IT Glossary - F - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Function Pointer

A type of pointer used in programming languages, such as C or C++, which points to a function, allowing the function to be called through the pointer.

You will find this term commonly used in Software Development

Function Signature

The unique identification of a function in programming that includes its name, the number and types of its parameters, and its return type. Function signatures are essential for function overloading and for the compiler to differentiate between different functions.

You will find this term commonly used in Software Development

Function-as-a-Service (FaaS)

A category of cloud computing services that provides a platform allowing customers to execute code in response to events without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

You will find this term commonly used in Cloud Computing

Functional Decomposition

The process of breaking down complex processes or systems into simpler, more manageable components. In software engineering, it involves breaking down the functionality of a system into smaller parts or functions that are easier to understand, manage, and code.

You will find this term commonly used in Software Development

Functional Decomposition Diagram

A tool used in systems design to break down the functionality of a system into smaller parts, making it easier to understand, develop, and maintain.

You will find this term commonly used in Software Development, Systems Design

Functional Dependency

A relationship that exists when one attribute uniquely determines another attribute in a database schema, crucial for normalization.

You will find this term commonly used in Database Design

Functional Design

An approach to software design where the architecture is structured around functions and their interactions, often emphasizing modularity and reusability.

You will find this term commonly used in Software Development

Functional Interface

In programming, particularly in Java, a functional interface is an interface that contains exactly one abstract method. This concept supports lambda expressions and method references, enabling cleaner and more concise code for representing single-method interfaces.

You will find this term commonly used in Software Development

Functional Programming

A programming paradigm that treats computation as the evaluation of mathematical functions and avoids changing-state and mutable data.

You will find this term commonly used in Software Development, AI

Functional Requirement

A requirement that defines a specific behaviour or function of a system. For example, in software engineering, it refers to what the system should do, such as calculations, technical details, data manipulation and processing, and other specific functionality.

You will find this term commonly used in Software Development

Functional Specification

A document that outlines the expected behavior of a system or software application, including features, operations, and functionality. It serves as a guide for developers and testers to understand what to build and how the system should perform.

You will find this term commonly used in Software Development

Functional Testing

A type of software testing that validates the software system against the functional requirements/specifications. The purpose of functional tests is to test each function of the software application, by providing appropriate input and verifying the output against the Functional requirements.

You will find this term commonly used in Software Development, Testing

Fundamental Networking

The basic principles and practices that form the foundation of computer networking. This includes understanding network topologies, protocols, IP addressing, routing, and switching, which are essential for designing, implementing, and managing networks.

You will find this term commonly used in Networking

Fuzz Testing

A software testing technique that involves providing invalid, unexpected, or random data inputs to a computer program. The purpose is to find security loopholes or bugs that might crash the program.

You will find this term commonly used in Security, Software Testing

Fuzz Testing (Fuzzing)

An automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for crashes, failing code assertions, or potential memory leaks.

You will find this term commonly used in Security, Software Testing

Fuzz Testing Tool

Software designed to implement fuzz testing by automatically generating and sending a large number of random data inputs to a target program. The goal is to trigger an error, crash, or uncover vulnerabilities that can then be fixed.

You will find this term commonly used in Security, Software Testing

Fuzzification

The process of converting precise input values into fuzzy values based on predefined linguistic variables, commonly used in fuzzy logic systems.

You will find this term commonly used in AI, Control Systems

Fuzzing

An automated software testing technique that involves providing invalid, unexpected, or random data as input to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks.

You will find this term commonly used in Security, Software Testing

Fuzzing as a Service (FaaS)

A cloud-based service that provides automated fuzz testing to identify vulnerabilities and bugs in software applications. By leveraging cloud resources, FaaS allows for scalable and extensive testing across various environments and configurations.

You will find this term commonly used in Security, Cloud Computing

Fuzzing Framework

A software library or set of tools designed to assist in the fuzz testing of applications and systems by generating random or semi-random data that is used as input to the systems being tested, in order to find bugs or security vulnerabilities.

You will find this term commonly used in Security, Software Testing

Fuzzing Seed

An initial value or set of values used by a fuzzing tool to generate test cases. A good fuzzing seed can increase the effectiveness of fuzz testing by ensuring a wide coverage of the input space, potentially uncovering more vulnerabilities or bugs.

You will find this term commonly used in Security, Software Testing

Fuzzing Suite

A collection of software tools and libraries designed for conducting fuzzing tests on applications, systems, or networks to discover vulnerabilities or bugs. Fuzzing suites automate the generation and injection of malformed or unexpected data.

You will find this term commonly used in Security, Software Testing

Fuzzing Techniques

Techniques used in software testing, especially for discovering coding errors and security loopholes by inputting massive amounts of random data, or "fuzz," to the system.

You will find this term commonly used in Cybersecurity, Software Development

Fuzzing Tool

Software used in security testing to automatically generate random data (fuzz) to input into a program. The goal is to trigger an error, crash, or security vulnerability in the software being tested, identifying weaknesses that need to be addressed.

You will find this term commonly used in Security, Software Testing

Fuzzy Hashing

A technique in cybersecurity used to create a representation of a file that can identify similar files or fragments, useful for detecting variants of malware or digital forensic analysis.

You will find this term commonly used in Cybersecurity, Digital Forensics

Fuzzy Logic

A form of many-valued logic or probabilistic logic used in artificial intelligence and other fields to deal with reasoning that is approximate rather than fixed and exact. Unlike binary logic, fuzzy logic variables may have a truth value that ranges between 0 and 1.

You will find this term commonly used in AI, Machine Learning

Fuzzy Logic System

A computing approach based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.

You will find this term commonly used in AI, Software Development

Fuzzy Matching

A technique used in computer-assisted translation and other fields to identify non-exact matches of a string of text. It is useful in data deduplication, data integration, and information retrieval applications where exact matches are not necessary or possible.

You will find this term commonly used in Databases, Software Development

Fuzzy Search

A type of search that finds matches even when the search terms are only partially accurate or slightly misspelled. Fuzzy search algorithms can provide suggestions or corrections for queries, improving user experience in search applications.

You will find this term commonly used in Software Development, AI

Fuzzy Search Algorithm

An algorithm that finds matches that are approximately equal to a given search pattern, useful in applications where input may be imprecise or misspelled.

You will find this term commonly used in AI, Data Management

Fuzzy System

A system that uses fuzzy logic to reason about data, useful in scenarios where information is imprecise, uncertain, or incomplete.

You will find this term commonly used in AI, Control Systems

What's Your
Career Path?
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart