IT Glossary
Key Terms To Know In The IT Industry
E-commerce
E-commerce refers to the buying and selling of goods or services using the internet. It encompasses a range of online business activities for products and services and also includes the electronic transfer of funds. E-commerce has transformed retail, enabling digital transactions, and is integral to business strategy in the digital age.
You will find this term commonly used in General IT, Business
E-Government
The use of digital tools and systems by governmental bodies to provide public services, improve efficiency, and facilitate communication between government and citizens, businesses, and other branches of government.
You will find this term commonly used in Government Technology, Digital Transformation
Eavesdropping Attack
A network attack where unauthorized persons intercept private communications between two parties without their consent. Eavesdropping is commonly used to gather information that can be used for malicious purposes.
You will find this term commonly used in Cybersecurity
EC-Council (International Council of Electronic Commerce Consultants)
Offers certifications in areas of ethical hacking, penetration testing, and cybersecurity, including the Certified Ethical Hacker (CEH).
You will find this term commonly used in Cybersecurity, Ethical Hacking
EC-Council Certified Security Analyst (ECSA)
Goes beyond hacking techniques and into the analytical phase of ethical hacking, focusing on penetration testing methodology.
You will find this term commonly used in Cybersecurity, Ethical Hacking
ECC (Error Correction Code)
A method of detecting and correcting errors in data memory or transmission. It is used in various forms of digital communication and storage to ensure data integrity.
You will find this term commonly used in Security, Networking
ECC Memory (Error-Correcting Code Memory)
A type of computer data storage that can detect and correct the most common kinds of internal data corruption.
You will find this term commonly used in Hardware
Edge AI
The use of artificial intelligence algorithms processed locally on a hardware device at the edge of the network without requiring connection to a cloud or central system. It enables real-time operations including data creation, decision making, and actions.
You will find this term commonly used in AI, IoT
Edge Computing
Edge computing refers to the practice of processing data near the edge of your network, where the data is being generated, instead of in a centralized data-processing warehouse. This decentralization reduces latency and bandwidth use, making it ideal for IoT, autonomous vehicles, and other real-time applications.
You will find this term commonly used in Networking, IoT
Edge Data Management
The process of managing data that is generated and processed at the edge of the network, close to the source of data generation, to improve response times and reduce bandwidth consumption on the network.
You will find this term commonly used in Data Management, IoT
Edge Device
A device that provides an entry point into enterprise or service provider core networks. Examples include routers, routing switches, integrated access devices (IADs), and multiplexers.
You will find this term commonly used in Networking
Edge Router
An edge router is a router that interfaces with an autonomous system or network at the edge or boundary of another network. In a home network, for example, the edge router connects the internal network with the internet. In enterprise networks, these routers serve as the gateway to the wider internet or other WANs.
You will find this term commonly used in Networking
Edge Security
Security measures designed to protect the edge of the network, where an enterprise or organization connects to the outside world. This includes devices and technologies at the boundary of networks that manage data flow and protect against external threats.
You will find this term commonly used in Security, Networking
Edge Service Gateway
A network device that provides an entry point into a service provider's core network from an external network, typically offering security, routing, and translation services between different network types.
You will find this term commonly used in Networking, Security
EDI Standards (Electronic Data Interchange Standards)
Rules that define the structure and format of business documents for electronic transmission between organizations. Common standards include EDIFACT, X12, and XML.
You will find this term commonly used in Data Management, E-commerce
EF Core (Entity Framework Core)
A lightweight, extensible, open-source, and cross-platform version of Entity Framework, a popular data access technology in .NET applications.
You will find this term commonly used in Software Development
Egress Filtering
A security measure that monitors and restricts outbound traffic from one network to another to prevent unauthorized data exfiltration and ensure that outgoing traffic is legitimate.
You will find this term commonly used in Security, Networking
EIGRP (Enhanced Interior Gateway Routing Protocol)
A network protocol that lets routers exchange information more efficiently than with earlier network protocols. It is used on a router to share routes with other routers within the same autonomous system.
You will find this term commonly used in Networking
Elastic Computing
Refers to the ability of computing resources to be scaled up or down easily, usually in a cloud computing environment. It allows for the efficient management of variable workloads.
You will find this term commonly used in Cloud Computing
Elastic IP
In cloud computing, an Elastic IP address (EIP) is a static IPv4 address offered by cloud providers for dynamic cloud computing. An Elastic IP can be associated with any instance in a user's account and moved from one instance to another.
You will find this term commonly used in Cloud Computing, Networking
Elastic Load Balancing
Elastic Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. It can handle the varying load of your application traffic in a single Availability Zone or across multiple Availability Zones.
You will find this term commonly used in Cloud Computing, Networking
Elastic Search
A distributed, RESTful search and analytics engine capable of solving a growing number of use cases. It allows for efficient data indexing and search capabilities across diverse types of documents.
You will find this term commonly used in Data Management, Search Technologies
Elasticity (in Cloud Computing)
In cloud computing, elasticity refers to the ability of a system to automatically provision and deprovision computing resources to match the required workload. This concept is fundamental in cloud services, enabling them to offer on-demand resources and scalable services.
You will find this term commonly used in Cloud Computing
Elasticsearch
Elasticsearch is a search engine based on the Lucene library, providing a distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents. It is designed to handle large volumes of data and complex search requirements, widely used in log and event data analysis, real-time application monitoring, and full-text search functionalities.
You will find this term commonly used in Data Management, Analytics
Elasticsearch Query DSL
Elasticsearch Query DSL is a powerful and flexible query language used in Elasticsearch to define complex search queries. It allows for fine-tuned searches and aggregations, providing ways to query for detailed, precise patterns in data.
You will find this term commonly used in Data Management, Analytics
Electromagnetic Interference (EMI)
Disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction. It can degrade the performance of the circuit or even stop it from functioning.
You will find this term commonly used in Hardware, Electronics
Electronic Bill Presentment and Payment (EBPP)
An online system that allows customers to receive and pay bills electronically, eliminating the need for paper bills and checks.
You will find this term commonly used in E-commerce, Financial Technology
Electronic Component
A basic discrete device or physical entity in an electronic system used to affect electrons or their associated fields. Common examples include transistors, diodes, and integrated circuits.
You will find this term commonly used in Hardware, Electronics
Electronic Data Interchange (EDI)
Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper. It is used to transmit documents like invoices and purchase orders between companies.
You will find this term commonly used in Business, Data Management
Electronic Data Processing (EDP)
The use of automated methods to process digital data. This includes the collection, storage, processing, distribution, and analysis of electronic data. EDP systems are used in various sectors for efficient data handling.
You will find this term commonly used in Data Management
Electronic Design Automation (EDA)
Software tools used for designing electronic systems such as printed circuit boards and integrated circuits. EDA tools are essential for modern electronics development.
You will find this term commonly used in Software Development, Electronics
Electronic Discovery (eDiscovery)
The process by which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. eDiscovery can be carried out offline on a particular computer or in an active network environment.
You will find this term commonly used in Legal, IT Management
Electronic Funds Transfer (EFT)
The electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, through computer-based systems.
You will find this term commonly used in General IT, E-commerce
Electronic Health Records (EHR)
Digital versions of patients' paper charts. EHRs are real-time, patient-centered records that make information available instantly and securely to authorized users.
You will find this term commonly used in Healthcare IT, Data Management
Electronic Key Management System (EKMS)
A system designed to manage electronic keys that encrypt and decrypt information, ensuring that sensitive data remains secure from unauthorized access during transmission and storage.
You will find this term commonly used in Cybersecurity, Data Security
Electronic Paper Display (EPD)
A display technology designed to mimic the appearance of ordinary ink on paper. Unlike traditional displays, EPDs reflect light like paper, making them more comfortable to read over long periods and visible under direct light.
You will find this term commonly used in Hardware, Mobile Devices
Electronic Signature
A digital form of a signature that can be used to consent or approve documents and transactions electronically, carrying the same legal standing as a handwritten signature.
You will find this term commonly used in Security, General IT
Electronic Signature (E-Signature)
A digital form of a signature that can legally substitute a handwritten signature in virtually all personal or business processes, enabling the electronic signing of documents over the internet.
You will find this term commonly used in Digital Transactions, Cybersecurity
Electronic Voting System
A system that uses electronic means to aid in casting and counting votes, aiming to increase the efficiency of election processes and reduce the likelihood of errors or fraud. Often involves the use of dedicated voting machines or online voting platforms.
You will find this term commonly used in Government Technology, Security
Element
In web development, an element is an individual component of the HTML or XML document. Elements form the building blocks of both documents and applications.
You will find this term commonly used in Web Development
Element Query
In web development, a method or process of selecting specific elements from a webpage or document object model (DOM) using selectors, typically used in conjunction with JavaScript or other scripting languages.
You will find this term commonly used in Web Development
Elliptic Curve Cryptography (ECC)
A type of public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows for smaller keys compared to non-ECC cryptography (like RSA) to provide equivalent security.
You will find this term commonly used in Cryptography, Cybersecurity
A method of exchanging digital messages over the Internet. It is one of the earliest and most widely used forms of digital communication.
You will find this term commonly used in General IT
Email Archiving
The process of preserving and making searchable all emails sent and received by an individual or organization. Email archiving solutions help in data management, legal compliance, and storage management.
You will find this term commonly used in IT Management, Compliance
Email Bounce Handling
The process of managing email messages that have been returned as undeliverable to the sender. Bounce handling is essential for maintaining the health and deliverability of email marketing campaigns.
You will find this term commonly used in Digital Marketing, IT Management
Email Encryption
The process of encoding email messages to protect the content from being read by unintended recipients. Email encryption often involves encrypting both the message itself and any attachments.
You will find this term commonly used in Security, Cybersecurity
Email Filtering
The process of organizing email according to specified criteria. It can involve managing incoming emails to sort out spam, phishing attempts, or to prioritize messages based on sender, subject, or other headers.
You will find this term commonly used in Cybersecurity, Productivity
Email Gateway
A device or software used to monitor and manage the emails going in and out of an organization, often used for security purposes to filter out spam, phishing emails, and to enforce company policies regarding email content.
You will find this term commonly used in Cybersecurity, IT Management
Email Phishing
A cyber-attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need and then clicking a link or downloading an attachment.
You will find this term commonly used in Security, Cybersecurity
Email Spoofing
Email spoofing involves the creation of email messages with a forged sender address, often used in phishing and spam campaigns. This technique is used to trick recipients into thinking the message is from someone they trust, inducing them to divulge confidential information or click on malicious links.
You will find this term commonly used in Security, Cybersecurity
Career Path?
Web Designer Career Path
$129.00 $51.60
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Information Security Analyst Career Path
$129.00 $51.60
AWS Cloud Practitioner Career Path
$129.00 $51.60
Google DevOps Engineer Career Path
$129.00 $51.60
AZ-104 Learning Path : Become an Azure Administrator
$51.60 – $169.00
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
Cisco Network Engineer Career Path
$129.00 $51.60
IT Project Manager Career Path
$129.00 $51.60
Entry Level Information Security Specialist Career Path
$129.00 $51.60
Data Analyst Career Path
$129.00 $51.60
Certified Ethical Hacker Career Path
$129.00 $51.60