IT Glossary - I - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Innovative Technologies

Emerging or advanced technologies that have the potential to significantly impact business processes, service delivery, or product development, such as AI, blockchain, and IoT.

You will find this term commonly used in General IT, Development

Inode

A data structure on a filesystem on Linux/Unix that stores information about a file or a directory, including attributes like ownership, access mode (permissions), and file type.

You will find this term commonly used in Operating Systems, Storage

Input Method Editor (IME)

A program or operating system component that allows users to enter characters and symbols not found on their input devices. For example, typing in Chinese on a keyboard designed for English.

You will find this term commonly used in Software Development, Localization

Input Sanitization

The process of cleaning up and validating user input before processing to prevent security vulnerabilities, such as injection attacks, by removing harmful data.

You will find this term commonly used in Web Development, Security

Input/Output Controller

A device or software that manages the communication between a computer and its external devices, handling input and output operations.

You will find this term commonly used in Hardware, Development

Instance Variable

A variable that is defined in a class for which each instantiated object of the class has a separate copy, or instance. These variables represent the object's state.

You will find this term commonly used in Development, Software Engineering

Instant Messaging (IM)

A type of online chat that offers real-time text transmission over the Internet.

You will find this term commonly used in Networking, Communication

Instruction Pipelining

A technique for implementing instruction-level parallelism within a single processor. Pipelining attempts to keep every part of the processor busy with some instruction by dividing incoming instructions into a series of sequential steps.

You will find this term commonly used in Hardware, Software Development

Instruction Set

The set of instructions that a processor can execute, defining how software can use the processor to perform operations.

You will find this term commonly used in Hardware, Software Development

Instruction Set Architecture (ISA)

The part of the computer architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO.

You will find this term commonly used in Computer Architecture, General IT

Instruction-Level Parallelism (ILP)

A measure of how many of the instructions in a computer program can be executed simultaneously.

You will find this term commonly used in Computer Architecture, Hardware

Integer Overflow

A condition that occurs when an arithmetic operation attempts to create a numeric value that is outside of the range that can be represented with a given number of digits.

You will find this term commonly used in Software Development, Security

Integrated Circuit (IC)

A set of electronic circuits on one small flat piece (or "chip") of semiconductor material, usually silicon. ICs can perform a variety of functions, including processing, memory, and logic.

You will find this term commonly used in Hardware, Electronics

Integrated Circuit Card Identifier (ICCID)

A unique identifier of a SIM card in a mobile phone.

You will find this term commonly used in Mobile Technology, Networking

Integrated Development Environment (IDE)

A software application that provides comprehensive facilities to computer programmers for software development, including a source code editor, build automation tools, and a debugger.

You will find this term commonly used in Software Development, General IT

Integrated Development Environment (IDE) Features

The components and tools provided by an IDE to support software development, including code editors, compilers, debuggers, and version control.

You will find this term commonly used in Development, Software Engineering

Integrated Development Operations (DevOps)

Practices that combine software development (Dev) and IT operations (Ops) to shorten the development life cycle and provide continuous delivery.

You will find this term commonly used in General IT, Software Development

Integrated Performance Management

A holistic approach that integrates various aspects of performance management, including business process, technology, and people management, to improve organizational efficiency and effectiveness.

You will find this term commonly used in IT Management, General IT

Integrated Software

A collection of software especially created to work on closely related programs. It's designed to facilitate the work of groups of people in a corporate environment by sharing data and processes among various departments.

You will find this term commonly used in Software Development, Business Software

Integrated Threat Management

A comprehensive approach to managing and mitigating security threats that involves coordinating various security measures and technologies across an organization.

You will find this term commonly used in Security, Cybersecurity

Integration

The process of combining software components or subsystems into an overall system. It is a critical phase in software development where all the different parts of an application are combined.

You will find this term commonly used in Software Development

Integration Testing

A level of software testing where individual units are combined and tested as a group to expose faults in the interaction between units.

You will find this term commonly used in Software Development

Intellectual Property (IP)

Legal rights that creators have over their inventions and creations. In IT, this can include software, designs, and technology. It is crucial for protecting innovation and creativity in the field.

You will find this term commonly used in General IT, Legal

Intellectual Property (IP) Theft

The theft of ideas, inventions, and creative expressions, which can include everything from trade secrets and proprietary products and parts to movies, music, and software.

You will find this term commonly used in Legal, Security

Intellectual Property Theft

The stealing of ideas, inventions, and creative expressions. In IT, this can include software piracy, the unauthorized replication of technology, and the illicit use of proprietary software or hardware designs.

You will find this term commonly used in Cybersecurity, Legal

Intelligent Agent

Software that performs tasks on behalf of users or other programs, with some degree of autonomy.

You will find this term commonly used in AI, Software Development

Intelligent Automation

The combination of artificial intelligence (AI) and automation technologies to create systems that can simulate human understanding and automate complex processes.

You will find this term commonly used in AI, Robotics

Intelligent Network (IN)

A type of telecommunications network architecture that allows for the rapid introduction of services and provides operators and service providers the ability to control and customize services.

You will find this term commonly used in Networking, Telecommunications

Intelligent Systems

Computer systems that exhibit characteristics of artificial intelligence, such as learning, adaptation, and decision-making, applied in various domains like robotics, expert systems, and natural language processing.

You will find this term commonly used in AI, Development

IntelliJ IDEA

An integrated development environment (IDE) written in Java for developing computer software.

You will find this term commonly used in Software Development

Inter-Process Communication (IPC)

A set of programming interfaces that allows a programmer to coordinate activities among different program processes that can run concurrently in an operating system.

You will find this term commonly used in Software Development

Interactive Application

Software that accepts input from humans as it runs, often used in contrast to batch processing applications.

You will find this term commonly used in Software Development

Interactive Data Visualization

The use of visual representations of data to explore, understand, and communicate complex information interactively, often using software that allows users to manipulate and explore datasets in real-time.

You will find this term commonly used in Data Analysis, Business Intelligence

Interactive Development Environment

An environment that provides immediate feedback to the programmer for each action, facilitating a more dynamic and rapid development process. Often confused with Integrated Development Environment (IDE), but focuses more on the interactivity aspect.

You will find this term commonly used in Development, Software Engineering

Interactive Kiosk

A computer terminal featuring specialized hardware and software that provides access to information and applications for communication, commerce, entertainment, or education.

You will find this term commonly used in Hardware, General IT

Interchange Format

A standard format for exchanging data between systems or software applications.

You will find this term commonly used in Data Management, Interoperability

Intercloud

The interconnection of cloud computing services from different providers, enabling data and application portability, as well as the ability to leverage multiple cloud environments to improve performance, reliability, and scalability.

You will find this term commonly used in Cloud Computing, Networking

Interdisciplinary Computing

The integration of computing methods and technologies into diverse fields of study, promoting innovation and new approaches to research and development.

You will find this term commonly used in General IT, Research

Interface

In computing, it refers either to a user interface or a software interface that allows two or more software entities to communicate with each other.

You will find this term commonly used in Software Development, General IT

Interface Design

The process of creating interfaces in software or computerized devices with a focus on looks or style, aiming to improve the user experience by making the interface easy and pleasant to use.

You will find this term commonly used in UI/UX Design, Software Development

Interface Segregation Principle

A principle in object-oriented design that states no client should be forced to depend on methods it does not use. It's part of the SOLID principles aimed at making software designs more understandable, flexible, and maintainable.

You will find this term commonly used in Software Development

Interface Segregation Principle (ISP)

A principle in object-oriented design that states no client should be forced to depend on methods it does not use.

You will find this term commonly used in Software Development

Interference Information

In wireless communications, information related to the interference experienced by signals, which can be used to adjust systems or protocols to improve communication quality.

You will find this term commonly used in Networking, Telecommunications

Interlaced PNG (iPNG)

An extension of the Portable Network Graphics (PNG) format that allows an image to be displayed in a progressive manner as it is downloaded over networks, improving user experience on slow connections.

You will find this term commonly used in Web Development, Graphics

Internal Audit

An organizational initiative to assess and improve its processes, ensuring compliance and identifying process improvements.

You will find this term commonly used in IT Management, Security

Internal Network

A network that is restricted to the devices and users within an organization, providing controlled access to resources, often isolated from the external internet for security purposes.

You will find this term commonly used in Networking, Security

Internal Rate of Return (IRR) for IT Projects

A financial metric used to estimate the profitability of potential investments in IT projects, calculated as the rate of return that makes the net present value of all cash flows from a particular project equal to zero.

You will find this term commonly used in IT Management, Finance

International Cybersecurity Standards

A set of globally recognized guidelines and practices for securing information systems and managing cyber risks, such as ISO/IEC 27001.

You will find this term commonly used in Security, Cybersecurity

International Data Encryption Algorithm (IDEA)

A symmetric key block cipher used in data encryption.

You will find this term commonly used in Security, Cryptography

International Software Testing Qualifications Board (ISTQB)

An organization that offers globally recognized certifications in software testing, defining standardized practices and methodologies.

You will find this term commonly used in Development, Quality Assurance

What's Your
Career Path?
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart