IT Glossary
Key Terms To Know In The IT Industry
Error Handling
The process of responding to and managing errors in a program. It is a critical part of software development and ensures that programs can deal with unexpected issues gracefully.
You will find this term commonly used in Software Development
Error Handling in Software Testing
The process of identifying, managing, and responding to errors or exceptions that occur during the execution of software tests, aiming to ensure that software behaves gracefully under unexpected conditions.
You will find this term commonly used in Software Development, QA
Error Log
A record of critical errors encountered by the operating system, applications, or servers, used by IT professionals and developers to diagnose and troubleshoot problems.
You will find this term commonly used in IT Management, Software Development
Error Reporting
The process of detecting, collecting, and reporting errors encountered in software or hardware, to help developers or technicians diagnose and fix issues.
You will find this term commonly used in Software Development, IT Support
Escalation Management
The process within IT service management that ensures timely and efficient resolution of critical incidents and problems by escalating them to higher levels of expertise, following predefined procedures and policies.
You will find this term commonly used in IT Service Management
Escalation Policy
A procedural plan in IT service management that defines how to increase the visibility and priority of unresolved tickets or issues. It ensures that critical problems are addressed by higher levels of authority in a timely manner.
You will find this term commonly used in IT Service Management, Security
Escrow
In IT, a service that holds the source code of software in trust for the software developer and the licensee, ensuring the licensee access to the source code if the developer is unable to support the software.
You will find this term commonly used in Software Development
Escrow Service in Software
A service that holds a copy of the source code of software applications on behalf of a licensee and the licensor. In the event the licensor fails to maintain and support the software, the licensee can access the source code.
You will find this term commonly used in Software Development, Legal
Ethereum
A decentralized, open-source blockchain system that features smart contract functionality. It provides a platform for creating and executing blockchain applications, including decentralized finance (DeFi) apps.
You will find this term commonly used in Blockchain, Cryptocurrency
Ethernet
Ethernet is a standard communication protocol embedded in software and hardware devices, used for building local area networks (LANs). It facilitates data exchange by specifying how network devices format and transmit data so other devices on the same network can recognize, receive, and process it.
You will find this term commonly used in Networking
Ethernet Cable
A type of network cable used for wired networks that connects devices such as computers, routers, and switches within a local area network (LAN).
You will find this term commonly used in Networking
Ethernet Frame
A data packet defined by the IEEE Ethernet standard for local area network (LAN) technology. It contains the source and destination address, data, and a frame check sequence for error detection.
You will find this term commonly used in Networking, Data Communication
Ethernet Over HDMI (EoH)
A feature that allows HDMI cables to carry Ethernet data along with video and audio, enabling connected devices to share an internet connection without the need for separate network cables.
You will find this term commonly used in Networking, Home Entertainment
Ethernet Over Power (EoP)
Ethernet Over Power (EoP) technology allows networks to run through electrical wiring, enabling devices to connect to a network using existing power outlets. It's useful in situations where conventional network cabling is not feasible.
You will find this term commonly used in Networking
Ethernet Switch
A network switch that operates at the data link layer of the OSI model to create a network. It connects devices in a LAN and uses packet switching to receive, process, and forward data to the destination device.
You will find this term commonly used in Networking
Ethical Hacker
A security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Ethical hackers help organizations identify security vulnerabilities to prevent unauthorized access by malicious hackers.
You will find this term commonly used in Cybersecurity
Ethical Hacking
The practice of bypassing system security to identify potential data breaches and threats in a network. The purpose of ethical hacking is to improve the security of the network by fixing vulnerabilities found during testing.
You will find this term commonly used in Cybersecurity
ETL (Extract, Transform, Load)
ETL is a process in data warehousing responsible for pulling data out of the source systems and placing it into a data warehouse. ETL involves extracting data, transforming it to fit operational needs, and then loading it into the end target database or data warehouse. It's crucial in data integration strategies, ensuring data accuracy and consistency.
You will find this term commonly used in Data Management
ETL (Extract, Transform, Load) Tools
Software tools used in data warehousing that allow for the extraction of data from various sources, its transformation into a format suitable for analysis, and its loading into a final target database.
You will find this term commonly used in Data Management, Software Development
ETL Pipeline
The process of extracting data from various sources, transforming it into a format suitable for analysis, and then loading it into a final destination, such as a data warehouse. ETL stands for Extract, Transform, Load.
You will find this term commonly used in Data Management, Software Development
Event Loop
A programming construct that waits for and dispatches events or messages in a program. It's a core concept in asynchronous and event-driven programming paradigms.
You will find this term commonly used in Software Development
Event Loop Model
A programming model where operations are executed based on events, typically in non-blocking systems or applications. It allows for handling high volumes of asynchronous actions without the need for multiple threads.
You will find this term commonly used in Software Development, Asynchronous Programming
Event Management
In ITSM (IT Service Management), event management involves monitoring and managing events that occur through the IT infrastructure to ensure that normal service operation is maintained.
You will find this term commonly used in IT Service Management
Event Processing
The method of tracking and analyzing streams of information (events) about things that happen (also called event streams), and deriving a conclusion from them to process and analyze real-time data.
You will find this term commonly used in Software Development, Data Analysis
Event Sourcing
A design pattern in which changes to the state of an application are stored as a sequence of events. This allows for complex business processes to be managed, audited, and replayed.
You will find this term commonly used in Software Development, Data Management
Event Stream Processing (ESP)
The technology that enables the real-time processing of continuous streams of data from multiple sources. ESP is used in various applications, such as monitoring financial transactions, social media streams, and sensor data in IoT devices.
You will find this term commonly used in Data Processing, Real-Time Analysis
Event Viewer
A component of Microsoft's Windows OS that lets administrators and users view the event logs on a local or remote machine, providing a way to audit and review events and troubleshoot issues.
You will find this term commonly used in General IT
Event-Based Integration
A method of integrating software applications and systems where communication is triggered by events rather than by direct calls between components. This approach can enhance system scalability and responsiveness.
You will find this term commonly used in Software Development, System Integration
Event-Driven Architecture
Event-Driven Architecture (EDA) is a software design pattern in which decoupled applications can asynchronously publish and subscribe to events via an event bus. This architecture enables highly scalable, flexible systems that are responsive to real-time data changes and are often used in microservices architectures.
You will find this term commonly used in Software Development, Networking
Event-Driven Architecture (EDA)
A software architecture pattern promoting the production, detection, consumption of, and reaction to events. This architecture enables applications to be more responsive and scalable.
You will find this term commonly used in Software Development, IT Management
Event-Driven Infrastructure
An IT infrastructure setup that responds to events or changes in the environment or system. This approach allows for more dynamic and automated responses to operational activities, improving efficiency and flexibility.
You will find this term commonly used in IT Management, Software Development
Event-Driven Programming
A programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses) or messages from other programs/threads.
You will find this term commonly used in Software Development
Event-Driven Service Architecture
An architectural style that promotes the production, detection, consumption of, and reaction to events, allowing services within an architecture to communicate and function based on event triggers rather than linear sequences of processes.
You will find this term commonly used in Software Development, IT Architecture
Eventual Consistency
A consistency model used in distributed computing where updates to a distributed database may not be immediately visible to all nodes, but all nodes will eventually become consistent over time.
You will find this term commonly used in Distributed Systems, Data Management
Evolutionary Algorithm
A subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm. An evolutionary algorithm uses mechanisms inspired by biological evolution, such as reproduction, mutation, recombination, and selection.
You will find this term commonly used in AI, Machine Learning
Evolutionary Computation
A subfield of artificial intelligence (AI) involving algorithms inspired by biological evolution, such as reproduction, mutation, selection, and crossover, to solve problems.
You will find this term commonly used in AI, Machine Learning
Evolutionary Database Design
A method of database design that allows for incremental changes and evolution of the database schema over time, facilitating agile software development practices and continuous integration/deployment cycles.
You will find this term commonly used in Database Design, Agile Development
Evolutionary Software Development
A method of software development that emphasizes the gradual growth and change of software capabilities over time, rather than attempting to deliver a complete system at once. It aligns with agile methodologies.
You will find this term commonly used in Software Development, Agile Methodologies
Exabyte
An exabyte is a unit of information or computer storage equal to one quintillion bytes (or a billion gigabytes). This term is often used in the context of big data and computing to describe large volumes of data.
You will find this term commonly used in Data Management, General IT
Exabyte (EB)
A unit of information or computer storage equal to one quintillion bytes (or, in SI, 1,000^6 or 10181018 bytes). Exabytes are used to measure massive data volumes, such as in large data centers.
You will find this term commonly used in Data Management
Exabyte Computing
Computing or data storage systems capable of handling exabyte volumes of data. An exabyte equals one billion gigabytes (GB), showcasing the scale of big data and the need for advanced data management solutions.
You will find this term commonly used in Big Data, Data Management
Exabyte Storage
A measure of data storage capacity that is equal to one quintillion bytes, or 1,000 petabytes. Exabyte-scale storage is used to describe the massive volume of data generated and stored by large-scale computing applications.
You will find this term commonly used in Data Management, Hardware
Exascale Computing
Exascale computing refers to computing systems capable of at least one exaFLOPS, or a billion billion (quintillion) calculations per second. This represents a significant milestone in computing capability, enabling the processing of massive datasets and complex simulations in fields like climate research, astrophysics, and materials science.
You will find this term commonly used in General IT, High-performance Computing
Exception Handling
Exception handling in software development is the process of responding to the occurrence of exceptions – anomalous or exceptional conditions requiring special processing – during the execution of a program. It is a critical part of robust software design, allowing programs to deal with unexpected issues effectively and safely.
You will find this term commonly used in Software Development
Exception Handling in Programming
A programming language construct or mechanism designed to handle the occurrence of exceptions, which are anomalous or exceptional conditions requiring special processing during program execution.
You will find this term commonly used in Software Development
Exception Logging
The practice of recording exceptions or errors that occur during the execution of software, typically to a file or a monitoring system, to aid in debugging and improving software reliability.
You will find this term commonly used in Software Development, Debugging
Exchange Server
A mail server and calendaring server developed by Microsoft that runs exclusively on Windows Server operating systems.
You will find this term commonly used in Networking, General IT
Exclusive OR (XOR)
A digital logic gate that outputs true only when the inputs differ (one is true, the other is false). It's used in cryptography and error detection schemes to create a simple and reversible encryption mechanism.
You will find this term commonly used in Electronics, Cryptography
Execution Context
In computing, the execution context is the runtime environment that includes all the information needed for the execution of a program or process. This includes the state of the processor, memory, registers, and variables.
You will find this term commonly used in Software Development
Execution Engine
A part of software systems that are responsible for executing instructions. In the context of virtual machines, it's the component that executes the bytecode compiled from the source code.
You will find this term commonly used in Software Development
Career Path?
Kubernetes Certification: The Ultimate Certification and Career Advancement Series
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
Cisco Network Engineer Career Path
$129.00 $51.60
Web Designer Career Path
$129.00 $51.60
AWS Cloud Practitioner Career Path
$129.00 $51.60
Information Security Analyst Career Path
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60
Video Editor Career Path
$129.00 $51.60
IT Project Manager Career Path
$129.00 $51.60
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path
$99.00 $39.00
Google DevOps Engineer Career Path
$129.00 $51.60
AZ-104 Learning Path : Become an Azure Administrator
$51.60 – $169.00