vulnerability

A security flaw in an application that allows an attacker to inject malicious code into a program. This can result in unauthorized access, data theft, or control over affected systems. Code injection vulnerabilities are common in web applications and can be mitigated through proper input validation and sanitization.

You will find this term commonly used in Security, Software Development

Code Obfuscation

The practice of deliberately making source code difficult to understand for humans. Obfuscation is used to protect the code from unauthorized access and reverse engineering, particularly in software licensing and protection.

You will find this term commonly used in Software Development, Security

Code Quality Metrics

Quantitative measures used to assess the quality of software code, including its maintainability, readability, complexity, and adherence to coding standards. Code quality metrics help developers identify areas for improvement and ensure that software is reliable, efficient, and easy to maintain.

You will find this term commonly used in Software Development, Quality Assurance

Code Refactoring

The process of restructuring existing computer code—changing the factoring—without changing its external behavior. Refactoring improves nonfunctional attributes of the software. Advantages include improved code readability and reduced complexity; these can improve source code maintainability and create a more expressive internal architecture or object model to improve extensibility.

You will find this term commonly used in Software Development

Code Refactoring Tools

Software tools designed to support the process of restructuring existing computer code without changing its external behavior. These tools help identify areas for improvement, automate repetitive tasks, and ensure that the refactoring process does not introduce new bugs.

You will find this term commonly used in Software Development

Code Review

A phase in the software development process where the developers (colleagues or external reviewers) examine the source code to find and fix mistakes overlooked in the initial development phase, improving the overall quality of software. Reviews are done in various forms such as pair programming, informal walkthroughs, and formal inspections.

You will find this term commonly used in Software Development

Code Signing

The process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. This practice is used to ensure the security and integrity of code distributed over the Internet.

You will find this term commonly used in Security, Software Development

Code Signing Certificate

A digital certificate used by developers and organizations to sign scripts, executables, and software programs to verify the authenticity of the software and to ensure that it has not been altered or compromised after it was signed.

You will find this term commonly used in Security, Software Development

Code Smell

A term used in software development to refer to a symptom in the source code that possibly indicates a deeper problem. Code smells are not bugs; they do not prevent the program from functioning, but they suggest weaknesses that might slow down development or increase the risk of bugs or failures in the future.

You will find this term commonly used in Software Development

Code Smell Detection Tools

Tools that automatically identify potential weaknesses or "smells" in code that may indicate deeper problems or suggest the need for refactoring. These tools help maintain code quality and prevent technical debt.

You will find this term commonly used in Software Development, Quality Assurance

Code Versioning

The practice of managing changes to source code over time using version control systems. Versioning allows developers to keep track of changes, collaborate on projects without conflicts, and revert to earlier versions of the code if necessary.

You will find this term commonly used in Software Development, IT Management

Code Vulnerability Scanning

The automated process of inspecting code for known security vulnerabilities and defects. Scanners can analyze source code, byte code, or binaries for patterns that may indicate security issues.

You will find this term commonly used in Software Development, Security

Codecs

Devices or computer programs capable of encoding or decoding a digital data stream or signal. Codecs are used in videoconferencing, streaming media, and video editing applications to compress or decompress digital media files, making them easier to store or transmit over network environments.

You will find this term commonly used in Multimedia, Networking

Collaborative Filtering

A method used by recommendation systems to predict a user's preferences based on the preferences of other users. Collaborative filtering algorithms are widely used in e-commerce and streaming services to suggest products, movies, or music to users.

You will find this term commonly used in AI, Machine Learning

Combinatorial Optimization

A field of optimization in applied mathematics and computer science that deals with problems where the objective is to find the best solution from a finite set of solutions. Problems in combinatorial optimization are typically characterized by their need for discrete, rather than continuous, decision variables. It has applications in numerous fields, including logistics, manufacturing, finance, and telecommunications.

You will find this term commonly used in Computer Science, Mathematics

Command Injection

A form of attack in which the goal is to execute arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible largely due to insufficient input validation. This can lead to full control of the host OS and to further network exploitation.

You will find this term commonly used in Security

Command Line Interface (CLI)

A text-based user interface used to interact with software and operating systems by typing commands into a terminal or console window. CLI is favored by many advanced users and administrators for its precision, scriptability, and low resource usage compared to graphical user interfaces (GUIs).

You will find this term commonly used in General IT, Software Development

Command Line Tools

Software tools that are operated and controlled through a text-based interface, where users input commands in the form of text lines. Command line tools are powerful for automation, scripting, and performing complex tasks more efficiently than might be possible with a graphical interface.

You will find this term commonly used in Software Development, IT Management

Command-and-Control (C&C) Servers

Servers that are used by attackers to maintain communications with compromised systems within a target network. These servers can issue commands to control malware or other malicious code that has infiltrated a network or device, and can be used to steal data, deploy additional malware, or otherwise control compromised systems remotely.

You will find this term commonly used in Security, Cybersecurity

Compiler

A special program that translates a programming language's source code into machine code, bytecode, or another programming language. The translation process allows the written code to be executed by a computer. Compilers are crucial for the development of software applications, enabling programmers to write in high-level, human-readable code.

You will find this term commonly used in Software Development

Compiler Directive

Instructions in the source code that provide guidance to the compiler to preprocess or compile the code in a specific way. These directives can control aspects of the compilation process, such as optimization levels, inclusion of header files, or conditional compilation.

You will find this term commonly used in Software Development

Compiler Optimization

The process of modifying a compiler to improve the performance of the output code it generates in terms of execution speed, memory usage, or other metrics. Optimization can occur at various stages of the compilation process and involves a variety of techniques aimed at optimizing the performance of the resulting software without changing its logical behavior.

You will find this term commonly used in Software Development

CompTIA (Computing Technology Industry Association)

Offers a wide range of IT certifications covering topics from basic IT fundamentals to cybersecurity, networking, and cloud computing.

You will find this term commonly used in General IT, Cybersecurity, Networking

CompTIA A+

An entry-level certification that covers various IT operational roles and technical support.

You will find this term commonly used in General IT, Technical Support

CompTIA CASP+ (CompTIA Advanced Security Practitioner)

Advanced-level cybersecurity certification focusing on enterprise security, risk management, and incident response.

You will find this term commonly used in Cybersecurity

CompTIA Cloud Essentials+

Focuses on fundamental cloud concepts, including adoption, operations, governance, and security in a cloud environment.

You will find this term commonly used in Cloud Computing

CompTIA Cloud+

Validates the skills needed to maintain and optimize cloud infrastructure services.

You will find this term commonly used in Cloud Computing

What's Your
Career Path?
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00