IT Glossary - I - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Indirect Addressing

A method in computer programming where the address of the data is held in an instruction code, allowing the program to manipulate addresses and values stored in variables.

You will find this term commonly used in Software Development

Indirect Dependency

A software dependency that is not directly tied to the current software project but is a dependency of a directly used library or package.

You will find this term commonly used in Software Development, Dependency Management

Individual Contributor

An employee who contributes to the team or project without having management responsibilities.

You will find this term commonly used in General IT, Human Resources

Inductive Charging

A type of wireless power transfer. It uses electromagnetic fields to transfer energy between two objects through electromagnetic induction. Useful in charging devices like smartphones and electric toothbrushes without cords.

You will find this term commonly used in Hardware, Mobile Technology

Industrial Internet

A term coined to describe the integration and linking of big data, analytical tools, and wireless networks with physical and industrial equipment, or otherwise known as the Industrial Internet of Things (IIoT).

You will find this term commonly used in IoT, Industrial Automation

Inference Engine

A component of an expert system that applies logical rules to the knowledge base to deduce new information or make decisions, often used in AI applications to simulate human reasoning.

You will find this term commonly used in AI, Machine Learning

InfiniBand

A high-speed communications standard used in high-performance computing and data centers. It offers high throughput and very low latency for data transfer between computer servers and storage systems.

You will find this term commonly used in Networking, Data Center Technology

Infinite Loop

A loop that runs indefinitely because the loop condition is never falsified.

You will find this term commonly used in Programming, Software Development

Informatics

The study of computational systems, especially those for data storage and retrieval.

You will find this term commonly used in General IT, Data Science

Information Architecture

The structure of information, focusing on organizing, structuring, and labeling content in an effective and sustainable way. This is used in websites, online communities, and software to help improve usability.

You will find this term commonly used in Web Development, UX/UI Design

Information Assurance

Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

You will find this term commonly used in Security, Cybersecurity

Information Broker

A person or company that collects and sells personal or corporate information to third parties, often used for marketing, research, or surveillance purposes.

You will find this term commonly used in Data Management, Security

Information Cascade

A phenomenon where individuals in a group or network make decisions sequentially, with each person's decision influenced by the decisions of earlier individuals, sometimes leading to rapid convergence on suboptimal choices or beliefs.

You will find this term commonly used in Social Media, Behavioral Economics

Information Entropy

A measure of the uncertainty or randomness in a data set, used in information theory.

You will find this term commonly used in Information Theory, Security

Information Governance

The set of multi-disciplinary structures, policies, procedures, processes, and controls implemented to manage information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental, and operational requirements.

You will find this term commonly used in Data Management, IT Governance

Information Hiding

The principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed.

You will find this term commonly used in Software Development, Programming

Information Kiosk

A computer terminal featuring specialized hardware and software that provides access to information and applications for communication, commerce, entertainment, or education.

You will find this term commonly used in General IT, Customer Service

Information Lifecycle Management (ILM)

Policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective IT infrastructure from the time information is conceived through its final disposition.

You will find this term commonly used in General IT, Data Management

Information Radiator

A large, highly visible display used in agile software development environments to provide team members and stakeholders with up-to-date information about the project's status, progress, and metrics.

You will find this term commonly used in Agile Development, Project Management

Information Retrieval

The science of searching for information in documents, searching for documents themselves, and also searching for metadata that describe data, and for databases of texts, images, or sounds.

You will find this term commonly used in Databases, AI

Information Security Analyst

Protects computer networks and systems by identifying and mitigating security vulnerabilities and threats.

You will find this term commonly used in Cybersecurity

Information Security Policy

A set of guidelines and standards designed to manage the protection of organizational information, ensuring confidentiality, integrity, and availability of data.

You will find this term commonly used in Security, IT Governance

Information Silo

An isolated point in a system where data is kept and not easily or safely accessible to other parts of the system.

You will find this term commonly used in Data Management, IT Management

Information Theory

A branch of applied mathematics and electrical engineering involving the quantification of information. Historically, it was developed to find fundamental limits on compressing and reliably transmitting data.

You will find this term commonly used in Data Science, Cryptography

Infrastructure as a Service (IaaS) Cloud

A form of cloud computing that provides virtualized computing resources over the internet, offering a complete infrastructure stack in a pay-as-you-go model.

You will find this term commonly used in Cloud Computing, Networking

Infrastructure as Code (IaC)

The process of managing and provisioning computer data centers through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools.

You will find this term commonly used in Cloud Computing, DevOps

Infrastructure Automation

The use of technology to perform tasks with reduced human assistance to manage and provision various types of infrastructure like physical and virtual servers.

You will find this term commonly used in Cloud Computing, General IT

Infrastructure Code

The practice of managing and provisioning computer data centers through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools.

You will find this term commonly used in Cloud Computing, DevOps

Infrastructure Monitoring

The practice of collecting and analyzing data from IT infrastructure to ensure it is functioning optimally and to predict potential issues.

You will find this term commonly used in Networking, IT Management

Infrastructure Security

The protection of physical and virtual infrastructure against threats and vulnerabilities, including the security of data centers, network devices, and cloud environments.

You will find this term commonly used in Security, Cybersecurity

Ingress and Egress Filtering

Network security measures that control incoming (ingress) and outgoing (egress) traffic based on a set of rules, often to prevent unauthorized access and ensure data security.

You will find this term commonly used in Networking, Security

Ingress Controller

In the context of Kubernetes, it manages access to the services in a cluster by providing HTTP routing and load balancing to services based on declared ingress resources.

You will find this term commonly used in Cloud Computing, Networking

Ingress Filtering

A method used in computer security to prevent certain types of network traffic from entering a private network. It is used to enhance the security of a network by blocking potentially harmful traffic.

You will find this term commonly used in Networking, Security

Ingress Network Traffic

Incoming network traffic to a particular device, server, or network. It is often monitored and managed to ensure security and optimal performance.

You will find this term commonly used in Networking, Security

Ingress Networking

In the context of computer networking, ingress refers to incoming traffic to a network or service, often managed and controlled by routing and firewall policies to ensure security and efficient data flow.

You will find this term commonly used in Networking, Cloud Computing

Ingress Traffic

Incoming network traffic from external networks to internal resources.

You will find this term commonly used in Networking, Security

Inheritance

An object-oriented programming principle where a class can inherit properties and methods from another class.

You will find this term commonly used in Software Development

Inheritance Hierarchy

In object-oriented programming, a structure that represents relationships between classes and subclasses, allowing for the reuse of code and properties.

You will find this term commonly used in Development, Software Engineering

Initial Coin Offering (ICO)

A fundraising mechanism in which new projects sell their underlying crypto tokens in exchange for bitcoin and ether. It’s somewhat similar to an Initial Public Offering (IPO) in which investors purchase shares of a company.

You will find this term commonly used in Cryptocurrency, Finance

Initial Program Load (IPL)

The process of loading the operating system into the computer's main memory at startup.

You will find this term commonly used in Operating Systems, Hardware

Injection Attack

The introduction of malicious code into a computer program or system, commonly seen in SQL injection, where attackers exploit vulnerabilities to execute unauthorized SQL commands.

You will find this term commonly used in Security, Cybersecurity

Injection Flaw

A type of vulnerability in software applications that occurs when an attacker can insert (or "inject") a piece of malicious code into the program, typically through user input areas such as forms or URLs.

You will find this term commonly used in Cybersecurity, Software Development

Inkjet Printer

A type of printer that creates images by propelling droplets of ink onto paper.

You will find this term commonly used in Hardware, Peripheral Devices

Inkjet Printing Technology

A type of computer printing that recreates a digital image by propelling droplets of ink onto paper and plastic substrates, commonly used in personal and small business settings.

You will find this term commonly used in General IT, Hardware

Inline Assembly

The use of assembly language instructions within a program written in a high-level programming language. This can be used for optimization or to access processor-specific instructions not available in the high-level language.

You will find this term commonly used in Software Development, Hardware

Inline Function

A function in programming where the compiler replaces a function call with the actual code of the function, potentially reducing the overhead of function calls.

You will find this term commonly used in Software Development

Inline Query

A query that is placed within the code of another query or program, often used to simplify complex queries or calculations within a database or software application.

You will find this term commonly used in Development, Data Management

Innovation Ecosystem

A network or environment that supports and fosters innovation, consisting of relationships between individuals, organizations, technologies, and policies.

You will find this term commonly used in General IT, Business Strategy

Innovation Management

The discipline of managing processes in innovation. It can involve the creation of products, processes, and business models; it is often tied to technology and software development in IT contexts.

You will find this term commonly used in Business Management, IT Strategy

Innovative Disruption

A business or technology innovation that significantly alters the way that consumers, industries, or businesses operate, often displacing established market-leading firms, products, and alliances.

You will find this term commonly used in Business Strategy, Innovation

What's Your
Career Path?
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00