IT Glossary - H - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

HTTP Flood Attack

A type of Distributed Denial of Service (DDoS) attack where the attacker exploits seemingly legitimate HTTP GET or POST requests to attack a web server or application.

You will find this term commonly used in Security, Networking

HTTP Header

Part of the header section of request and response messages in the HTTP protocol that defines the operating parameters of an HTTP transaction.

You will find this term commonly used in Web Development, Networking

HTTP Interceptors

Functions that are used to intercept and possibly modify HTTP requests and responses in a web application, often used for logging, authentication, or other purposes.

You will find this term commonly used in Web Development

HTTP Method

A request method used in HTTP to indicate the desired action to be performed for a given resource. Common methods include GET, POST, PUT, DELETE, and PATCH.

You will find this term commonly used in Web Development

HTTP Monitoring

The process of checking and logging HTTP traffic between a client and server for analysis or troubleshooting.

You will find this term commonly used in Networking, Web Development

HTTP Pipeline

A feature that allows multiple HTTP requests to be sent on a single TCP connection without waiting for the corresponding responses.

You will find this term commonly used in Networking, Web Development

HTTP Pipelining

A technique in which multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses.

You will find this term commonly used in Web Development, Networking

HTTP Proxy

A server that acts as an intermediary for requests from clients seeking resources from other servers.

You will find this term commonly used in Networking, Security

HTTP Redirect

A way to redirect web browsers and search engines from one URL to another.

You will find this term commonly used in Web Development, SEO

HTTP Response Splitting

A web application vulnerability that occurs when unvalidated user input is included in HTTP headers, potentially allowing an attacker to inject additional HTTP headers or even arbitrary content into the responses.

You will find this term commonly used in Security, Web Development

HTTP Status Code 404

A standard response code in HTTP indicating that the client was able to communicate with the server, but the server could not find the requested information.

You will find this term commonly used in Web Development

HTTP Status Codes

Codes that are issued by a server in response to a client's request made to the server. It includes codes from various categories like informational responses, successful responses, redirects, client errors, and server errors.

You will find this term commonly used in Web Development

HTTP Strict Transport Security (HSTS)

A web security policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking.

You will find this term commonly used in Web Development, Security

HTTP Tunneling

A technique used to encapsulate non-HTTP traffic over HTTP protocols, enabling communication through networks or firewalls that block non-HTTP traffic.

You will find this term commonly used in Networking, Security

HTTP/2

The second major version of the HTTP network protocol, used by the World Wide Web. It focuses on performance improvements over HTTP/1.x.

You will find this term commonly used in Networking

HTTP/2 Multiplexing

A feature of HTTP/2 that allows multiple request and response messages to be in flight at the same time over a single TCP connection, improving web performance.

You will find this term commonly used in Web Development, Networking

HTTP/2 Push

A feature of the HTTP/2 protocol that allows a server to send resources to a web browser before the browser requests them.

You will find this term commonly used in Web Development, Networking

HTTP/2 Server Push

A feature of HTTP/2 where a server can send resources to a client before the client requests them, effectively pushing data to the client and potentially improving load times.

You will find this term commonly used in Networking, Web Development

HTTP/3

The upcoming third major version of the HTTP protocol, featuring improved performance and security enhancements over HTTP/2.

You will find this term commonly used in Networking

HTTPS (HTTP Secure)

An extension of HTTP used for secure communication over a computer network, widely used on the Internet.

You will find this term commonly used in Networking, Security

HTTPS (HyperText Transfer Protocol Secure)

An extension of HTTP that is used for secure communication over a computer network, and is widely used on the Internet.

You will find this term commonly used in Networking, Security

HTTPS Everywhere

A browser extension that encrypts your communications with many major websites, making your browsing more secure.

You will find this term commonly used in Web Development, Security

HTTPS Inspection

The process of decrypting and examining HTTPS traffic with the goal of identifying malicious traffic or enforcing policies.

You will find this term commonly used in Security, Networking

Hub

A common connection point for devices in a network. Hubs are used to connect segments of a LAN.

You will find this term commonly used in Networking

Hue

In digital arts and computer graphics, a color property that defines a specific color on the color wheel.

You will find this term commonly used in Multimedia, Design

Human-Centered Design

An approach to systems design and development that makes human perspectives and needs the focal point of the entire process.

You will find this term commonly used in User Experience, Design

Human-Readable Format

A representation of data or information that can be naturally read by humans. In contrast, machine-readable data is in a format that can be easily processed by a computer.

You will find this term commonly used in General IT, Data Representation

Hybrid App

A mobile app that combines elements of both native apps and web applications. Hybrid apps are essentially web apps that have been put in a native app shell.

You will find this term commonly used in Mobile Development

Hybrid App Development

The creation of mobile apps that run on multiple platforms, such as iOS and Android, from a single codebase, typically using web technologies.

You will find this term commonly used in Mobile Development

Hybrid Application Framework

A framework used in mobile development that allows for the development of applications that can run on multiple platforms using the same codebase.

You will find this term commonly used in Mobile Development

Hybrid Cloud

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party, public cloud services with orchestration between the two platforms.

You will find this term commonly used in Cloud Computing

Hybrid Cloud Computing

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party, public cloud services with orchestration between the two platforms. It allows for greater flexibility and more deployment options.

You will find this term commonly used in Cloud Computing, General IT

Hybrid Cloud Management

The process of managing the integration and operation of a hybrid cloud, which combines public and private cloud infrastructures to allow data and applications to be shared between them.

You will find this term commonly used in Cloud Computing, IT Management

Hybrid Cloud Storage

A storage solution that combines public cloud storage and private cloud storage with data mobility between the two environments.

You will find this term commonly used in Cloud Computing, Storage

Hybrid Cryptography

A cryptosystem that combines two or more encryption schemes, including both symmetric and asymmetric algorithms, to secure data transmission.

You will find this term commonly used in Cryptography, Security

Hybrid Cryptosystem

A cryptographic system that combines the best features of both symmetric and asymmetric encryption to secure data transmission.

You will find this term commonly used in Security, Cryptography

Hybrid Disk

Also known as a solid-state hybrid drive (SSHD), it combines the features of an HDD (hard disk drive) and an SSD (solid-state drive) in one unit, aiming to offer a balance between high speed and large storage capacity.

You will find this term commonly used in Hardware, Data Storage

Hybrid Encryption

A form of encryption that combines the convenience of a public-key encryption scheme with the efficiency of a symmetric key encryption scheme.

You will find this term commonly used in Security, Cryptography

Hybrid Encryption System

A cryptographic system that combines the convenience of a public-key encryption system with the efficiency of a symmetric key encryption system.

You will find this term commonly used in Security, Cryptography

Hybrid Fiber-Coaxial (HFC)

A telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network.

You will find this term commonly used in Networking

Hybrid Integration Platform

A platform that combines cloud-based systems and on-premises, the traditional method of integration.

You will find this term commonly used in Cloud Computing, Integration

Hybrid IT

A computing environment that uses a mix of on-premise, private cloud, and public cloud services with orchestration between the two platforms.

You will find this term commonly used in Cloud Computing

Hybrid Logical Clock (HLC)

A type of logical clock used in distributed systems to ensure a partial ordering of events with improved accuracy over traditional logical clocks while maintaining causality.

You will find this term commonly used in Distributed Systems

Hybrid Network Topology

A network structure that combines two or more different network topologies, such as star, ring, bus, or mesh, to form a single network.

You will find this term commonly used in Networking

Hybrid Networking

A type of computer network that uses different types of transmission technologies, protocols, or architectures.

You will find this term commonly used in Networking

Hybrid Routing

A routing method that combines characteristics of both static routing and dynamic routing, often used in large, complex networks.

You will find this term commonly used in Networking

Hybrid SIM Slot

A smartphone feature that allows a user to insert either two SIM cards or one SIM card and one microSD card, but not both types of cards simultaneously.

You will find this term commonly used in Mobile Technology

Hybrid Virtualization

Combines hardware-assisted virtualization and software emulation to offer a balanced approach for virtualizing complex computing environments. It offers flexibility and improved performance for specific applications.

You will find this term commonly used in Virtualization

Hyper-converged Infrastructure (HCI)

A software-defined IT infrastructure that virtualizes all of the elements of conventional "hardware-defined" systems. HCI includes, at a minimum, virtualized computing (a hypervisor), virtualized SAN (storage area network) and virtualized networking.

You will find this term commonly used in Networking, Virtualization

Hyper-Threading

Intel’s proprietary technology that allows a single microprocessor to act like two separate processors to the operating system and the application programs that use it.

You will find this term commonly used in Hardware, Computing

What's Your
Career Path?
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart