IT Glossary - D - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Data Snapshot

A read-only copy of a set of data as it appeared at a particular point in time, often used for backup or analysis purposes.

You will find this term commonly used in General IT, Security

Data Sourcing

The process of finding and acquiring data from various sources, often for the purpose of data analysis or to support decision-making processes.

You will find this term commonly used in General IT, AI

Data Sovereignty

The concept that digital data is subject to the laws of the country in which it is located or stored.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Sparsity

The condition in which a dataset is largely filled with zeros or null values, indicating a lack of data in many dimensions or records.

You will find this term commonly used in AI, General IT

Data Standardization

The process of bringing data into a common format to enable users to process and analyze it.

You will find this term commonly used in General IT, AI

Data Steward

A role within an organization responsible for utilizing an organization's data governance processes to ensure fitness of data elements - both the content and metadata.

You will find this term commonly used in General IT, Security

Data Stewardship

The management and oversight of an organization's data assets to provide business users with high-quality data that is easily accessible in a consistent manner.

You will find this term commonly used in General IT, Security

Data Streaming

The technology used to deliver content to computers and mobile devices over the internet in a continuous flow, allowing users to access data while it's being delivered.

You will find this term commonly used in Networking, General IT

Data Structure

A particular way of organizing and storing data in a computer so that it can be accessed and modified efficiently.

You will find this term commonly used in General IT, AI

Data Subsetting

The process of creating a smaller, focused dataset from a larger dataset for specific analysis or testing purposes.

You will find this term commonly used in AI, General IT

Data Suppression

The practice of omitting sensitive information from data sets or outputs to protect individual privacy or proprietary information.

You will find this term commonly used in Security, Cybersecurity

Data Synchronization

The process of establishing consistency among data from a source to a target data storage and vice versa and continuous harmonization of the data over time.

You will find this term commonly used in Networking, General IT

Data Synergy

The combined effect achieved when data from different sources and of different types are integrated and analyzed together, producing insights or results greater than the sum of their parts.

You will find this term commonly used in AI, General IT

Data System Integration

The process of linking together different computing systems and software applications physically or functionally, to act as a coordinated whole.

You will find this term commonly used in General IT, Networking

Data Table

A structured format for organizing and displaying data in rows and columns, making it easier to understand and analyze.

You will find this term commonly used in General IT

Data Tagging

The process of assigning labels or tags to data elements, which helps in organizing and finding data during analysis.

You will find this term commonly used in AI, General IT

Data Taxonomy

A classification system for organizing data into categories and subcategories, making it easier to retrieve, manage, and analyze.

You will find this term commonly used in General IT, AI

Data Telemetry

The automated process of collecting data from remote or inaccessible points and transmitting it to receiving equipment for monitoring, analysis, or remote control.

You will find this term commonly used in Networking, General IT

Data Template

A pre-defined structure or format for data that specifies how data should be organized, formatted, and presented.

You will find this term commonly used in General IT

Data Thinning

The process of reducing the volume of data by selectively removing less significant data points to make analysis more manageable and less resource-intensive.

You will find this term commonly used in AI, General IT

Data Throughput

The rate at which data is successfully transmitted from one location to another over a given period of time.

You will find this term commonly used in Networking, General IT

Data Tier

In a multi-tiered architecture, the layer that handles data storage, retrieval, and management, separate from the business logic or presentation layers.

You will find this term commonly used in General IT, Networking

Data Tokenization

The process of substituting sensitive data elements with non-sensitive equivalents, known as tokens, that have no extrinsic or exploitable meaning or value.

You will find this term commonly used in Security, Cybersecurity

Data Topology

The arrangement or mapping of data within a dataset or across datasets, which includes the relationships and structures formed by these data elements.

You will find this term commonly used in AI, General IT

Data Traceability

The ability to chronologically interrelate the uniquely identifiable entities in a way that is verifiable.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Tracking

The process of collecting data about user behavior, system performance, or other activities, to analyze trends, performance, or compliance.

You will find this term commonly used in General IT, Security

Data Transformation

The process of converting data from one format or structure into another.

You will find this term commonly used in General IT, AI

Data Transliteration

Converting text from one script to another in a way that the text remains phonetically the same, often used in data processing to standardize datasets.

You will find this term commonly used in General IT, AI

Data Transmittal

The process of transferring data between different hardware or software systems.

You will find this term commonly used in Networking, General IT

Data Transparency

The extent to which data, data collection processes, and data use are open and transparent to users, often related to privacy policies and practices.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Transport

The movement of data across networks or between devices, systems, or platforms, often involving protocols and standards for efficient and secure transfer.

You will find this term commonly used in Networking, General IT

Data Type

A classification identifying one of various types of data, such as integer, floating-point, or string, that determines the possible values for that type.

You will find this term commonly used in General IT, AI

Data Typology

The study and classification of different types of data, based on their characteristics, uses, and handling requirements.

You will find this term commonly used in AI, General IT

Data Unification

The process of integrating multiple data sources and formats into a single, cohesive dataset with a uniform format, often to support comprehensive analysis or reporting.

You will find this term commonly used in AI, General IT

Data Validation

The process of ensuring that a program operates on clean, correct and useful data.

You will find this term commonly used in General IT, Security

Data Value Chain

The series of activities needed to transform raw data into valuable insights or products, including data collection, storage, analysis, and dissemination.

You will find this term commonly used in General IT, Business

Data Variability

The extent to which data points in a dataset differ from each other, which can affect analysis outcomes and insights.

You will find this term commonly used in AI, General IT

Data Variant

A version of a dataset or data element that has been altered or modified in some way, often for testing or analysis purposes.

You will find this term commonly used in General IT, AI

Data Vault

A secure repository for storing and managing sensitive data, especially for compliance and protection against data breaches.

You will find this term commonly used in Security, Cybersecurity

Data Vectorization

The process of converting data into a vector format, where each item of data is represented as a point in a space of multiple dimensions, often used in machine learning and data analysis.

You will find this term commonly used in AI, General IT

Data Veracity

The degree to which data is accurate, precise, and trusted, affecting its reliability for making decisions or insights.

You will find this term commonly used in General IT, AI

Data Verification

The process of checking that data is accurate and consistent with the original source or with what was expected.

You will find this term commonly used in Security, General IT

Data Versioning

The practice of keeping multiple versions of datasets or data elements to track changes over time, often for purposes of analysis, testing, or historical reference.

You will find this term commonly used in General IT, AI

Data Virtualization

The process of integrating data from disparate sources, locations, and formats to create a single stream of data without replicating it.

You will find this term commonly used in Networking, General IT

Data Visibility

The degree to which data and data processes are accessible and understandable to stakeholders, often related to governance and transparency.

You will find this term commonly used in General IT, Business

Data Visualization

The graphical representation of information and data.

You will find this term commonly used in General IT, AI

Data Visualization Specialist

Creates graphical representations of data to help end users understand complex information more easily.

You will find this term commonly used in Data Science, Visualization

Data Volume

The quantity of data generated or processed, often discussed in the context of big data challenges and storage capacities.

You will find this term commonly used in General IT, AI

Data Vortex

A complex, potentially chaotic data environment where data from various sources is constantly moving and changing, making it difficult to manage or analyze.

You will find this term commonly used in AI, General IT

Data Vulnerability

The susceptibility of data to unauthorized access, breaches, or other forms of exposure that compromise privacy or security.

You will find this term commonly used in Security, Cybersecurity

What's Your
Career Path?
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
172 Hrs 23 Min
icons8-video-camera-58
768 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart