IT Glossary - I - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Internationalization (i18n)

The practice of designing and developing software applications in a way that makes them adaptable to various languages and regions without engineering changes.

You will find this term commonly used in Software Development, Localization

Internet Backbone

The principal data routes between large, strategically interconnected networks and core routers on the Internet. It is a collection of high-speed data transfer lines that connect major nodes or routing centers.

You will find this term commonly used in Networking, Internet Technology

Internet Exchange Point (IXP)

A physical infrastructure through which Internet service providers (ISPs) and Content Delivery Networks (CDNs) exchange Internet traffic between their networks.

You will find this term commonly used in Networking

Internet Governance

The development and application by governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet.

You will find this term commonly used in Internet Technology, Policy

Internet Governance Forum (IGF)

A multi-stakeholder forum for policy dialogue on issues of internet governance, including the sustainability, robustness, security, stability, and development of the internet.

You will find this term commonly used in Networking, Internet Policy

Internet Health Report

An annual report that provides insights into the global condition of the internet, including security, connectivity, and innovation, aiming to improve the internet's ecosystem.

You will find this term commonly used in Networking, Internet Policy

Internet of Things (IoT)

The Internet of Things (IoT) refers to a network of interconnected devices or objects embedded with sensors, software, and connectivity features, enabling them to collect and exchange data, automate tasks, and interact with the environment.

You will find this term commonly used in IoT, Embedded Systems, Smart Devices

Internet Protocol Suite

The conceptual model and set of communications protocols used on the Internet and similar computer networks. Commonly known as TCP/IP.

You will find this term commonly used in Networking

Internet Protocol Television (IPTV) Technologies

Technologies used to deliver television services over the internet or local area networks (LANs), unlike traditional terrestrial, satellite signal, and cable television formats.

You will find this term commonly used in Networking, Telecommunications

Internet Service Manager (ISM)

A management tool provided by Microsoft for managing Internet Information Services (IIS) and other web services, allowing administrators to create and manage web sites, applications, and virtual directories.

You will find this term commonly used in Networking, Web Development

Internet Service Quality

The measurement and assessment of the performance and reliability of internet services, including speed, uptime, and user satisfaction.

You will find this term commonly used in Networking, Service Management

Interoperability

The ability of computer systems or software to exchange and make use of information without special effort from the user or the system.

You will find this term commonly used in Software Development, Networking

Interoperability Standards

Agreed-upon specifications for making systems and products work together. These standards enable different information technology systems and software applications to communicate and exchange data.

You will find this term commonly used in Software Development, Networking

Interoperability Testing

Testing that evaluates the interoperability of a software application or system with others, ensuring they can work together within the same environment.

You will find this term commonly used in Software Development, QA

Interpolation

A method of constructing new data points within the range of a discrete set of known data points.

You will find this term commonly used in Programming, Data Analysis

Interpretive Simulation

A type of simulation that runs models directly from high-level descriptions at runtime rather than compiling them into machine code, allowing for greater flexibility and ease of model changes.

You will find this term commonly used in AI, Development

Interstitial Advertisement

A full-page ad that appears before the actual webpage. In digital marketing, these ads are used to capture the user's attention while navigating between pages.

You will find this term commonly used in Digital Marketing, Web Development

Intraband Transition

In semiconductor physics, a transition of electrons within the same energy band, affecting the properties and behavior of semiconductors, relevant to the development of electronic and photonic devices.

You will find this term commonly used in Hardware, Development

Intranet Portal

A private network accessible only to an organization's staff, often consisting of a wide range of information and services from the organization's internal IT systems.

You will find this term commonly used in Networking, General IT

Intrusion Detection

The process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection Policy

A set of rules and configurations designed to detect and respond to unauthorized access or anomalies in network traffic.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection System (IDS)

A device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection System (IDS) Types

Various forms of IDS, including network-based (NIDS), host-based (HIDS), and application-based (AIDS), each designed to detect and potentially thwart unauthorized access or misuse of systems.

You will find this term commonly used in Security, Cybersecurity

Intrusion Prevention System (IPS)

An IT security device that monitors network and/or system activities for malicious activities, logs information about these activities, attempts to block/stop them, and reports them to management.

You will find this term commonly used in Security, Cybersecurity

Intrusion Simulation

The practice of mimicking cyber attack tactics and techniques in a controlled environment to test the effectiveness of security measures and identify vulnerabilities.

You will find this term commonly used in Security, Cybersecurity

Inventory Management Software

Software solutions designed to help businesses manage their inventory levels, orders, sales, and deliveries. It often includes features for product categorization, stock level tracking, and forecasting.

You will find this term commonly used in Business Management, General IT

Inventory Management System

Software tools or physical practices used to track resources and inventory levels within an organization.

You will find this term commonly used in IT Management, Supply Chain

Inverse Multiplexing

The process of combining multiple signals or data streams into one signal over a shared medium.

You will find this term commonly used in Networking, Telecommunications

Inversion of Control (IoC)

A design principle in software engineering where the control of objects or portions of a program is transferred to a container or framework. It’s often used in the development of applications.

You will find this term commonly used in Software Development

Investigative Data Mining

The process of using data mining techniques to identify patterns or anomalies that could suggest misconduct or criminal activities.

You will find this term commonly used in Data Analysis, Security

Investment Analysis in IT

The process of evaluating and selecting IT projects and assets based on their potential to generate financial returns, considering factors like costs, benefits, risks, and strategic alignment.

You will find this term commonly used in IT Management, Finance

Investment Analysis Software

Tools and platforms used to analyze financial data, assess investment opportunities, and make informed decisions about portfolio management, including features for market analysis, simulation, and reporting.

You will find this term commonly used in Finance, Business Intelligence

Investment in IT Security

The allocation of resources towards protecting information systems and data from cyber threats, including the purchase of security tools, hiring of specialists, and implementation of security measures.

You will find this term commonly used in Security, IT Management

IoC (Inversion of Control) Container

A software design pattern that manages the instantiation and provides the dependencies of classes.

You will find this term commonly used in Software Development

IOPS (Input/Output Operations Per Second)

A performance measurement used to benchmark computer storage devices like hard disk drives (HDD), solid-state drives (SSD), and storage area networks (SAN).

You will find this term commonly used in Hardware, General IT

IoT (Internet of Things)

Refers to the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

You will find this term commonly used in Networking, General IT

IoT Device Management

The process of administering, monitoring, and managing the IoT devices deployed across different environments, including provisioning, firmware updates, and security management.

You will find this term commonly used in IoT, IT Management

IoT Gateway

A device or software application that serves as a connection point between the cloud and controllers, sensors, and intelligent devices in the Internet of Things (IoT). It processes and translates data between different protocols.

You will find this term commonly used in IoT, Networking

IoT Network Protocols

Protocols used in the networking of IoT devices, including MQTT, CoAP, and AMQP, designed for efficient communication in constrained environments or over long distances.

You will find this term commonly used in IoT, Networking

IoT Platform

A suite of components that enable development, deployment, and management of IoT applications and devices, often providing capabilities such as device management, data collection, processing, and analytics.

You will find this term commonly used in IoT, Development

IoT Security

Refers to the safety component tied to the Internet of Things, and involves the safeguarding of connected devices and networks in the IoT.

You will find this term commonly used in Security, Cybersecurity

IoT Security Standards

Guidelines and protocols designed to secure Internet of Things devices and ecosystems from cyber threats, ensuring data privacy and system integrity.

You will find this term commonly used in Security, IoT

IP Address

A unique address that identifies a device on the internet or a local network, allowing for communication between devices.

You will find this term commonly used in Networking

IP Address Assignment

The process of allocating IP addresses to devices on a network, either statically by manual configuration or dynamically using DHCP or similar protocols.

You will find this term commonly used in Networking, IT Management

IP Address Leasing

The dynamic allocation of IP addresses to devices on a network, typically through DHCP.

You will find this term commonly used in Networking, IT Management

IP Address Management (IPAM)

The method by which Internet Protocol (IP) networking addresses (IPv4 and IPv6) are tracked and managed within a network.

You will find this term commonly used in Networking, Security

IP Anycast

A networking technique where a single IP address is assigned to multiple devices on the network, and the network routes the traffic to the nearest device.

You will find this term commonly used in Networking, Internet Technology

IP Canonicalization

The process of redirecting multiple IP addresses to a single primary domain, improving website consistency and preventing duplicate content issues for SEO.

You will find this term commonly used in Networking, Web Development

IP Core

In semiconductor design, a reusable unit of logic or a chip layout design that can be licensed to multiple fabricators or integrators as a building block for different semiconductor products.

You will find this term commonly used in Hardware, Development

IP Fast Reroute (IPFRR)

Mechanisms designed to quickly reroute traffic in the event of a failure within an IP network, minimizing packet loss and downtime.

You will find this term commonly used in Networking, Security

What's Your
Career Path?
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart