IT Glossary - L - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Lexical Analyzer

A program or part of a program that performs lexical analysis. It processes an input sequence of characters and produces a sequence of symbols called lexical tokens. It's a fundamental part of compilers and interpreters.

You will find this term commonly used in Programming, Compiler Design

Lexical Closure

A function that retains access to variables from its enclosing scope even after the outer function has completed execution. Closures are powerful features of functional programming languages and enable techniques like data encapsulation.

You will find this term commonly used in Programming

Lexical Scope

A type of scope that defines how variable names are resolved in nested functions: outer variables can be accessed by inner functions.

You will find this term commonly used in Programming

Lexical Scoping

A convention determining how variable names are resolved in nested functions: inner functions contain the scope of their enclosing (outer) functions. It's crucial for understanding the visibility and lifetime of variables in programming languages.

You will find this term commonly used in Programming

Lexical Variable

A variable defined in a lexical scope, which is a region of a program where the variable is defined and beyond which the variable cannot be accessed. Lexical variables help manage variable visibility and lifetimes in block-structured programming languages.

You will find this term commonly used in Programming

Lexicon

In natural language processing, a lexicon is a dictionary's language data that includes its vocabulary and information regarding how those words are used.

You will find this term commonly used in Natural Language Processing

Library

A library is a collection of precompiled routines, functions, and classes that can be used to develop software applications.

You will find this term commonly used in Programming

Library (Computing)

A collection of non-volatile resources used by computer programs, often for software development.

You will find this term commonly used in General IT, Software Development

Library Management System (LMS)

Software used to manage the operations of a library, including cataloging, search, circulation, and inventory management.

You will find this term commonly used in Information Systems

Library Science

The study of how information resources are organized, categorized, stored, retrieved, and disseminated. It includes the management of digital information and the development of information systems and services.

You will find this term commonly used in Information Science, Data Management

Library Versioning

The practice of assigning unique versions to software libraries to indicate changes or updates. This helps in dependency management, ensuring compatibility between different software components and facilitating effective maintenance and updates.

You will find this term commonly used in Software Development

License

A license is a legal agreement that grants permission to use a software product under specified terms and conditions.

You will find this term commonly used in General IT

License Auditing

The process of conducting a systematic review of software licenses within an organization to ensure compliance with software licenses agreements. This includes verifying that the number of installations does not exceed the number of licenses purchased.

You will find this term commonly used in IT Management, Compliance

License Compliance

The adherence to the terms and conditions laid out in software licenses. This includes proper use, distribution, and modification of software, often reviewed during audits to avoid legal and security issues.

You will find this term commonly used in Software Development, Legal

License Key

A data string that verifies authorized software product access. This type of software security helps prevent software piracy and gives organizations the ability to control their software.

You will find this term commonly used in Software Development, Security

License Management

License management involves tracking, controlling, and optimizing the usage of software licenses within an organization.

You will find this term commonly used in General IT

Lidar (Light Detection and Ranging)

A surveying method that measures distance to a target by illuminating the target with laser light and measuring the reflected light with a sensor.

You will find this term commonly used in Hardware/Automation

Life Cycle Assessment (LCA)

A technique to assess environmental impacts associated with all the stages of a product's life from raw material extraction through materials processing, manufacture, distribution, use, repair and maintenance, and disposal or recycling.

You will find this term commonly used in Sustainability, IT Management

Lifecycle Hook

In software development, a feature that allows the execution of custom code at certain points within the lifecycle of a component or application, often used in frameworks like Angular or React.

You will find this term commonly used in Software Development

LIFO (Last In, First Out)

LIFO is a method of data storage and retrieval where the last item to be stored is the first one to be retrieved.

You will find this term commonly used in Data Structures

LIFO Buffer (Last In, First Out)

A type of data storage scheme that stores and retrieves data using a last-in, first-out approach.

You will find this term commonly used in Data Structures

Light Field Camera

A camera that captures information about the light field emanating from a scene; that is, the intensity of light in a scene, and also the direction that the light rays are traveling in space. This technology enables advanced imaging features like refocusing.

You will find this term commonly used in Hardware, Imaging Technology

Light Pen

An input device that allows users to point to displayed objects or draw on a screen by detecting the light. It's historically significant in computer graphics and user interface design, though less common in modern computing environments.

You will find this term commonly used in Human-Computer Interaction

Lightweight

Lightweight refers to software or protocols that consume minimal system resources or bandwidth.

You will find this term commonly used in General IT

Lightweight Cryptography

Cryptographic algorithms and protocols that are designed to be efficient enough to run on resource-constrained devices like RFID tags, sensors, and small IoT devices. It aims to ensure security without overwhelming limited processing capabilities.

You will find this term commonly used in Security, Cryptography

Lightweight Directory Access Protocol (LDAP) Integration

The process of connecting and synchronizing a system or application with an LDAP directory for user and group management. This allows for centralized authentication, authorization, and user management in enterprise environments.

You will find this term commonly used in Security, Systems Administration

Lightweight Process

A thread or execution context that requires fewer resources to create and terminate compared to a traditional heavyweight process. Often used to improve the performance of applications by minimizing system resource usage.

You will find this term commonly used in Operating Systems, Software Development

Lightweight Protocol

A lightweight protocol is a network protocol designed to minimize overhead and resource usage, often used in IoT devices or constrained environments.

You will find this term commonly used in Networking

Line Coding

A method of converting digital data to digital signals. Line coding involves the representation of a digital signal on a transmission line. This process is fundamental in data communication as it affects signal integrity and efficiency.

You will find this term commonly used in Telecommunications, Networking

Line Conditioning

A process used in telecommunications to improve the quality of the line or signal, including noise reduction and error correction techniques.

You will find this term commonly used in Networking

Line of Code (LOC)

Line of code (LOC) is a metric used to measure the size or complexity of a software program by counting the number of lines of code.

You will find this term commonly used in Software Development

Linear Programming

A mathematical method for determining a way to achieve the best outcome in a given mathematical model for some list of requirements represented as linear relationships.

You will find this term commonly used in Operations Research/Computer Science

Linear Regression

Linear regression is a statistical method used to model the relationship between a dependent variable and one or more independent variables by fitting a linear equation to the observed data.

You will find this term commonly used in Data Analysis

Linear Search

A method for finding a target value within a list that sequentially checks each element of the list until a match is found or the whole list has been searched.

You will find this term commonly used in Algorithms, Programming

Linearizability

A consistency condition for distributed systems that ensures global operations appear to occur instantaneously at some point between their start and end times. It's key for understanding the correctness of concurrent algorithms and systems.

You will find this term commonly used in Distributed Systems

Linguistic Variable

A variable whose values are words or sentences in natural or artificial language.

You will find this term commonly used in AI/Fuzzy Logic

Link

A link is a communication pathway that connects two or more devices in a network.

You will find this term commonly used in Networking

Link Aggregation

A method of combining multiple network connections in parallel to increase throughput and provide redundancy in case one link fails.

You will find this term commonly used in Networking

Link Encryption

Link encryption is the process of encrypting data as it travels over a network link to prevent unauthorized access.

You will find this term commonly used in Security

Link Failure

Link failure occurs when a network connection or communication link becomes unavailable or non-functional.

You will find this term commonly used in Networking

Link Farm

A group of websites that all hyperlink to every other site in the group to increase search engine rankings. Considered a form of spamdexing.

You will find this term commonly used in Cybersecurity/SEO

Link Farming

The practice of creating a network of websites that link to each other, often with the sole purpose of increasing the number of inbound links to a particular site to manipulate search engine rankings. It's considered a black hat SEO technique.

You will find this term commonly used in Web Development, SEO

Link Layer

The link layer is the lowest layer in the OSI model responsible for the physical transmission of data between nodes on a network.

You will find this term commonly used in Networking

Link Popularity

A measure used by search engines to determine the relevance and importance of websites, based on the number of inbound links.

You will find this term commonly used in SEO

Link Prediction

A problem in network theory where the goal is to predict the formation of new links or the disappearance of existing links in networks. It's used in social network analysis, bioinformatics, and recommendation systems.

You will find this term commonly used in Data Analysis, Machine Learning

Link Quality Monitoring

Link quality monitoring is the process of assessing the performance and reliability of network links based on factors such as packet loss, latency, and jitter.

You will find this term commonly used in Networking

Link Rot

The process by which hyperlinks on the internet point to web pages, servers, or other resources that have become permanently unavailable over time. Link rot is a significant issue for maintaining the reliability and integrity of digital documents and references.

You will find this term commonly used in Web Development, Digital Archiving

Link Speed

Link speed refers to the maximum data transfer rate supported by a network connection or interface.

You will find this term commonly used in Networking

Link State Advertisement (LSA)

A type of network protocol message in OSPF used to inform other routers about the network topology.

You will find this term commonly used in Networking

Link-local Address

A link-local address is an IP address assigned to a network interface for communication within a local network segment.

You will find this term commonly used in Networking

What's Your
Career Path?
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart