IT Glossary - J - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

JIT (Just-In-Time) Compilation

A technique for improving the runtime performance of computer programs by compiling bytecode into native machine code at runtime.

You will find this term commonly used in Programming, Performance Optimization

JIT Cache

A cache used by Just-In-Time compilers to store recently compiled code for quick execution.

You will find this term commonly used in Performance Optimization, Compilers

JIT Compilation (Just-In-Time Compilation)

A technique for improving the performance of interpreted programs by compiling bytecode to machine code at runtime.

You will find this term commonly used in Performance Optimization, Software Development

Jitter

The variation in packet travel time that can cause delays in receiving data over a network.

You will find this term commonly used in Networking, Performance

Jitter Buffer

A shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals to reduce distortion in VoIP communications.

You will find this term commonly used in Networking, VoIP

Jitter Performance

The variation in latency/response time, measured in networking, affecting real-time applications like VoIP or online gaming.

You will find this term commonly used in Networking, Performance Optimization

Jitter Testing

The process of measuring the variability in latency/response time in packet-switched networks.

You will find this term commonly used in Networking, Performance Testing

JMeter

An open source software designed to load test functional behavior and measure performance.

You will find this term commonly used in Performance Testing, Software Development

JMeter Plugin

Extensions to the JMeter load testing tool that add functionalities such as new samplers, listeners, and other utilities.

You will find this term commonly used in Performance Testing, Software Development

JMS (Java Message Service)

A Java API that allows applications to create, send, receive, and read messages, enabling distributed communication that is loosely coupled, reliable, and asynchronous.

You will find this term commonly used in Enterprise Computing, Messaging

JMX (Java Management Extensions)

A Java technology that supplies tools for managing and monitoring applications, system objects, devices, and service-oriented networks.

You will find this term commonly used in Monitoring, Java

JNDI (Java Naming and Directory Interface)

A Java API for a directory service that allows Java software to look up data and resources in a network.

You will find this term commonly used in Networking, Software Development

JNDI (Java Naming and Directory Interface) Lookup

A feature in Java that allows Java applications to look up data and resources (such as databases and configuration information) in a directory service.

You will find this term commonly used in Java, Enterprise Computing

JNDI Resources

Objects bound to a naming service that Java EE applications can access using the Java Naming and Directory Interface (JNDI).

You will find this term commonly used in Enterprise Computing, Resource Management

JNI (Java Native Interface)

A framework that allows Java code running in the JVM to call and be called by native applications and libraries written in other languages.

You will find this term commonly used in Software Development, Interoperability

JNLP (Java Network Launch Protocol)

A protocol that gives an easy, one-click activation of applications, directly from the Internet using a web browser.

You will find this term commonly used in Software Deployment, Web Technology

Job Control Language (JCL)

A scripting language used on IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem.

You will find this term commonly used in Mainframe Computing, Automation

Job Queue

A data structure or service used to store jobs, or tasks, that await processing. Job queues are used to efficiently manage and distribute work across resources.

You will find this term commonly used in Software Development, System Management

Job Scheduler

A system software responsible for unattended background executions, commonly known as batch processing.

You will find this term commonly used in System Management, Automation

Job Scheduling

The activity of allocating system resources to various tasks by assigning them to work queues in a system scheduler.

You will find this term commonly used in System Administration, Task Management

JOGL (Java OpenGL)

A wrapper library that allows OpenGL to be used in the Java programming language.

You will find this term commonly used in Graphics Programming, Game Development

JOINS

In SQL, a JOIN clause is used to combine rows from two or more tables, based on a related column between them.

You will find this term commonly used in Database Management

Joint Photographic Experts Group (JPEG)

A commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.

You will find this term commonly used in Multimedia, Compression

Jolokia

A JMX-HTTP bridge providing an alternative to JSR-160 connectors. It is an agent-based approach with support for many platforms.

You will find this term commonly used in Monitoring, Management

JOLT (JSON to JSON transformation)

A JSON to JSON transformation library where the "specification" for the transform is itself a JSON document.

You will find this term commonly used in Data Transformation, Software Development

JOOQ (Java Object Oriented Querying)

A lightweight database-mapping and query library for Java that allows for building SQL queries through its API, providing a type-safe way to construct and execute SQL queries.

You will find this term commonly used in Database Management, Java

Journaling File System

A file system that keeps track of changes not yet committed to the file system's main part by recording the intentions of such changes in a data structure known as a "journal".

You will find this term commonly used in Storage, File Systems

JPA (Java Persistence API)

A Java application programming interface specification that describes the management of relational data in applications.

You will find this term commonly used in Software Development, Database Management

JPMS (Java Platform Module System)

Introduced in Java 9, it's a system for modularizing Java applications, allowing for encapsulation and dependencies management.

You will find this term commonly used in Software Development, Java

JPQL (Java Persistence Query Language)

A query language provided by the JPA specification for making queries against entities stored in a relational database.

You will find this term commonly used in Database Management, Software Development

jQuery

A fast, small, and feature-rich JavaScript library designed to simplify the client-side scripting of HTML.

You will find this term commonly used in Web Development

jQuery Mobile

A touch-optimized web framework (also known as a JavaScript library or mobile framework) designed to make responsive web sites and apps that are accessible on all smartphone, tablet, and desktop devices.

You will find this term commonly used in Web Development, Mobile Development

JRMP (Java Remote Method Protocol)

A protocol used for remote method invocation in Java, allowing an object on one Java virtual machine to invoke methods on an object in another JVM.

You will find this term commonly used in Distributed Computing, Networking

JRuby

A Java implementation of the Ruby programming language, allowing Ruby applications to be run on the Java platform.

You will find this term commonly used in Programming, Software Development

JSF (JavaServer Faces)

A Java specification for building component-based user interfaces for web applications.

You will find this term commonly used in Web Development, Software Development

JShell

An interactive command-line interface for Java programming, which allows for rapid development and testing.

You will find this term commonly used in Programming, Software Development

JSLint

A static code analysis tool used in software development for checking if JavaScript source code complies with coding rules.

You will find this term commonly used in Software Development, Code Quality

JSON (JavaScript Object Notation)

A lightweight data-interchange format that is easy for humans to read and write, and easy for machines to parse and generate.

You will find this term commonly used in Data Interchange, Web Development

JSON API

A specification for how a client should request that resources be fetched or modified, and how a server should respond to those requests, in JSON format.

You will find this term commonly used in Web Development, APIs

JSON Binding (JSON-B)

A standard binding layer for converting Java objects to/from JSON messages, part of Java EE.

You will find this term commonly used in Data Interchange, Java

JSON Parser

A tool or library that interprets JSON data into a readable format or a data structure, such as an object in programming languages.

You will find this term commonly used in Data Processing, Web Development

JSON Patch

A format for specifying updates to a JSON document, allowing for more efficient and targeted updates compared to sending a complete document.

You will find this term commonly used in Web Development, APIs

JSON Pointer

A string syntax for identifying a specific value within a JSON document. It's used for directly pointing to a nested JSON value.

You will find this term commonly used in Web Development, APIs

JSON Schema

A vocabulary that allows you to annotate and validate JSON documents.

You will find this term commonly used in Data Interchange, Web Development

JSON Streaming

A technique for processing JSON data stream rather than handling it all at once, useful for large JSON files or data streams.

You will find this term commonly used in Data Processing, Web Development

JSON Web Encryption (JWE)

A standard for encrypting JSON data. It provides a way to securely transmit sensitive information in JSON format.

You will find this term commonly used in Security, Web Development

JSON Web Key (JWK)

A JSON data structure that represents a cryptographic key. The JWK specification is a standard way to represent a public (or private) key in JSON format.

You will find this term commonly used in Security, Web Development

JSON Web Key Sets (JWKS)

A set of keys which contains the public keys used to verify any JSON Web Token (JWT) issued by the authorization server and signed using a supported algorithm.

You will find this term commonly used in Security, Web Development

JSON Web Signature (JWS)

A standard for signing JSON data to ensure its integrity and authenticity. It's widely used in token-based authentication systems.

You will find this term commonly used in Security, Web Development

JSON Web Tokens (JWT)

An open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.

You will find this term commonly used in Security, Web Development

What's Your
Career Path?
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart