IT Glossary - M - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Message Signature

A digital code (generated and authenticated by public key cryptography) attached to an electronically transmitted message to verify its contents and the sender's identity.

You will find this term commonly used in Cybersecurity, Networking

Message-Oriented Middleware (MOM)

Software or hardware infrastructure supporting sending and receiving messages between distributed systems.

You will find this term commonly used in Networking, Software Development

Metadata

Data that provides information about other data, such as file size, creation date, or author.

You will find this term commonly used in General IT

Metadata Catalog

A repository of data descriptions and dataset information, making it easier for analysts and data scientists to find, understand, and manage data.

You will find this term commonly used in Data Management

Metadata Discovery

The process of identifying and extracting metadata from various data sources, which is essential for data management and integration projects.

You will find this term commonly used in Data Management

Metadata Extraction

The process of identifying and extracting key information from various types of data, such as file properties or database records.

You will find this term commonly used in Data Management

Metadata Harvesting

The process of collecting metadata from various sources to provide a consolidated view of information across systems.

You will find this term commonly used in Data Management, Web Development

Metadata Management

The process of organizing, storing, and managing metadata to ensure its accuracy, consistency, and usability.

You will find this term commonly used in General IT

Metadata Repository

A metadata repository is a centralized database or system that stores and manages metadata, providing a unified view and access to metadata across an organization's IT systems and applications.

You will find this term commonly used in Data Management

Metadata Synchronization

The process of ensuring that metadata (data about data) remains consistent and up to date across different systems, databases, or storage locations.

You will find this term commonly used in Data Management, Networking

Method Chaining

A programming technique that allows multiple methods to be called on the same object in a single line of code.

You will find this term commonly used in Software Development

Method Overloading

A feature that allows a class to have more than one method having the same name, if their parameter lists are different.

You will find this term commonly used in Software Development, Programming

MIB (Management Information Base)

A database used for managing the entities in a communication network. It is used in Simple Network Management Protocol (SNMP) for network monitoring.

You will find this term commonly used in Networking

Micro-Optimization

The process of making very small changes in a system's code or configuration to improve performance, often at a very detailed or low level.

You will find this term commonly used in Software Development, Performance Optimization

Micro-SIM

A smaller version of a SIM (Subscriber Identity Module) card used in mobile devices for storing data identifying the mobile subscriber.

You will find this term commonly used in Telecommunications

Micro-Virtualization

A security technology that isolates individual tasks on a computer in their own virtual environments, preventing malware from affecting other tasks or the system at large.

You will find this term commonly used in Cybersecurity, Virtualization

Microblog

A form of blogging that allows users to write brief text updates (usually less than 200 characters) and publish them, either to be viewed by anyone or by a restricted group.

You will find this term commonly used in Social Media

Microblogging

A form of blogging that allows users to write brief text updates (usually less than 200 characters) and publish them, either to be viewed by anyone or by a restricted group.

You will find this term commonly used in Social Media, Web Development

Microblogging Platform

An online platform that allows users to post short messages or updates. Examples include Twitter and Tumblr.

You will find this term commonly used in Social Media, Communication

Microcode

A layer of hardware-level instructions or data structures involved in the implementation of higher-level machine code instructions in complex instruction set computers, typically for the purpose of improving performance, security, or both.

You will find this term commonly used in Hardware, Programming

Microcontroller

A compact integrated circuit designed to govern a specific operation in an embedded system.

You will find this term commonly used in Hardware, Embedded Systems

Microdata

A specification used to nest metadata within existing content on web pages.

You will find this term commonly used in Web Development, SEO

Microkernel

A minimalistic computer operating system kernel designed to provide the most basic services to all other parts of the operating system and run in the privileged CPU mode. Unlike monolithic kernels, which include a wide variety of services within the kernel itself, a microkernel tries to run most services in user space to improve maintainability and security.

You will find this term commonly used in Operating Systems, Software Architecture

Microprocessor

An integrated circuit that contains the functions of a central processing unit (CPU) on a single chip.

You will find this term commonly used in General IT

Microsegmentation

Microsegmentation is a security technique that divides a network into smaller, isolated zones to enhance security by controlling and restricting lateral movement of threats within the network.

You will find this term commonly used in Security, Networking, Cybersecurity

Microservices

A software development approach where applications are divided into small, independently deployable services that communicate via APIs.

You will find this term commonly used in General IT

Microservices Architecture

Microservices architecture is an architectural style that structures software applications as a collection of loosely coupled, independently deployable services, each responsible for specific business functions, enabling scalability and agility.

You will find this term commonly used in Software Architecture, Cloud Computing, Scalability

Microsoft

Offers certifications for its products and technologies, including Azure, Office 365, and Windows Server, catering to various roles like administrators, developers, and solutions architects.

You will find this term commonly used in Cloud Computing, Product-specific Technologies

Microsoft Azure

A cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers.

You will find this term commonly used in Cloud Computing, Web Services

Microsoft Certified: Azure Administrator Associate

Validates skills in implementing, managing, and monitoring an organization’s Microsoft Azure environment.

You will find this term commonly used in Cloud Computing

Microsoft Certified: Azure Data Scientist Associate

Demonstrates the ability to apply data science and machine learning to implement and run machine learning workloads on Azure.

You will find this term commonly used in Data Science, Cloud Computing

Microsoft Certified: Azure Solutions Architect Expert

Demonstrates expertise in computing, networking, storage, and security for designing solutions that run on Azure.

You will find this term commonly used in Cloud Computing

Microsoft Certified: Data Analyst Associate

Validates the ability to transform, visualize, and analyze data using Microsoft Power BI.

You will find this term commonly used in Data Analysis

Microsoft Certified: Dynamics 365 Fundamentals

Demonstrates understanding of Microsoft Dynamics 365; its business applications, cloud solutions, and benefits.

You will find this term commonly used in CRM, ERP

Microsoft Certified: Security, Compliance, and Identity Fundamentals

Covers the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

You will find this term commonly used in Security, Compliance

Microsoft Office

A suite of office productivity applications that includes Word, Excel, PowerPoint, and more.

You will find this term commonly used in General IT, Productivity

Microsoft SQL Server

A relational database management system developed by Microsoft.

You will find this term commonly used in Databases

Middleware

Software that acts as an intermediary between different applications, enabling communication and data management.

You will find this term commonly used in General IT

Middleware Framework

Software that provides common services and capabilities to applications outside of what's offered by the operating system.

You will find this term commonly used in Software Development

Middleware Integration

Middleware integration involves the integration of various middleware components and systems to facilitate seamless communication and data exchange between different applications and platforms.

You will find this term commonly used in Integration, General IT, Software Development

Middleware Management

The process of managing the software that provides common services and capabilities to applications outside of what's offered by the operating system, facilitating communication and data management.

You will find this term commonly used in Software Development, IT Management

Middleware Services

Software that provides common services and capabilities to applications beyond those offered by the operating system. This software mediates interaction between application components or between applications and the network.

You will find this term commonly used in Software Development, Networking

Migration

The process of moving data, applications, or other business elements from one environment to another.

You will find this term commonly used in General IT, Cloud Computing

Migration Path

A detailed plan that describes the process of moving from one system to another, covering data, applications, and hardware.

You will find this term commonly used in Cloud Computing, IT Infrastructure

MIME (Multipurpose Internet Mail Extensions)

A standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs.

You will find this term commonly used in Email Systems, Networking

MIME Type

A standard that indicates the nature and format of a document, file, or assortment of bytes. It stands for Multipurpose Internet Mail Extensions Type.

You will find this term commonly used in General IT, Web Development

Minification

The process of removing all unnecessary characters from source code without changing its functionality, used to reduce file size and improve load times in web development.

You will find this term commonly used in Web Development

Miracast

A standard for wireless connections from devices (such as laptops, tablets, or smartphones) to displays (such as TVs, monitors, or projectors). It allows for screen mirroring.

You will find this term commonly used in Networking, General IT

Mirror Site

An exact replica of a website or set of files hosted on a server at a different location to reduce network traffic, improve access speed, or improve availability.

You will find this term commonly used in Networking, Web Development

Mirroring

A redundancy solution that involves maintaining copies of a database, disk, or server to ensure continuous availability and minimize downtime in the event of hardware failure or maintenance.

You will find this term commonly used in Data Storage, Disaster Recovery

What's Your
Career Path?
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart