IT Glossary - D - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Data Partitioning

The division of a database into distinct, independent parts to improve manageability, performance, or availability.

You will find this term commonly used in General IT, Networking

Data Pipeline

A set of data processing elements connected in series, where the output of one element is the input of the next one.

You will find this term commonly used in General IT, AI

Data Policy

Guidelines that control access to and the usage of data stored digitally.

You will find this term commonly used in Security, General IT

Data Pooling

The practice of aggregating data from different sources in order to build a larger set of data that can be analyzed or used for machine learning models.

You will find this term commonly used in AI, General IT

Data Portability

The ability to move data among different application programs, computing environments, or cloud services.

You will find this term commonly used in General IT, Security

Data Preprocessing

The techniques applied to raw data to clean and prepare it for further analysis and modeling.

You will find this term commonly used in AI, General IT

Data Privacy

The aspect of information technology that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.

You will find this term commonly used in Security, Cybersecurity

Data Profiling

The process of examining the data available from an existing information source and collecting statistics or informative summaries about that data.

You will find this term commonly used in General IT, AI

Data Proliferation

The rapid increase in the amount of data generated, which can lead to challenges in managing, storing, and analyzing data effectively.

You will find this term commonly used in General IT, AI

Data Propagation

The process of distributing or spreading data from one or more sources to one or more destinations.

You will find this term commonly used in Networking, General IT

Data Provenance

The documentation of the history of a dataset, including its origins and manipulation over time.

You will find this term commonly used in General IT, Security

Data Publication

The release of data, often in a structured format, to make it accessible for public use or scrutiny.

You will find this term commonly used in General IT, AI

Data Quality

The condition or degree of data integrity and accuracy, completeness, consistency, and reliability that meets the company or users' expectations.

You will find this term commonly used in General IT, AI

Data Quality Management (DQM)

The process of controlling the quality of data in an organization to ensure it is accurate, complete, reliable, and relevant for its intended use.

You will find this term commonly used in General IT, AI

Data Query

A request to access data from a database to extract specific information or make updates.

You will find this term commonly used in General IT

Data Rationalization

The process of streamlining data processes and resources to improve efficiency and reduce redundancy.

You will find this term commonly used in General IT, Business

Data Readiness

The state of data being prepared and primed for use in analytics, operations, or decision-making processes.

You will find this term commonly used in General IT, AI

Data Reconciliation

The process of ensuring that two sets of records or data sources are in agreement and accurate.

You will find this term commonly used in General IT, Finance

Data Recovery

The process of salvaging inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media, or files.

You will find this term commonly used in Security, General IT

Data Redaction

The process of editing or removing sensitive information from a document or record to protect privacy before it is shared or published.

You will find this term commonly used in Security, Cybersecurity

Data Reduction

The strategy of decreasing the amount of data that needs to be stored, processed, or analyzed, either by eliminating redundancy, compressing data, or selecting only the most relevant parts of the data.

You will find this term commonly used in General IT, AI

Data Redundancy

The repetition of data within a database or a storage system to ensure consistency and reliability of data.

You will find this term commonly used in General IT, Networking

Data Refinery

A process and set of tools that convert raw data into actionable insights through cleansing, enriching, and transforming data.

You will find this term commonly used in AI, General IT

Data Registry

A centralized location where metadata about data is stored and managed, often used to enhance discoverability and governance of data assets.

You will find this term commonly used in General IT, Security

Data Regulation

Laws and guidelines that govern the collection, sharing, and use of data about individuals.

You will find this term commonly used in Security, Cybersecurity

Data Relevance

The degree to which data is pertinent, connected, or applicable to a given context or action.

You will find this term commonly used in General IT, AI

Data Remediation

The process of cleaning, organizing, and correcting data in databases to improve data quality and integrity.

You will find this term commonly used in General IT, AI

Data Replication

The process of copying data from one location to another to ensure consistency between redundant resources to improve reliability, fault-tolerance, or accessibility.

You will find this term commonly used in Networking, General IT

Data Repository

A general term used to refer to a destination designated for data storage.

You will find this term commonly used in General IT, Networking

Data Residency

The physical or geographical location of an organization's data or information.

You will find this term commonly used in Security, Cybersecurity

Data Resource Management

The comprehensive set of practices, processes, and policies used to manage data effectively across an organization.

You will find this term commonly used in General IT, Business

Data Retention

The policies that govern data preservation for compliance or business reasons.

You will find this term commonly used in Security, Cybersecurity

Data Retention Policy

A policy that defines the duration for which an organization's data is to be retained and the process for disposing of data past its retention period.

You will find this term commonly used in Security, General IT

Data Rights Management

The legal and technical systems used to manage digital rights and permissions for digital media and data.

You will find this term commonly used in Security, Cybersecurity

Data Risk Management

The process of identifying, assessing, and mitigating risks associated with the storage, processing, and use of data.

You will find this term commonly used in Security, General IT

Data Rollup

The process of aggregating detailed data into summary-level data for reporting and analysis purposes.

You will find this term commonly used in General IT, AI

Data Routing

The process of determining the best path for data to travel across a network from its source to its destination.

You will find this term commonly used in Networking, General IT

Data Sanitization

The process of permanently and irreversibly removing or destroying the data stored on a memory device to ensure that it is completely unrecoverable.

You will find this term commonly used in Security, Cybersecurity

Data Schema

The structure of a database described in a formal language supported by the database management system (DBMS), including how data is organized and how the relations among them are associated.

You will find this term commonly used in General IT

Data Science

An interdisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data.

You will find this term commonly used in AI, General IT

Data Scientist

Uses statistical analysis, machine learning, and data processing techniques to extract insights from data.

You will find this term commonly used in Data Science, AI

Data Scrubbing

The process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.

You will find this term commonly used in General IT, AI

Data Security

Protecting data from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

You will find this term commonly used in Security, Cybersecurity

Data Segmentation

The process of dividing a database into distinct subsets of data for the purpose of analysis or operational use.

You will find this term commonly used in General IT, AI

Data Serialization

The process of converting a data structure into a format that can be easily stored and retrieved.

You will find this term commonly used in General IT, AI

Data Service Layer

An architectural layer that provides centralized data access, manipulation, and business logic functions to applications and systems.

You will find this term commonly used in General IT, Networking

Data Sharing

The practice of making data available to others, either within an organization or publicly, to support decision-making, research, and innovation.

You will find this term commonly used in General IT, AI

Data Silo

A repository of fixed data that remains under the control of one department and is isolated from the rest of the organization.

You will find this term commonly used in General IT, Networking

Data Slicing

A technique used in data analysis to divide data into smaller, manageable segments for detailed analysis.

You will find this term commonly used in AI, General IT

Data Smoothing

The process of using an algorithm to remove noise from a data set, allowing important patterns to stand out.

You will find this term commonly used in AI, General IT

What's Your
Career Path?
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

today Only: 1-Year For $79.00!

Get 1-year full access to every course, over 2,600 hours of focused IT training, 20,000+ practice questions at an incredible price of only $79.00

Learn CompTIA, Cisco, Microsoft, AI, Project Management & More...