IT Glossary - D - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Data Partitioning

The division of a database into distinct, independent parts to improve manageability, performance, or availability.

You will find this term commonly used in General IT, Networking

Data Pipeline

A set of data processing elements connected in series, where the output of one element is the input of the next one.

You will find this term commonly used in General IT, AI

Data Policy

Guidelines that control access to and the usage of data stored digitally.

You will find this term commonly used in Security, General IT

Data Pooling

The practice of aggregating data from different sources in order to build a larger set of data that can be analyzed or used for machine learning models.

You will find this term commonly used in AI, General IT

Data Portability

The ability to move data among different application programs, computing environments, or cloud services.

You will find this term commonly used in General IT, Security

Data Preprocessing

The techniques applied to raw data to clean and prepare it for further analysis and modeling.

You will find this term commonly used in AI, General IT

Data Privacy

The aspect of information technology that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.

You will find this term commonly used in Security, Cybersecurity

Data Profiling

The process of examining the data available from an existing information source and collecting statistics or informative summaries about that data.

You will find this term commonly used in General IT, AI

Data Proliferation

The rapid increase in the amount of data generated, which can lead to challenges in managing, storing, and analyzing data effectively.

You will find this term commonly used in General IT, AI

Data Propagation

The process of distributing or spreading data from one or more sources to one or more destinations.

You will find this term commonly used in Networking, General IT

Data Provenance

The documentation of the history of a dataset, including its origins and manipulation over time.

You will find this term commonly used in General IT, Security

Data Publication

The release of data, often in a structured format, to make it accessible for public use or scrutiny.

You will find this term commonly used in General IT, AI

Data Quality

The condition or degree of data integrity and accuracy, completeness, consistency, and reliability that meets the company or users' expectations.

You will find this term commonly used in General IT, AI

Data Quality Management (DQM)

The process of controlling the quality of data in an organization to ensure it is accurate, complete, reliable, and relevant for its intended use.

You will find this term commonly used in General IT, AI

Data Query

A request to access data from a database to extract specific information or make updates.

You will find this term commonly used in General IT

Data Rationalization

The process of streamlining data processes and resources to improve efficiency and reduce redundancy.

You will find this term commonly used in General IT, Business

Data Readiness

The state of data being prepared and primed for use in analytics, operations, or decision-making processes.

You will find this term commonly used in General IT, AI

Data Reconciliation

The process of ensuring that two sets of records or data sources are in agreement and accurate.

You will find this term commonly used in General IT, Finance

Data Recovery

The process of salvaging inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media, or files.

You will find this term commonly used in Security, General IT

Data Redaction

The process of editing or removing sensitive information from a document or record to protect privacy before it is shared or published.

You will find this term commonly used in Security, Cybersecurity

Data Reduction

The strategy of decreasing the amount of data that needs to be stored, processed, or analyzed, either by eliminating redundancy, compressing data, or selecting only the most relevant parts of the data.

You will find this term commonly used in General IT, AI

Data Redundancy

The repetition of data within a database or a storage system to ensure consistency and reliability of data.

You will find this term commonly used in General IT, Networking

Data Refinery

A process and set of tools that convert raw data into actionable insights through cleansing, enriching, and transforming data.

You will find this term commonly used in AI, General IT

Data Registry

A centralized location where metadata about data is stored and managed, often used to enhance discoverability and governance of data assets.

You will find this term commonly used in General IT, Security

Data Regulation

Laws and guidelines that govern the collection, sharing, and use of data about individuals.

You will find this term commonly used in Security, Cybersecurity

Data Relevance

The degree to which data is pertinent, connected, or applicable to a given context or action.

You will find this term commonly used in General IT, AI

Data Remediation

The process of cleaning, organizing, and correcting data in databases to improve data quality and integrity.

You will find this term commonly used in General IT, AI

Data Replication

The process of copying data from one location to another to ensure consistency between redundant resources to improve reliability, fault-tolerance, or accessibility.

You will find this term commonly used in Networking, General IT

Data Repository

A general term used to refer to a destination designated for data storage.

You will find this term commonly used in General IT, Networking

Data Residency

The physical or geographical location of an organization's data or information.

You will find this term commonly used in Security, Cybersecurity

Data Resource Management

The comprehensive set of practices, processes, and policies used to manage data effectively across an organization.

You will find this term commonly used in General IT, Business

Data Retention

The policies that govern data preservation for compliance or business reasons.

You will find this term commonly used in Security, Cybersecurity

Data Retention Policy

A policy that defines the duration for which an organization's data is to be retained and the process for disposing of data past its retention period.

You will find this term commonly used in Security, General IT

Data Rights Management

The legal and technical systems used to manage digital rights and permissions for digital media and data.

You will find this term commonly used in Security, Cybersecurity

Data Risk Management

The process of identifying, assessing, and mitigating risks associated with the storage, processing, and use of data.

You will find this term commonly used in Security, General IT

Data Rollup

The process of aggregating detailed data into summary-level data for reporting and analysis purposes.

You will find this term commonly used in General IT, AI

Data Routing

The process of determining the best path for data to travel across a network from its source to its destination.

You will find this term commonly used in Networking, General IT

Data Sanitization

The process of permanently and irreversibly removing or destroying the data stored on a memory device to ensure that it is completely unrecoverable.

You will find this term commonly used in Security, Cybersecurity

Data Schema

The structure of a database described in a formal language supported by the database management system (DBMS), including how data is organized and how the relations among them are associated.

You will find this term commonly used in General IT

Data Science

An interdisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data.

You will find this term commonly used in AI, General IT

Data Scientist

Uses statistical analysis, machine learning, and data processing techniques to extract insights from data.

You will find this term commonly used in Data Science, AI

Data Scrubbing

The process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.

You will find this term commonly used in General IT, AI

Data Security

Protecting data from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

You will find this term commonly used in Security, Cybersecurity

Data Segmentation

The process of dividing a database into distinct subsets of data for the purpose of analysis or operational use.

You will find this term commonly used in General IT, AI

Data Serialization

The process of converting a data structure into a format that can be easily stored and retrieved.

You will find this term commonly used in General IT, AI

Data Service Layer

An architectural layer that provides centralized data access, manipulation, and business logic functions to applications and systems.

You will find this term commonly used in General IT, Networking

Data Sharing

The practice of making data available to others, either within an organization or publicly, to support decision-making, research, and innovation.

You will find this term commonly used in General IT, AI

Data Silo

A repository of fixed data that remains under the control of one department and is isolated from the rest of the organization.

You will find this term commonly used in General IT, Networking

Data Slicing

A technique used in data analysis to divide data into smaller, manageable segments for detailed analysis.

You will find this term commonly used in AI, General IT

Data Smoothing

The process of using an algorithm to remove noise from a data set, allowing important patterns to stand out.

You will find this term commonly used in AI, General IT

What's Your
Career Path?
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart