IT Glossary - L - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Layered Security

Layered security is an approach to cybersecurity that employs multiple layers of defense mechanisms to protect against various threats.

You will find this term commonly used in Cybersecurity

Lazy Evaluation

A programming technique where evaluation of an expression is delayed until its value is actually needed. It can improve performance by avoiding unnecessary calculations, and it can create potential for infinitely large data structures.

You will find this term commonly used in Programming

Lazy Initialization

A programming technique where the instantiation of an object or the execution of a computation is delayed until its first use. This can optimize performance and resource usage, particularly in scenarios with heavy or rarely used objects.

You will find this term commonly used in Software Development

Lazy Loading

A design pattern commonly used in computer programming and web design that defers initialization of an object until the point at which it is needed. It can contribute to efficiency in the program's operation if properly and appropriately used.

You will find this term commonly used in Software Development, Web Development

LCD (Liquid Crystal Display)

LCD is a type of flat-panel display that uses liquid crystals to produce images.

You will find this term commonly used in Hardware

LCD Monitor

An LCD monitor is a computer monitor that uses liquid crystal displays to produce images.

You will find this term commonly used in Hardware

LDAP (Lightweight Directory Access Protocol)

A protocol used to access and maintain distributed directory information services over an Internet Protocol network.

You will find this term commonly used in Networking, Security

LDAP Authentication

LDAP authentication is a method of validating user credentials against a directory service using the Lightweight Directory Access Protocol (LDAP).

You will find this term commonly used in Security

LDAP Injection

A type of cyber attack used to exploit web-based applications that construct LDAP statements based on user input, potentially allowing attackers to gain unauthorized access to information in the LDAP tree.

You will find this term commonly used in Security, Cybersecurity

LDAP Integration

The process of connecting and synchronizing a system or application with an LDAP directory for user and group management. This allows for centralized authentication, authorization, and user management in enterprise environments.

You will find this term commonly used in Security, Systems Administration

LDAP Server

An LDAP server is a software application that stores and organizes directory information, accessible through the LDAP protocol.

You will find this term commonly used in Networking

LDAP Synchronization

The process of ensuring that data across different LDAP directories or between an LDAP directory and other systems remains consistent and up-to-date. It involves periodic or real-time replication of entries to maintain synchronization.

You will find this term commonly used in Systems Administration, Security

Lead Conversion

In digital marketing, the process of converting a lead into a paying customer. This is a key metric in evaluating the effectiveness of marketing strategies and sales processes.

You will find this term commonly used in Digital Marketing

Lead Scoring

A methodology used to rank prospects against a scale that represents the perceived value each lead represents to the organization.

You will find this term commonly used in Marketing/CRM

Leadership in Energy and Environmental Design (LEED)

An ecology-oriented building certification program run by the non-profit U.S. Green Building Council (USGBC). It includes some IT and systems integration to manage resources efficiently in buildings.

You will find this term commonly used in General IT, Sustainability

Leadership in IT

The act of guiding and influencing the strategic direction and operation of IT organizations. Effective IT leadership involves decision-making on technology investments, policy formulation, and fostering innovation within teams.

You will find this term commonly used in IT Management

Leaf Node

In a tree data structure, a leaf node is a node that does not have child nodes. Leaf nodes represent the "end" points of a tree, often containing the actual data or values in structures like binary search trees or XML documents.

You will find this term commonly used in Data Structures, Programming

Leak Detection in Software

The process of identifying and fixing leaks in software, where resources like memory, database connections, or file handles are not released after use. Detecting and fixing leaks is crucial for preventing performance degradation and application crashes.

You will find this term commonly used in Software Development, Performance Optimization

Lean IT

An extension of lean manufacturing and lean services principles to the development and management of information technology (IT) products and services. Its goal is to continuously improve the value delivered by IT services and products.

You will find this term commonly used in IT Management, Productivity

Lean Software Development

An adaptation of lean manufacturing principles and practices to the software development domain.

You will find this term commonly used in Software Engineering

Lean Software Engineering

Applying lean manufacturing principles to software development to enhance efficiency, reduce waste, and improve product value. It emphasizes continuous improvement, optimizing flow, and delivering quickly in response to customer needs.

You will find this term commonly used in Software Development

Lean Startup

A methodology for developing businesses and products that aims to shorten product development cycles by adopting a combination of business-hypothesis-driven experimentation, iterative product releases, and validated learning.

You will find this term commonly used in Business, Product Management

Learning Analytics

The measurement, collection, analysis, and reporting of data about learners and their contexts, for purposes of understanding and optimizing learning and the environments in which it occurs.

You will find this term commonly used in Education Technology, Data Analysis

Learning Curve

In the context of machine learning and general skill acquisition, the learning curve represents the rate at which performance improves as a function of experience or the amount of learning/training.

You will find this term commonly used in Education, Machine Learning

Learning Management System (LMS)

A software application for the administration, documentation, tracking, reporting, and delivery of educational courses or training programs.

You will find this term commonly used in Education Technology

Learning Rate

In machine learning, a parameter that determines the step size at each iteration while moving toward a minimum of a loss function. It's critical for training models efficiently and effectively.

You will find this term commonly used in Machine Learning

Leased Line

A private bidirectional or symmetric telecommunications circuit between two or more locations provided according to a commercial contract.

You will find this term commonly used in Networking

Leased Line Internet Connection

A private telecommunications circuit leased for exclusive use from a service provider, typically used by businesses to connect geographically distant offices. Unlike broadband, a leased line is not shared and offers symmetric data rates.

You will find this term commonly used in Networking

Least Common Denominator (LCD)

LCD is a term used in networking to describe the lowest level of functionality or compatibility shared among different devices or systems.

You will find this term commonly used in Networking

Least Common Multiple (LCM)

LCM is the smallest positive integer that is divisible by two or more numbers without leaving a remainder, often used in scheduling or resource allocation algorithms.

You will find this term commonly used in Mathematics

Least Connection Scheduling

A load balancing method that assigns new requests to the server with the fewest active connections. It's considered when distributing client requests in various types of networks to ensure even workload distribution.

You will find this term commonly used in Networking, Load Balancing

Least Cost Routing

Least cost routing is a telecommunications strategy that selects the most economical path for transmitting data or voice traffic based on predefined criteria such as cost or quality.

You will find this term commonly used in Networking

Least Privilege

A principle in computer security in which users are given the minimum levels of access – or permissions – needed to perform their duties.

You will find this term commonly used in Security, Cybersecurity

Least Privilege Principle

The least privilege principle is a security concept that advocates granting users only the minimum level of access or permissions required to perform their tasks.

You will find this term commonly used in Security

Least Recently Used (LRU)

LRU is a caching algorithm that evicts the least recently used items from a cache when the cache is full.

You will find this term commonly used in Algorithms

Least Significant Bit (LSB)

LSB is the bit position in a binary number representing the smallest value, often used in digital signal processing or cryptography.

You will find this term commonly used in Hardware/Security

Least Squares Regression

Least squares regression is a statistical method used to find the best-fitting line through a set of data points by minimizing the sum of the squares of the differences between observed and predicted values.

You will find this term commonly used in Data Analysis

LED (Light Emitting Diode)

A semiconductor light source that emits light when current flows through it. LEDs are used in a wide range of applications, including indicator lights, digital displays, and increasingly, general-purpose lighting.

You will find this term commonly used in Hardware, Electronics

LED Display

A display technology that uses light-emitting diodes to create images. LED displays are used in a wide range of applications, from small indicators to large outdoor advertising screens, because of their brightness, energy efficiency, and longevity.

You will find this term commonly used in Hardware, Display Technology

Left-Hand-Side (LHS) Operator

In programming, the left-hand side of an assignment statement, which identifies the memory location or variable that will receive the value of the right-hand side expression. It's fundamental in understanding how values are assigned and stored in programming.

You will find this term commonly used in Programming

Legacy Code

Legacy code refers to outdated or obsolete software code that is still in use but may be difficult to maintain or update.

You will find this term commonly used in Software Development

Legacy Code Refactoring

The process of restructuring existing computer code without changing its external behavior to improve nonfunctional attributes of the software. Refactoring legacy code is often undertaken to reduce complexity, improve readability, or make the code more maintainable.

You will find this term commonly used in Software Development

Legacy System

A legacy system is an outdated or obsolete computer system, software application, or technology that continues to be used.

You will find this term commonly used in General IT

Legal Tech

Technology used to support, enhance, and automate the practice of law. Legal tech includes software and tools for document management, legal research, case management, and more, aimed at law firms, courts, and legal departments.

You will find this term commonly used in Information Technology, Legal Industry

Legend

In the context of data visualization, a legend is a small area on a chart, graph, or map that explains the symbols, colors, or patterns used to represent the data.

You will find this term commonly used in Data Visualization

Legend in Data Visualization

An explanatory component of charts or graphs that helps decode the meanings of symbols, colors, or patterns used to represent data. It's essential for making data visualizations understandable and accessible to a wider audience.

You will find this term commonly used in Data Visualization

Level of Detail (LOD)

In computer graphics, a technique for increasing efficiency by decreasing the complexity of a 3D model representation as it moves away from the viewer or according to other metrics. It helps manage rendering load and improve performance.

You will find this term commonly used in Computer Graphics, Gaming

Leverage

Leverage refers to the strategic use of resources or technologies to gain a competitive advantage.

You will find this term commonly used in General IT

Leveraged Buyout (LBO)

A financial transaction in which a company is purchased with a combination of equity and significant amounts of borrowed money.

You will find this term commonly used in Finance/IT

Lexical Analysis

The process of converting a sequence of characters into a sequence of tokens (strings with an assigned and thus identified meaning).

You will find this term commonly used in Programming

What's Your
Career Path?
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart