IT Glossary - C - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Content Delivery Networks (CDN) Optimization

The process of enhancing the performance and efficiency of a CDN, which distributes content from the original site to multiple, geographically dispersed servers. Optimization can involve adjusting caching rules, selecting optimal server locations, and using data analytics to predict and manage traffic loads, all aimed at improving website speed and user experience.

You will find this term commonly used in Networking, Web Development

Content Management Framework (CMF)

A system that provides the necessary infrastructure to create, manage, and deploy content on the web. Unlike a Content Management System (CMS), which is more out-of-the-box ready, a CMF provides more flexibility and is aimed at developers, offering the building blocks to create a custom CMS tailored to specific needs.

You will find this term commonly used in Web Development, Software Development

Content Security Policy (CSP)

An added layer of security used by web developers to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. CSP is implemented by specifying directives that dictate sources of content that browsers are allowed to load on a webpage.

You will find this term commonly used in Security, Web Development

Context Switching

The process of storing and restoring the state (context) of a CPU so that multiple processes can share a single CPU resource. Context switching allows for multitasking by enabling a single CPU to manage the execution of multiple processes by switching between them.

You will find this term commonly used in Operating Systems, Hardware

Continuous Authentication

A security approach that continuously verifies the identity of a user based on behavioral and environmental factors, rather than relying on a single login session. This method provides a more dynamic and potentially more secure form of authentication.

You will find this term commonly used in Security, Cybersecurity

Continuous Compliance Monitoring

The ongoing process of tracking and verifying that IT systems and business operations adhere to regulatory standards, industry best practices, and internal policies. Continuous compliance monitoring helps organizations detect compliance gaps in real time and address them promptly to avoid penalties and reduce risk.

You will find this term commonly used in IT Management, Security

Continuous Configuration Automation (CCA)

The practice of automating the configuration and management of computers and software within an IT environment. CCA tools enable IT professionals to maintain consistent settings and software states across large-scale infrastructure, improving security and efficiency.

You will find this term commonly used in IT Management, DevOps

Continuous Data Protection (CDP)

A backup and recovery method that automatically captures every version of data modification. This allows users or administrators to restore data to any point in time, ensuring that no data is lost in the event of a failure or mistake. CDP is particularly useful for critical data that changes frequently.

You will find this term commonly used in IT Management, Data Recovery

Continuous Delivery (CD)

A software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time. It aims at building, testing, and releasing software with greater speed and frequency.

You will find this term commonly used in Software Development

Continuous Monitoring

The process and technology used to detect compliance and risk issues associated with an organization's financial and operational environment. The strategy focuses on monitoring company processes and controls with the aim of identifying significant issues as soon as possible and enabling better risk management and decision-making.

You will find this term commonly used in Security, IT Management

Continuous Network Monitoring

The practice of using automated tools and processes to continuously monitor network traffic, devices, and services for unusual activity that could indicate a security threat or operational issue. This approach enables organizations to detect and respond to issues in real-time, improving the overall security posture and network performance.

You will find this term commonly used in Networking, Security

Continuous Quality Assurance (CQA)

The ongoing process of ensuring that software development processes and products meet or exceed predefined quality standards and customer expectations. Continuous quality assurance integrates quality checks and testing throughout the software development lifecycle to identify and address issues early, improving the overall quality of the final product.

You will find this term commonly used in Software Development, Quality Assurance

Continuous Testing

The process of executing automated tests as part of the software delivery pipeline to obtain immediate feedback on the business risks associated with a software release candidate. Continuous testing helps teams to assess the quality of their software at every stage of development and deployment, reducing bugs and improving performance.

You will find this term commonly used in Software Development, Testing

Control Flow

In computer science, control flow refers to the order in which individual statements, instructions, or function calls are executed or evaluated within a program. It is a fundamental concept that allows software developers to dictate the logic and operations of their programs through structures like loops, conditionals, and branches.

You will find this term commonly used in Software Development

Conversational User Interface (CUI)

A user interface that mimics human conversation, allowing users to interact with software through text or voice-based inputs in a natural and intuitive way. CUIs are commonly implemented in chatbots and virtual assistants.

You will find this term commonly used in AI, User Experience

CPU (Central Processing Unit)

Often referred to as the "brain" of the computer, the CPU performs most of the calculations which enable a computer to function. It executes commands from a computer's hardware and software, performing arithmetic and logic operations that process data.

You will find this term commonly used in Hardware, General IT

CPU Cache

A small-sized type of volatile computer memory that provides high-speed data access to the processor and stores frequently used computer programs, applications, and data. CPU cache helps speed the process of data exchange by storing instances of programs and data routinely accessed by the processor, reducing the need to access slower main memory.

You will find this term commonly used in Hardware, General IT

CPU Throttling

The process of automatically adjusting the clock speed of a CPU based on the actual need, to conserve power and reduce heat generation. Throttling is used in various computing devices to prevent overheating and to extend battery life in portable devices.

You will find this term commonly used in Hardware, Operating Systems

CRISC (Certified in Risk and Information Systems Control)

Focuses on risk management and the design, implementation, monitoring, and maintenance of IS controls.

You will find this term commonly used in Risk Management

CRM (Customer Relationship Management)

A technology for managing all your company's relationships and interactions with customers and potential customers. The goal is straightforward: Improve business relationships to grow your business. A CRM system helps companies stay connected to customers, streamline processes, and improve profitability.

You will find this term commonly used in Business, Marketing

Cross-Domain Data Sharing

The practice of securely sharing data across different security domains, organizational boundaries, or IT environments. This involves implementing controls and protocols to ensure that data can be exchanged safely and in compliance with applicable regulations and policies.

You will find this term commonly used in Data Management, Security

Cross-Domain Solution (CDS)

A security mechanism that provides controlled interfaces to enable the transfer of information between networks or systems operating under different security policies. CDSs are used in military and government IT environments to ensure that sensitive information is shared securely and in compliance with all applicable security regulations.

You will find this term commonly used in Security, Networking

Cross-Domain Solutions (CDS) Implementation

The deployment and configuration of systems that enable the secure transfer of information across different security domains, typically in military and government environments. Implementation of CDS ensures that sensitive information can be shared securely and in compliance with organizational policies and regulatory requirements.

You will find this term commonly used in Security, Information Sharing

Cross-Functional IT Collaboration

The practice of bringing together IT professionals from different specialties or departments to work on shared projects or solve complex problems. This collaboration fosters innovation, accelerates project timelines, and leverages diverse expertise to improve technology solutions and business outcomes.

You will find this term commonly used in IT Management, Team Collaboration

Cross-Functional Software Development

A software development approach that involves team members with different functional expertise working together towards a common goal. This approach is designed to foster innovation, accelerate development timelines, and enhance product quality by leveraging diverse perspectives and skills.

You will find this term commonly used in Software Development, Management

Cross-Functional Team

A group of people with different functional expertise working toward a common goal. In IT, cross-functional teams often include developers, operations staff, quality assurance testers, and business analysts, working together to develop, deploy, and maintain software systems in a more collaborative and efficient manner.

You will find this term commonly used in Management, Software Development

Cross-Origin Embedder Policy (COEP)

A security feature that prevents a document from loading any cross-origin resources that do not explicitly grant the document permission (using CORP or CORS). COEP is part of a set of security measures that aim to mitigate certain types of cross-origin attacks, enhancing web application security.

You will find this term commonly used in Web Development, Security

Cross-Origin Resource Policy (CORP)

A security feature that allows web developers to control how resources on their web server can be requested from another origin. CORP is part of a suite of complementary security features, like Cross-Origin Resource Sharing (CORS) and Cross-Origin Embedder Policy (COEP), designed to enhance web application security by preventing certain types of cross-origin attacks.

You will find this term commonly used in Web Development, Security

Cross-Origin Resource Sharing (CORS) Policy

A mechanism that allows or restricts requested resources on a web page from another domain outside the domain from which the first resource was served. A CORS policy is a security feature that enables web developers to control which cross-origin requests are allowed, enhancing the security of web applications by preventing unwanted interactions.

You will find this term commonly used in Security, Web Development

Cross-Platform Compatibility

The ability of software, applications, or services to operate on different operating systems or platforms without requiring modification. Cross-platform compatibility is significant for developers who want to reach a broader audience by ensuring their applications can run on various devices and systems.

You will find this term commonly used in Software Development

Cross-Platform Compatibility Testing

The process of verifying that software applications or systems operate consistently and correctly across multiple platform environments, such as different operating systems, devices, or web browsers. Compatibility testing ensures that applications provide a uniform user experience regardless of the underlying platform.

You will find this term commonly used in Software Development, Quality Assurance

Cross-Platform Development

The practice of developing software applications that are compatible with multiple operating systems or platforms (e.g., Windows, macOS, Linux, iOS, Android). This approach enables developers to write code once and deploy it across various platforms, increasing the application's reach and reducing development time and costs.

You will find this term commonly used in Software Development

Cross-Platform Development Tools

Tools and frameworks that enable developers to create applications that run across multiple operating systems and platforms (e.g., Windows, macOS, Linux, iOS, Android) from a single codebase. These tools simplify the development process by reducing the need for platform-specific code, facilitating broader application reach and efficiency.

You will find this term commonly used in Software Development, Cross-Platform

Cross-Platform Mobile Development

The development of mobile applications that are compatible with multiple mobile operating systems, such as iOS and Android, from a single codebase. This approach enables developers to reach a wider audience while reducing development time and costs.

You will find this term commonly used in Software Development

Cross-Platform Software

Software designed to work on multiple computing platforms or operating systems with little or no modification. This enables developers to reach a wider audience by making their applications accessible on different devices and platforms.

You will find this term commonly used in Software Development

Cross-Site Request Forgery (CSRF)

A web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It allows an attacker to partially bypass the same-origin policy, which is designed to prevent different websites from interfering with each other.

You will find this term commonly used in Security, Web Development

Cross-Site Scripting (XSS)

A security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

You will find this term commonly used in Security, Web Development

Cross-Site Scripting (XSS) Prevention

The implementation of security measures to protect web applications from XSS attacks, where attackers inject malicious scripts into web pages viewed by other users. Prevention techniques include validating and sanitizing user input, using HTTP headers to restrict script execution, and employing Content Security Policy (CSP) to control resources the browser is allowed to load.

You will find this term commonly used in Web Development, Security

Cryptanalysis Techniques

The methods used to study cryptographic security systems with the aim of understanding how they work and finding vulnerabilities. Techniques include frequency analysis, differential cryptanalysis, and side-channel attacks, among others. Cryptanalysis is essential for evaluating the security of cryptographic algorithms.

You will find this term commonly used in Security, Cybersecurity

Cryptocurrency

A digital or virtual currency that uses cryptography for security, making it difficult to counterfeit. Cryptocurrencies leverage blockchain technology to gain decentralization, transparency, and immutability. The most famous example, Bitcoin, has paved the way for hundreds of others, each with its own functionalities and specifications.

You will find this term commonly used in Finance, Security

Cryptocurrency Exchange

A platform where individuals can buy, sell, or exchange cryptocurrencies for other digital currency or traditional currency like US dollars or Euro. These platforms play a crucial role in the cryptocurrency ecosystem by providing liquidity and enabling users to convert between different forms of value.

You will find this term commonly used in Blockchain, Finance

Cryptocurrency Governance

The mechanisms, policies, and standards established to manage and regulate the operations, transactions, and development of a cryptocurrency network. Governance in the cryptocurrency context includes decision-making processes regarding updates to the network protocol, token economics, and dispute resolution among stakeholders.

You will find this term commonly used in Blockchain, Cryptocurrency

Cryptocurrency Mining

The process by which transactions for various forms of cryptocurrency are verified and added to the blockchain digital ledger. Also known as crypto mining, this process involves compiling recent transactions into blocks and trying to solve a computationally difficult puzzle. The participant who first solves the puzzle gets to place the next block on the blockchain and claim the rewards.

You will find this term commonly used in Blockchain, Security

Cryptocurrency Mining Algorithms

Specific algorithms used in the process of validating transactions and creating new coins within a blockchain network. These algorithms solve complex mathematical problems to secure the network and verify transactions, with miners being rewarded with cryptocurrency for their efforts. Different cryptocurrencies use various algorithms, such as Proof of Work (PoW) and Proof of Stake (PoS).

You will find this term commonly used in Blockchain, Cryptocurrency

Cryptocurrency Regulation

The set of laws, guidelines, and policies established by governmental and financial authorities to govern the creation, distribution, and exchange of cryptocurrencies and blockchain technology. Regulation aims to prevent illegal activities, protect investors, and ensure the stability of the financial system while fostering innovation and growth within the cryptocurrency market.

You will find this term commonly used in Blockchain, Legal

Cryptocurrency Tax Compliance

The adherence to tax laws and regulations related to the reporting and taxation of cryptocurrency transactions. Tax compliance for cryptocurrency involves understanding the tax implications of trading, mining, and using cryptocurrencies for payments, as well as accurately reporting gains, losses, and income on tax returns.

You will find this term commonly used in Cryptocurrency, Legal

Cryptocurrency Wallet

A digital wallet that enables users to store, send, and receive cryptocurrencies. Unlike a physical wallet, a cryptocurrency wallet doesn't actually store currency but rather stores the cryptographic information needed to access and transact with the digital currency held on a blockchain.

You will find this term commonly used in Blockchain, Security

Cryptocurrency Wallet Security

Measures and technologies used to protect cryptocurrency wallets from unauthorized access and theft. This includes both physical hardware wallets and software wallets, emphasizing the importance of encryption, multi-factor authentication, and safe storage practices.

You will find this term commonly used in Blockchain, Security

Cryptoeconomics

An interdisciplinary field combining cryptography with economic theories and models to design secure and efficient decentralized networks and applications, such as cryptocurrencies and blockchain systems. Cryptoeconomics employs economic incentives, game theory, and cryptographic techniques to regulate network behavior and ensure network security.

You will find this term commonly used in Blockchain, Economics

Cryptographic Assurance

The confidence that cryptographic systems and protocols are secure and function as intended. Assurance can be achieved through rigorous testing, formal verification, and compliance with established cryptographic standards and best practices.

You will find this term commonly used in Security, Cryptography

What's Your
Career Path?
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart