IT Glossary - E - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Error Handling

The process of responding to and managing errors in a program. It is a critical part of software development and ensures that programs can deal with unexpected issues gracefully.

You will find this term commonly used in Software Development

Error Handling in Software Testing

The process of identifying, managing, and responding to errors or exceptions that occur during the execution of software tests, aiming to ensure that software behaves gracefully under unexpected conditions.

You will find this term commonly used in Software Development, QA

Error Log

A record of critical errors encountered by the operating system, applications, or servers, used by IT professionals and developers to diagnose and troubleshoot problems.

You will find this term commonly used in IT Management, Software Development

Error Reporting

The process of detecting, collecting, and reporting errors encountered in software or hardware, to help developers or technicians diagnose and fix issues.

You will find this term commonly used in Software Development, IT Support

Escalation Management

The process within IT service management that ensures timely and efficient resolution of critical incidents and problems by escalating them to higher levels of expertise, following predefined procedures and policies.

You will find this term commonly used in IT Service Management

Escalation Policy

A procedural plan in IT service management that defines how to increase the visibility and priority of unresolved tickets or issues. It ensures that critical problems are addressed by higher levels of authority in a timely manner.

You will find this term commonly used in IT Service Management, Security

Escrow

In IT, a service that holds the source code of software in trust for the software developer and the licensee, ensuring the licensee access to the source code if the developer is unable to support the software.

You will find this term commonly used in Software Development

Escrow Service in Software

A service that holds a copy of the source code of software applications on behalf of a licensee and the licensor. In the event the licensor fails to maintain and support the software, the licensee can access the source code.

You will find this term commonly used in Software Development, Legal

Ethereum

A decentralized, open-source blockchain system that features smart contract functionality. It provides a platform for creating and executing blockchain applications, including decentralized finance (DeFi) apps.

You will find this term commonly used in Blockchain, Cryptocurrency

Ethernet

Ethernet is a standard communication protocol embedded in software and hardware devices, used for building local area networks (LANs). It facilitates data exchange by specifying how network devices format and transmit data so other devices on the same network can recognize, receive, and process it.

You will find this term commonly used in Networking

Ethernet Cable

A type of network cable used for wired networks that connects devices such as computers, routers, and switches within a local area network (LAN).

You will find this term commonly used in Networking

Ethernet Frame

A data packet defined by the IEEE Ethernet standard for local area network (LAN) technology. It contains the source and destination address, data, and a frame check sequence for error detection.

You will find this term commonly used in Networking, Data Communication

Ethernet Over HDMI (EoH)

A feature that allows HDMI cables to carry Ethernet data along with video and audio, enabling connected devices to share an internet connection without the need for separate network cables.

You will find this term commonly used in Networking, Home Entertainment

Ethernet Over Power (EoP)

Ethernet Over Power (EoP) technology allows networks to run through electrical wiring, enabling devices to connect to a network using existing power outlets. It's useful in situations where conventional network cabling is not feasible.

You will find this term commonly used in Networking

Ethernet Switch

A network switch that operates at the data link layer of the OSI model to create a network. It connects devices in a LAN and uses packet switching to receive, process, and forward data to the destination device.

You will find this term commonly used in Networking

Ethical Hacker

A security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Ethical hackers help organizations identify security vulnerabilities to prevent unauthorized access by malicious hackers.

You will find this term commonly used in Cybersecurity

Ethical Hacking

The practice of bypassing system security to identify potential data breaches and threats in a network. The purpose of ethical hacking is to improve the security of the network by fixing vulnerabilities found during testing.

You will find this term commonly used in Cybersecurity

ETL (Extract, Transform, Load)

ETL is a process in data warehousing responsible for pulling data out of the source systems and placing it into a data warehouse. ETL involves extracting data, transforming it to fit operational needs, and then loading it into the end target database or data warehouse. It's crucial in data integration strategies, ensuring data accuracy and consistency.

You will find this term commonly used in Data Management

ETL (Extract, Transform, Load) Tools

Software tools used in data warehousing that allow for the extraction of data from various sources, its transformation into a format suitable for analysis, and its loading into a final target database.

You will find this term commonly used in Data Management, Software Development

ETL Pipeline

The process of extracting data from various sources, transforming it into a format suitable for analysis, and then loading it into a final destination, such as a data warehouse. ETL stands for Extract, Transform, Load.

You will find this term commonly used in Data Management, Software Development

Event Loop

A programming construct that waits for and dispatches events or messages in a program. It's a core concept in asynchronous and event-driven programming paradigms.

You will find this term commonly used in Software Development

Event Loop Model

A programming model where operations are executed based on events, typically in non-blocking systems or applications. It allows for handling high volumes of asynchronous actions without the need for multiple threads.

You will find this term commonly used in Software Development, Asynchronous Programming

Event Management

In ITSM (IT Service Management), event management involves monitoring and managing events that occur through the IT infrastructure to ensure that normal service operation is maintained.

You will find this term commonly used in IT Service Management

Event Processing

The method of tracking and analyzing streams of information (events) about things that happen (also called event streams), and deriving a conclusion from them to process and analyze real-time data.

You will find this term commonly used in Software Development, Data Analysis

Event Sourcing

A design pattern in which changes to the state of an application are stored as a sequence of events. This allows for complex business processes to be managed, audited, and replayed.

You will find this term commonly used in Software Development, Data Management

Event Stream Processing (ESP)

The technology that enables the real-time processing of continuous streams of data from multiple sources. ESP is used in various applications, such as monitoring financial transactions, social media streams, and sensor data in IoT devices.

You will find this term commonly used in Data Processing, Real-Time Analysis

Event Viewer

A component of Microsoft's Windows OS that lets administrators and users view the event logs on a local or remote machine, providing a way to audit and review events and troubleshoot issues.

You will find this term commonly used in General IT

Event-Based Integration

A method of integrating software applications and systems where communication is triggered by events rather than by direct calls between components. This approach can enhance system scalability and responsiveness.

You will find this term commonly used in Software Development, System Integration

Event-Driven Architecture

Event-Driven Architecture (EDA) is a software design pattern in which decoupled applications can asynchronously publish and subscribe to events via an event bus. This architecture enables highly scalable, flexible systems that are responsive to real-time data changes and are often used in microservices architectures.

You will find this term commonly used in Software Development, Networking

Event-Driven Architecture (EDA)

A software architecture pattern promoting the production, detection, consumption of, and reaction to events. This architecture enables applications to be more responsive and scalable.

You will find this term commonly used in Software Development, IT Management

Event-Driven Infrastructure

An IT infrastructure setup that responds to events or changes in the environment or system. This approach allows for more dynamic and automated responses to operational activities, improving efficiency and flexibility.

You will find this term commonly used in IT Management, Software Development

Event-Driven Programming

A programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses) or messages from other programs/threads.

You will find this term commonly used in Software Development

Event-Driven Service Architecture

An architectural style that promotes the production, detection, consumption of, and reaction to events, allowing services within an architecture to communicate and function based on event triggers rather than linear sequences of processes.

You will find this term commonly used in Software Development, IT Architecture

Eventual Consistency

A consistency model used in distributed computing where updates to a distributed database may not be immediately visible to all nodes, but all nodes will eventually become consistent over time.

You will find this term commonly used in Distributed Systems, Data Management

Evolutionary Algorithm

A subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm. An evolutionary algorithm uses mechanisms inspired by biological evolution, such as reproduction, mutation, recombination, and selection.

You will find this term commonly used in AI, Machine Learning

Evolutionary Computation

A subfield of artificial intelligence (AI) involving algorithms inspired by biological evolution, such as reproduction, mutation, selection, and crossover, to solve problems.

You will find this term commonly used in AI, Machine Learning

Evolutionary Database Design

A method of database design that allows for incremental changes and evolution of the database schema over time, facilitating agile software development practices and continuous integration/deployment cycles.

You will find this term commonly used in Database Design, Agile Development

Evolutionary Software Development

A method of software development that emphasizes the gradual growth and change of software capabilities over time, rather than attempting to deliver a complete system at once. It aligns with agile methodologies.

You will find this term commonly used in Software Development, Agile Methodologies

Exabyte

An exabyte is a unit of information or computer storage equal to one quintillion bytes (or a billion gigabytes). This term is often used in the context of big data and computing to describe large volumes of data.

You will find this term commonly used in Data Management, General IT

Exabyte (EB)

A unit of information or computer storage equal to one quintillion bytes (or, in SI, 1,000^6 or 10181018 bytes). Exabytes are used to measure massive data volumes, such as in large data centers.

You will find this term commonly used in Data Management

Exabyte Computing

Computing or data storage systems capable of handling exabyte volumes of data. An exabyte equals one billion gigabytes (GB), showcasing the scale of big data and the need for advanced data management solutions.

You will find this term commonly used in Big Data, Data Management

Exabyte Storage

A measure of data storage capacity that is equal to one quintillion bytes, or 1,000 petabytes. Exabyte-scale storage is used to describe the massive volume of data generated and stored by large-scale computing applications.

You will find this term commonly used in Data Management, Hardware

Exascale Computing

Exascale computing refers to computing systems capable of at least one exaFLOPS, or a billion billion (quintillion) calculations per second. This represents a significant milestone in computing capability, enabling the processing of massive datasets and complex simulations in fields like climate research, astrophysics, and materials science.

You will find this term commonly used in General IT, High-performance Computing

Exception Handling

Exception handling in software development is the process of responding to the occurrence of exceptions – anomalous or exceptional conditions requiring special processing – during the execution of a program. It is a critical part of robust software design, allowing programs to deal with unexpected issues effectively and safely.

You will find this term commonly used in Software Development

Exception Handling in Programming

A programming language construct or mechanism designed to handle the occurrence of exceptions, which are anomalous or exceptional conditions requiring special processing during program execution.

You will find this term commonly used in Software Development

Exception Logging

The practice of recording exceptions or errors that occur during the execution of software, typically to a file or a monitoring system, to aid in debugging and improving software reliability.

You will find this term commonly used in Software Development, Debugging

Exchange Server

A mail server and calendaring server developed by Microsoft that runs exclusively on Windows Server operating systems.

You will find this term commonly used in Networking, General IT

Exclusive OR (XOR)

A digital logic gate that outputs true only when the inputs differ (one is true, the other is false). It's used in cryptography and error detection schemes to create a simple and reversible encryption mechanism.

You will find this term commonly used in Electronics, Cryptography

Execution Context

In computing, the execution context is the runtime environment that includes all the information needed for the execution of a program or process. This includes the state of the processor, memory, registers, and variables.

You will find this term commonly used in Software Development

Execution Engine

A part of software systems that are responsible for executing instructions. In the context of virtual machines, it's the component that executes the bytecode compiled from the source code.

You will find this term commonly used in Software Development

What's Your
Career Path?
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00