IT Glossary - D - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Data Hierarchy

The systematic organization of data, often in a hierarchical form, based on a structure of data elements and their relationships.

You will find this term commonly used in General IT

Data Hygiene

The collective processes conducted to ensure the cleanliness of data.

You will find this term commonly used in General IT, AI

Data Imputation

The process of replacing missing data with substituted values in order to maintain the integrity of a dataset for analysis.

You will find this term commonly used in AI, General IT

Data Inconsistency

The presence of differing data about the same object in different places.

You will find this term commonly used in General IT, Security

Data Index

A data structure that improves the speed of data retrieval operations on a database at the cost of additional writes and storage space to maintain the structure.

You will find this term commonly used in General IT

Data Ingestion

The process of obtaining and importing data for immediate use or storage in a database.

You will find this term commonly used in General IT, AI

Data Ingestion Pipeline

The collection of processes and technologies involved in capturing, processing, and storing data for further use or analysis.

You will find this term commonly used in General IT, AI

Data Insight

The understanding and actionable information that can be derived from data analysis.

You will find this term commonly used in AI, General IT

Data Integration

The process of combining data from different sources into a single, unified view.

You will find this term commonly used in Networking, General IT

Data Integrity

The maintenance of, and the assurance of the accuracy and consistency of, data over its entire lifecycle.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Interaction

The ways in which users query, visualize, and interact with data within applications or software environments.

You will find this term commonly used in General IT, AI

Data Interchange Standard

A standard that defines a specific format for exchanging data between software applications or within an organization.

You will find this term commonly used in General IT, Networking

Data Interoperability

The ability of different systems, devices, and applications to connect and communicate in a coordinated way, share data, and use the information that has been exchanged.

You will find this term commonly used in General IT, Networking

Data Isolation

The process of keeping data separate to prevent unauthorized access or accidental sharing of sensitive information.

You will find this term commonly used in Security, Cybersecurity

Data Journalism

The practice of gathering and analyzing large datasets to support and convey news stories in a compelling and understandable manner.

You will find this term commonly used in General IT, AI

Data Lake

A storage repository that holds a vast amount of raw data in its native format until it is needed.

You will find this term commonly used in General IT, AI

Data Lake Analytics

The process of analyzing data stored in a data lake, often using big data processing tools and techniques.

You will find this term commonly used in AI, General IT

Data Lakehouse

A new data management architecture that combines the elements of data lakes and data warehouses.

You will find this term commonly used in General IT, AI

Data Leakage

The unauthorized transmission of data from within an organization to an external destination or recipient.

You will find this term commonly used in Security, Cybersecurity

Data Lifecycle

The series of stages through which data goes, from initial creation or acquisition to retirement or deletion.

You will find this term commonly used in General IT, Security

Data Lifecycle Management (DLM)

The process of managing the flow of an information system's data from creation and initial storage to the time when it becomes obsolete and is deleted.

You will find this term commonly used in General IT, Security

Data Lineage

The process of understanding, recording, and visualizing data as it flows from data sources to consumption.

You will find this term commonly used in General IT, AI

Data Literacy

The ability to read, understand, create, and communicate data as information.

You will find this term commonly used in General IT, Education

Data Loading

The process of transferring data from one system or format into another, typically into a database or data warehouse.

You will find this term commonly used in General IT

Data Localization

The practice of storing data on any device that is physically present within the borders of a specific country, which is required by law in some jurisdictions.

You will find this term commonly used in Security, Cybersecurity

Data Lock-In

The difficulty of transferring data and services from one provider or platform to another, due to proprietary formats, technologies, or contractual restrictions.

You will find this term commonly used in General IT, Security

Data Loss

The process by which data is lost to the user, either by data corruption, data erasure, or data becoming inaccessible.

You will find this term commonly used in Security, Cybersecurity

Data Loss Prevention (DLP)

A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

You will find this term commonly used in Security, Cybersecurity

Data Management Platform (DMP)

A centralized computing system for collecting, integrating, managing, and analyzing large sets of structured and unstructured data from disparate sources.

You will find this term commonly used in General IT, AI

Data Manipulation Language (DML)

The subset of SQL used to add, update, or delete data in a database.

You will find this term commonly used in General IT

Data Mapping

The process of creating data element mappings between two distinct data models.

You will find this term commonly used in General IT, AI

Data Mart

A subset of a data warehouse focused on a particular line of business, department, or subject area.

You will find this term commonly used in General IT, Networking

Data Masking

The process of hiding original data with modified content (characters or other data).

You will find this term commonly used in Security, Cybersecurity

Data Mesh

A decentralized approach to data architecture and organizational design.

You will find this term commonly used in General IT, AI

Data Migration

The process of selecting, preparing, extracting, and transforming data and permanently transferring it from one computer storage system to another.

You will find this term commonly used in General IT

Data Minimization

The principle of collecting no more personal data than necessary.

You will find this term commonly used in Security, Cybersecurity

Data Mining

The process of discovering patterns and knowledge from large amounts of data.

You will find this term commonly used in AI, General IT

Data Model

An abstract model that organizes data elements and standardizes how they relate to one another and to the properties of real-world entities.

You will find this term commonly used in General IT, AI

Data Modeling

The process of creating a data model for the data to be stored in a database.

You will find this term commonly used in General IT, AI

Data Monetization

The process of using data to increase revenue, which includes direct selling of data or using data to improve business processes and decision making.

You will find this term commonly used in General IT, Business

Data Munging

Also known as data wrangling, the process of cleaning and unifying complex and messy data sets for easy access and analysis.

You will find this term commonly used in AI, General IT

Data Normalization

The process of organizing data in a database to reduce redundancy and improve data integrity.

You will find this term commonly used in General IT

Data Obfuscation

The process of deliberately degrading data quality or intelligence in order to obscure the source of the data.

You will find this term commonly used in Security, Cybersecurity

Data Onboarding

The process of importing and processing data from external sources into a new system or environment for further analysis and use.

You will find this term commonly used in General IT, AI

Data Ontology

A framework for specifying a shared and common understanding of data which can be used between people and across application systems.

You will find this term commonly used in AI, General IT

Data Operations (DataOps)

An automated, process-oriented methodology used by analytic and data teams to improve the quality and reduce the cycle time of data analytics.

You will find this term commonly used in General IT, AI

Data Orchestration

The automated movement and management of data across an organization’s various data platforms.

You will find this term commonly used in General IT, AI

Data Ownership

The rights and responsibilities that individuals or organizations have with respect to data collected, used, stored, or disseminated.

You will find this term commonly used in Security, General IT

Data Parsing

The process of analyzing a string of symbols, either in natural language or computer languages, according to the rules of a formal grammar.

You will find this term commonly used in AI, General IT

Data Partition

The division of a database or its elements into distinct independent parts to improve manageability, performance, or availability.

You will find this term commonly used in General IT, Networking

What's Your
Career Path?
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart