IT Glossary - D - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Data Hierarchy

The systematic organization of data, often in a hierarchical form, based on a structure of data elements and their relationships.

You will find this term commonly used in General IT

Data Hygiene

The collective processes conducted to ensure the cleanliness of data.

You will find this term commonly used in General IT, AI

Data Imputation

The process of replacing missing data with substituted values in order to maintain the integrity of a dataset for analysis.

You will find this term commonly used in AI, General IT

Data Inconsistency

The presence of differing data about the same object in different places.

You will find this term commonly used in General IT, Security

Data Index

A data structure that improves the speed of data retrieval operations on a database at the cost of additional writes and storage space to maintain the structure.

You will find this term commonly used in General IT

Data Ingestion

The process of obtaining and importing data for immediate use or storage in a database.

You will find this term commonly used in General IT, AI

Data Ingestion Pipeline

The collection of processes and technologies involved in capturing, processing, and storing data for further use or analysis.

You will find this term commonly used in General IT, AI

Data Insight

The understanding and actionable information that can be derived from data analysis.

You will find this term commonly used in AI, General IT

Data Integration

The process of combining data from different sources into a single, unified view.

You will find this term commonly used in Networking, General IT

Data Integrity

The maintenance of, and the assurance of the accuracy and consistency of, data over its entire lifecycle.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Interaction

The ways in which users query, visualize, and interact with data within applications or software environments.

You will find this term commonly used in General IT, AI

Data Interchange Standard

A standard that defines a specific format for exchanging data between software applications or within an organization.

You will find this term commonly used in General IT, Networking

Data Interoperability

The ability of different systems, devices, and applications to connect and communicate in a coordinated way, share data, and use the information that has been exchanged.

You will find this term commonly used in General IT, Networking

Data Isolation

The process of keeping data separate to prevent unauthorized access or accidental sharing of sensitive information.

You will find this term commonly used in Security, Cybersecurity

Data Journalism

The practice of gathering and analyzing large datasets to support and convey news stories in a compelling and understandable manner.

You will find this term commonly used in General IT, AI

Data Lake

A storage repository that holds a vast amount of raw data in its native format until it is needed.

You will find this term commonly used in General IT, AI

Data Lake Analytics

The process of analyzing data stored in a data lake, often using big data processing tools and techniques.

You will find this term commonly used in AI, General IT

Data Lakehouse

A new data management architecture that combines the elements of data lakes and data warehouses.

You will find this term commonly used in General IT, AI

Data Leakage

The unauthorized transmission of data from within an organization to an external destination or recipient.

You will find this term commonly used in Security, Cybersecurity

Data Lifecycle

The series of stages through which data goes, from initial creation or acquisition to retirement or deletion.

You will find this term commonly used in General IT, Security

Data Lifecycle Management (DLM)

The process of managing the flow of an information system's data from creation and initial storage to the time when it becomes obsolete and is deleted.

You will find this term commonly used in General IT, Security

Data Lineage

The process of understanding, recording, and visualizing data as it flows from data sources to consumption.

You will find this term commonly used in General IT, AI

Data Literacy

The ability to read, understand, create, and communicate data as information.

You will find this term commonly used in General IT, Education

Data Loading

The process of transferring data from one system or format into another, typically into a database or data warehouse.

You will find this term commonly used in General IT

Data Localization

The practice of storing data on any device that is physically present within the borders of a specific country, which is required by law in some jurisdictions.

You will find this term commonly used in Security, Cybersecurity

Data Lock-In

The difficulty of transferring data and services from one provider or platform to another, due to proprietary formats, technologies, or contractual restrictions.

You will find this term commonly used in General IT, Security

Data Loss

The process by which data is lost to the user, either by data corruption, data erasure, or data becoming inaccessible.

You will find this term commonly used in Security, Cybersecurity

Data Loss Prevention (DLP)

A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

You will find this term commonly used in Security, Cybersecurity

Data Management Platform (DMP)

A centralized computing system for collecting, integrating, managing, and analyzing large sets of structured and unstructured data from disparate sources.

You will find this term commonly used in General IT, AI

Data Manipulation Language (DML)

The subset of SQL used to add, update, or delete data in a database.

You will find this term commonly used in General IT

Data Mapping

The process of creating data element mappings between two distinct data models.

You will find this term commonly used in General IT, AI

Data Mart

A subset of a data warehouse focused on a particular line of business, department, or subject area.

You will find this term commonly used in General IT, Networking

Data Masking

The process of hiding original data with modified content (characters or other data).

You will find this term commonly used in Security, Cybersecurity

Data Mesh

A decentralized approach to data architecture and organizational design.

You will find this term commonly used in General IT, AI

Data Migration

The process of selecting, preparing, extracting, and transforming data and permanently transferring it from one computer storage system to another.

You will find this term commonly used in General IT

Data Minimization

The principle of collecting no more personal data than necessary.

You will find this term commonly used in Security, Cybersecurity

Data Mining

The process of discovering patterns and knowledge from large amounts of data.

You will find this term commonly used in AI, General IT

Data Model

An abstract model that organizes data elements and standardizes how they relate to one another and to the properties of real-world entities.

You will find this term commonly used in General IT, AI

Data Modeling

The process of creating a data model for the data to be stored in a database.

You will find this term commonly used in General IT, AI

Data Monetization

The process of using data to increase revenue, which includes direct selling of data or using data to improve business processes and decision making.

You will find this term commonly used in General IT, Business

Data Munging

Also known as data wrangling, the process of cleaning and unifying complex and messy data sets for easy access and analysis.

You will find this term commonly used in AI, General IT

Data Normalization

The process of organizing data in a database to reduce redundancy and improve data integrity.

You will find this term commonly used in General IT

Data Obfuscation

The process of deliberately degrading data quality or intelligence in order to obscure the source of the data.

You will find this term commonly used in Security, Cybersecurity

Data Onboarding

The process of importing and processing data from external sources into a new system or environment for further analysis and use.

You will find this term commonly used in General IT, AI

Data Ontology

A framework for specifying a shared and common understanding of data which can be used between people and across application systems.

You will find this term commonly used in AI, General IT

Data Operations (DataOps)

An automated, process-oriented methodology used by analytic and data teams to improve the quality and reduce the cycle time of data analytics.

You will find this term commonly used in General IT, AI

Data Orchestration

The automated movement and management of data across an organization’s various data platforms.

You will find this term commonly used in General IT, AI

Data Ownership

The rights and responsibilities that individuals or organizations have with respect to data collected, used, stored, or disseminated.

You will find this term commonly used in Security, General IT

Data Parsing

The process of analyzing a string of symbols, either in natural language or computer languages, according to the rules of a formal grammar.

You will find this term commonly used in AI, General IT

Data Partition

The division of a database or its elements into distinct independent parts to improve manageability, performance, or availability.

You will find this term commonly used in General IT, Networking

What's Your
Career Path?
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
172 Hrs 23 Min
icons8-video-camera-58
768 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart