IT Glossary - F - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Feature Branch

A branching model used in version control where a developer creates a branch for a specific feature or task to keep it separate from the main codebase until it is ready to be merged. This practice facilitates isolated development and easier code review.

You will find this term commonly used in Software Development

Feature Branch Workflow

A version control strategy where developers create branches for each new feature or fix before merging them back into the main branch upon completion. This workflow facilitates parallel development while minimizing conflicts in the codebase.

You will find this term commonly used in Software Development

Feature Creep

The tendency for product or project requirements to increase during development beyond those originally foreseen, often leading to delays and budget overruns. It can result from both external demands and internal desires to add more features to the product.

You will find this term commonly used in Software Development, Management

Feature Detection

In web development, a technique for determining whether a browser supports a particular feature, allowing developers to tailor experiences based on the capabilities of the user's browser. In machine learning, it refers to identifying features in data that are relevant to a task.

You will find this term commonly used in Software Development, AI

Feature Encoding

The process of converting categorical data into numerical form so that it can be provided to machine learning models for training.

You will find this term commonly used in AI, Machine Learning

Feature Engineering

The process of selecting, modifying, and creating new features from raw data to improve the performance of machine learning models.

You will find this term commonly used in AI, Machine Learning

Feature Extraction

In machine learning and pattern recognition, the process of transforming raw data into a set of features that can be effectively used in a predictive model. It is a critical step in the preprocessing of data for machine learning algorithms.

You will find this term commonly used in AI, Machine Learning

Feature Flag

A technique in software development that involves incorporating a toggle, or a flag, to enable or disable feature functionality without deploying new code. This allows developers to test new features and roll them out gradually.

You will find this term commonly used in Software Development

Feature Phone

A class of mobile phones that retains the form factor of earlier-generation phones, with physical buttons and a basic display, but with extra features such as a camera and internet capabilities.

You will find this term commonly used in General IT, Mobile Technology

Feature Toggle

A technique in software development that allows developers to enable or disable features without changing the code. This is useful for A/B testing, canary releases, or gradually rolling out features to users.

You will find this term commonly used in Software Development

FEC (Forward Error Correction)

A system of error control for data transmission, whereby the sender adds redundant data to its messages. This allows the receiver to detect and correct errors (within some limit) without the need to ask the sender for additional data.

You will find this term commonly used in Networking

Federated Analytics

An approach to data analysis that allows for the aggregation of insights from distributed datasets without moving the data itself, preserving privacy and security.

You will find this term commonly used in Data Science, Privacy

Federated Cloud

A model of cloud computing where multiple cloud services are accessible through a common platform, enabling interoperability and data portability across different cloud providers. Federated clouds facilitate the integration and management of services across diverse cloud environments.

You will find this term commonly used in Cloud Computing

Federated Database

A type of virtual database management system that allows users to access and manipulate data from multiple databases as if it were a single database. This approach can simplify querying and transactions across diverse data sources.

You will find this term commonly used in Databases, Data Management

Federated Identity Management

A system of governance and management of multiple identity verification and authentication systems across organizational and technological boundaries. It enables users to access services across different domains with a single identity.

You will find this term commonly used in Security, Cloud Computing

Federated Learning

A machine learning approach that trains an algorithm across multiple decentralized devices or servers holding local data samples, without exchanging them. This approach is beneficial for privacy preservation and reducing the need for data transfer.

You will find this term commonly used in AI, Privacy

Federated Query

A type of database query that can access and return data from multiple databases or sources as if they were a single entity.

You will find this term commonly used in Data Management, Database Design

Federated Search

The ability to search for information across multiple databases or systems from a single query interface.

You will find this term commonly used in General IT, Data Management

Federated Search Architecture

An information retrieval technology that allows the simultaneous search of multiple searchable resources from a single query interface.

You will find this term commonly used in Data Management, Web Technologies

Federation (in IT)

The act of linking together several separate IT systems, databases, or applications to allow them to share and exchange information. It is often used in identity management to enable single sign-on (SSO) across different systems.

You will find this term commonly used in General IT, Security

Federation Services

In a distributed computing environment, federation services enable different IT systems, organizations, or domains to share identity, authentication, and authorization procedures and data. This allows users to access multiple systems with a single set of credentials.

You will find this term commonly used in Security, Cloud Computing

Feedback Control System

A system that adjusts its performance based on feedback from the system output. Feedback control systems are used in various applications, including industrial control, robotics, and adaptive algorithms in software and hardware.

You will find this term commonly used in AI, Robotics

Feedback Loop

A process in which the outputs of a system are circled back and used as inputs. This concept is fundamental in adaptive systems, including control systems, cybernetics, and various branches of artificial intelligence.

You will find this term commonly used in AI, General IT

Feedback Suppression

Techniques used in digital signal processing to reduce or eliminate feedback (e.g., echo) in audio systems or telecommunications.

You will find this term commonly used in General IT, Audio Engineering

Feedback Systems

Systems designed to adjust their own operation or behavior based on feedback they receive from external inputs or from their own performance.

You will find this term commonly used in General IT, Cybersecurity

Femtocell

A small, low-power cellular base station typically used to improve mobile network reception inside a home or small business area.

You will find this term commonly used in Networking

Fetch API

A modern interface in JavaScript used for accessing and manipulating parts of the HTTP pipeline, such as requests and responses. It provides a more powerful and flexible feature set compared to older techniques like XMLHttpRequest.

You will find this term commonly used in Web Development

Fiber Channel

A high-speed network technology primarily used for computer data storage networking.

You will find this term commonly used in Networking, Storage

Fiber Optic Cable

A cable made of glass fibers that transmit data as pulses of light. Fiber optic cables have a higher bandwidth and can transmit data over longer distances than traditional metal cables, making them ideal for high-speed data communications.

You will find this term commonly used in Networking

Fiber Optics

A technology that uses glass (or plastic) threads (fibers) to transmit data. Fiber optics has a major advantage over metal cables in that they are less susceptible to interference and can carry data over longer distances without significant loss.

You will find this term commonly used in Networking

Fiber to the Home (FTTH)

A technology that delivers communication signal over optical fiber directly to the home or business, offering high-speed internet access.

You will find this term commonly used in Networking

Fiber To The X (FTTx)

A generic term for any broadband network architecture that uses optical fiber to provide all or part of the local loop used for last-mile telecommunications.

You will find this term commonly used in Networking, Telecommunications

Fibre Channel

A high-speed network technology primarily used for storage networking. Fibre Channel is most often used to connect computer data storage to servers in storage area networks (SANs).

You will find this term commonly used in Networking, Storage

Fibre Channel over IP (FCIP)

A tunneling protocol used to connect geographically distributed Fibre Channel SANs (Storage Area Networks) over IP networks.

You will find this term commonly used in Networking, Storage

Fibre Channel Protocol

A high-speed data transfer protocol typically used in storage area networks (SANs) to connect data storage facilities with data servers. It is known for its high throughput and reliability in handling data storage communications.

You will find this term commonly used in Networking, Storage

FIDO (Fast Identity Online)

A set of technology-agnostic security specifications for strong authentication. FIDO is aimed at reducing the reliance on passwords to authenticate users.

You will find this term commonly used in Security, Cybersecurity

FIDO2 (Fast Identity Online 2)

The latest set of specifications for strong authentication from the FIDO Alliance. FIDO2 enables users to leverage common devices to easily authenticate to online services in both mobile and desktop environments.

You will find this term commonly used in Security, Cybersecurity

Field Service Management

The management of resources employed at or en route to the property of clients, rather than on company property. It involves scheduling service orders, dispatching agents, and tracking vehicle locations and job status.

You will find this term commonly used in Business, IT Management

Field Test

The process of testing an electronic device in the conditions under which it will be used, as opposed to laboratory or controlled tests. This is crucial for understanding how a product performs in real-world scenarios.

You will find this term commonly used in General IT, Hardware

Field-Effect Transistor (FET)

A type of transistor commonly used in digital circuits, which controls the flow of electricity by applying voltage to a gate.

You will find this term commonly used in Hardware, Electronics

File Allocation Table (FAT)

A file system architecture used in many operating systems for storing file directories and metadata. FAT is simple and widely compatible but has limitations in terms of maximum disk size and file size.

You will find this term commonly used in Operating Systems, Storage

File Allocation Techniques

The methods used by operating systems to allocate space on a filesystem for files. This can include methods like contiguous allocation, linked allocation, and indexed allocation, each with its own advantages and disadvantages in terms of speed, space efficiency, and fragmentation.

You will find this term commonly used in Operating Systems, Storage

File Carving

The process of extracting files from a digital storage medium based on content, typically used in digital forensics to recover deleted files.

You will find this term commonly used in Cybersecurity, Digital Forensics

File Descriptor

An abstract indicator used to access a file or other input/output resource, such as a pipe or network socket. File descriptors form part of the POSIX API and are an integral part of Unix and Linux systems programming.

You will find this term commonly used in Operating Systems, General IT

File Encryption

The process of using a cryptographic algorithm to transform readable data (plaintext) into a form that hides its original content (ciphertext), ensuring that only authorized parties can access it.

You will find this term commonly used in Security, Privacy

File Handle

An abstract indicator (or token) used for accessing a file or other data resource. It is used by operating systems to allow applications to manipulate and track the use of files and other resources.

You will find this term commonly used in General IT, Operating Systems

File Integrity Check

A security process that uses cryptographic hashes to verify the integrity and authenticity of files, detecting any unauthorized changes.

You will find this term commonly used in Cybersecurity

File Integrity Monitoring (FIM)

A security process that involves the real-time monitoring and analysis of files to detect unauthorized changes. This can help in early detection of tampering, data breaches, or compliance issues with critical system and configuration files.

You will find this term commonly used in Security, Cybersecurity

File Level Storage

A storage architecture where data is stored and organized as files within folders, similar to how data is stored on a personal computer's file system.

You will find this term commonly used in Data Management, Storage

File Locking

A mechanism that prevents simultaneous access to a file by multiple processes to avoid data corruption or inconsistency.

You will find this term commonly used in General IT, Data Management

What's Your
Career Path?
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart