IT Glossary - L - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Local Area Network (LAN) Analysis

The process of examining the performance, health, and configuration of a LAN to identify issues, optimize performance, and ensure security. Tools and techniques used in LAN analysis can include packet sniffing, throughput testing, and network mapping.

You will find this term commonly used in Networking, IT Infrastructure

Local Area Network (LAN) Topology

The physical or logical arrangement of network devices in a LAN. Common topologies include star, ring, bus, and mesh, each with its own advantages and suitability for specific network requirements and architectures.

You will find this term commonly used in Networking

Local Coherence

In distributed systems, a consistency model that ensures data remains consistent across multiple nodes within a localized region or segment of the network. This model can be used to improve performance while still maintaining a degree of data integrity.

You will find this term commonly used in Distributed Systems, Networking

Local Optimum

In optimization, a solution that is better than or equal to all nearby solutions but not necessarily the best overall solution. Finding global optima is a key challenge in fields like machine learning and operations research.

You will find this term commonly used in Algorithms, Optimization

Local Storage

Local storage refers to data storage solutions that are directly attached to a computing device, such as hard disk drives or SSDs.

You will find this term commonly used in Storage

Local Variable

A variable that is declared inside a function or block and is only accessible within that function or block. It's used to store temporary information that is not needed outside the function.

You will find this term commonly used in Programming

Localhost

A hostname that means this computer. It is used to access the network services that are running on the host via the loopback network interface.

You will find this term commonly used in Networking, General IT

Localization (L10N)

The process of adapting software for a specific region or language by adding locale-specific components and translating text.

You will find this term commonly used in Software Development

Localization Testing

The process of adapting software for a specific region or language by not just translating the text, but also by adapting the graphical user interface, input methods, and content to meet local needs, followed by testing to ensure the adaptations are correct.

You will find this term commonly used in Software Development, Testing

Location Intelligence

The process of deriving meaningful insight from geospatial data relationships to solve a particular problem. It involves the use of geographic information systems (GIS) and is widely used in marketing, logistics, and urban planning.

You will find this term commonly used in GIS, Business Intelligence

Location Transparency

In distributed computing, the characteristic of a system that allows resources to be accessed without knowledge of their physical or network location. This abstraction allows for easier resource access and management in distributed environments.

You will find this term commonly used in Distributed Computing, Networking

Location-Based Services (LBS)

Services offered through mobile devices based on the device's geographic location, providing relevant information or entertainment. LBS utilize GPS and network data to offer navigation, social networking, or advertising content.

You will find this term commonly used in Mobile Computing, GIS

Lock (Computer Science)

A mechanism used in concurrent programming to prevent simultaneous access to a resource, such as a file or database record.

You will find this term commonly used in General IT, Security

Lock Contention

A situation in concurrent programming where multiple threads or processes attempt to acquire a lock held by another thread, leading to a delay in progress or deadlock. Managing lock contention is crucial for optimizing the performance of concurrent applications.

You will find this term commonly used in Concurrent Programming, Performance Optimization

Lock-Free Programming

A programming approach that avoids locking mechanisms to manage concurrency in multi-threaded applications. It relies on algorithms that ensure system-wide progress without the need for locks, reducing potential bottlenecks.

You will find this term commonly used in Software Development

Locking Mechanisms

In computing, locking mechanisms are used to manage access to resources in a multi-threaded environment, ensuring that only one thread can access the resource at a time to prevent race conditions and ensure data integrity.

You will find this term commonly used in Software Development, Concurrency

Log Analysis

Log analysis involves reviewing and interpreting log files generated by computer systems or applications to identify trends or issues.

You will find this term commonly used in Security

Log File

A file that records events that occur in an operating system or other software runs, often used for troubleshooting purposes.

You will find this term commonly used in General IT, Security

Log File Analysis

The process of examining log files generated by servers, applications, or operating systems to diagnose problems, audit activities, or gather statistical information. It is a critical practice for IT security, system administration, and performance monitoring.

You will find this term commonly used in IT Security, System Administration

Log Management

Log management involves the collection, storage, analysis, and archival of log data generated by computer systems, networks, or applications.

You will find this term commonly used in Security

Log Shipping

A strategy used in database replication and backup, where transaction logs are automatically copied and restored onto a standby server. This helps in maintaining a backup server or setting up a failover cluster.

You will find this term commonly used in Database, Disaster Recovery

Log-Based Recovery

A method in database systems where changes are logged to ensure that in the event of a failure, the database can be recovered to a consistent state by replaying or undoing logged operations. It's essential for ensuring data integrity and availability.

You will find this term commonly used in Databases, Data Recovery

Log-Structured File System

A file system in which data and metadata are written sequentially to a circular log, improving write performance and wear leveling on devices like SSDs. It is designed to handle workloads with heavy write operations.

You will find this term commonly used in Storage, File Systems

Log-Structured Merge-tree (LSM-tree)

A data structure with optimizations for write and read operations, commonly used in database systems and storage engines to manage high volumes of data. It improves performance by batching writes and minimizing random access.

You will find this term commonly used in Databases, Data Structures

Logarithmic Complexity

Describes an algorithm whose performance will increase logarithmically as the size of the data input increases. This is considered very efficient, especially for large datasets, as seen in algorithms like binary search.

You will find this term commonly used in Algorithms, Data Analysis

Logarithmic Time Complexity (O(log n))

A measure of algorithm efficiency such that the time/space required to complete an operation increases logarithmically as the size of the data structures increase. Common in algorithms that break problems in half every iteration, like binary search.

You will find this term commonly used in Algorithms, Programming

Logic Bomb

A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

You will find this term commonly used in Security, Cybersecurity

Logic Gate

A device that performs a basic logical function such as AND, OR, or NOT, used in digital circuits.

You will find this term commonly used in General IT, Hardware

Logic Level

Represents the state of a digital signal, commonly binary high or low states, corresponding to a specific voltage range. Logic levels are fundamental in digital circuits design and interfacing.

You will find this term commonly used in Hardware, Electronics

Logic Programming

A programming paradigm based on formal logic, where program statements express facts and rules about problems within a system of formal logic.

You will find this term commonly used in AI, General IT

Logic Synthesis

The process of converting a high-level description of circuit functionality into a low-level implementation that can be directly fabricated on a chip. It's a key step in the design flow of digital integrated circuits.

You will find this term commonly used in Electronic Design Automation

Logical Address Space

The address space viewed by the process, which may differ from the physical memory addresses due to abstractions, memory management, and virtualization. It allows for safer and more efficient memory utilization by an operating system.

You will find this term commonly used in Operating Systems

Logical Bomb

A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

You will find this term commonly used in Cybersecurity

Logical Clocks

An algorithm for generating a sequence of timestamps in distributed systems to order events and ensure data consistency without relying on synchronized physical clocks. Logical clocks are crucial in the coordination of distributed systems.

You will find this term commonly used in Distributed Systems, Algorithms

Logical Consistency

A property of distributed systems that ensures all nodes in the system appear to operate in a coherent and consistent manner, despite the possibility of failures or the distributed nature of the system.

You will find this term commonly used in Distributed Systems, Data Management

Logical Data Model

An abstract model that organizes data elements and standardizes how the data elements relate to one another.

You will find this term commonly used in Data Management

Logical Data Recovery

The process of retrieving data lost due to logical errors, such as file corruption, accidental deletion, or formatting, without the need to repair physical damage to the storage media. It often involves file system repair and data extraction techniques.

You will find this term commonly used in Data Recovery, IT Services

Logical Deduction

The process of reasoning from one or more statements (premises) to reach a logically certain conclusion. It's used in programming, particularly in algorithms that involve decision making, and in proving correctness of algorithms.

You will find this term commonly used in Algorithms, Programming

Logical Drive

A partition on a physical storage device that the operating system can manage and access as if it were a physical drive. Logical drives are used to organize and manage data storage more efficiently.

You will find this term commonly used in Storage, Operating Systems

Logical Inference

The process of deriving new logical statements from existing statements through the application of logical rules. It's fundamental in automated reasoning, artificial intelligence, and the development of expert systems.

You will find this term commonly used in Artificial Intelligence

Logical Network Design

A part of network design that precedes the physical implementation, focusing on high-level design aspects such as IP addressing schemes, routing protocols, and network services without dictating specific hardware and connections.

You will find this term commonly used in Networking

Logical Operator

An operator that returns a boolean result based on the boolean result of one or two other expressions.

You will find this term commonly used in Programming

Logical Operators in Programming

Operators used in programming to perform logical operations, such as AND, OR, and NOT, on boolean values. They are fundamental in conditional statements and loops to control the flow of programs based on conditions.

You will find this term commonly used in Programming

Logical Partition

A division of a computer's hard disk into separate and independent virtual disks.

You will find this term commonly used in General IT, Hardware

Logical Partitioning (LPAR)

A method of subdividing a computer's hardware resources into multiple sets of logical systems, each capable of running its own operating system and applications. It is used in mainframes and some high-end servers for resource isolation and maximization.

You will find this term commonly used in Virtualization, System Administration

Logical Topology

Logical topology refers to the way data is transmitted between nodes in a network regardless of the physical layout.

You will find this term commonly used in Networking

Logical Volume

A logical volume is a virtual storage device created by combining multiple physical storage devices such as disks or partitions.

You will find this term commonly used in Storage

Logical Volume Management (LVM)

A device mapper framework that provides logical volume management for the Linux kernel.

You will find this term commonly used in General IT, Storage

Login

The process by which an individual gains access to a computer system by identifying and authenticating themselves.

You will find this term commonly used in Security, General IT

Logistics Management System

A software system designed for managing the storage and transportation of goods.

You will find this term commonly used in Supply Chain Management

What's Your
Career Path?
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart