IT Glossary - M - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mixed Reality (MR)

The merging of real and virtual worlds to produce new environments and visualizations where physical and digital objects co-exist and interact in real-time.

You will find this term commonly used in Virtual/Augmented Reality

Mobile Ad Hoc Network (MANET)

A continuously self-configuring, infrastructure-less network of mobile devices connected without wires. MANETs are a kind of wireless ad hoc network that usually has a routable networking environment on top of a Link Layer ad hoc network.

You will find this term commonly used in Networking, Mobile Computing

Mobile Application

Software designed to run on mobile devices such as smartphones and tablets, providing specific functionality or services.

You will find this term commonly used in General IT

Mobile Application Developer

Designs and develops applications for mobile devices, focusing on creating engaging and functional user experiences.

You will find this term commonly used in Mobile Development, Software Development

Mobile Application Development

Mobile application development is the process of creating software applications that are designed to run on mobile devices such as smartphones and tablets.

You will find this term commonly used in Mobile Applications, Software Development

Mobile Backend as a Service (MBaaS)

A model for providing web and mobile app developers with a way to link their applications to backend cloud storage and APIs exposed by back end applications while also providing features such as user management, push notifications, and integration with social networking services.

You will find this term commonly used in Mobile Development, Cloud Computing

Mobile Broadband

High-speed internet access provided through mobile phone towers to computers, mobile phones, or other devices.

You will find this term commonly used in Networking, Telecommunications

Mobile Computing

The use of portable computing devices such as smartphones, tablets, and laptops to access and process information.

You will find this term commonly used in General IT

Mobile Device Management

Mobile device management (MDM) is a security software solution that enables organizations to manage and secure mobile devices such as smartphones and tablets used by their employees.

You will find this term commonly used in Security, Mobile Applications, Device Management

Mobile Device Security

Mobile device security refers to measures and technologies implemented to protect mobile devices such as smartphones and tablets from security threats, breaches, and unauthorized access.

You will find this term commonly used in Security, Mobile Applications, Cybersecurity

Mobile Edge Computing

Mobile edge computing (MEC) is a network architecture that brings computing and storage resources closer to the edge of the network, enabling faster processing and lower latency for mobile applications.

You will find this term commonly used in Networking, Mobile Applications, Edge Computing

Mobile First Design

An approach to web design and development that prioritizes the mobile experience over desktop. The practice involves designing an online experience for mobile before designing it for the desktop Web or any other device.

You will find this term commonly used in Web Development, UI/UX Design

Mobile Operating System

A mobile operating system is the software platform that manages hardware and provides core services and functionality for mobile devices such as smartphones and tablets.

You will find this term commonly used in Mobile Applications, Operating Systems

Mobile Payment

Mobile payment, also known as mobile money or mobile wallet, refers to the use of smartphones or other mobile devices to make financial transactions, either online or at physical locations.

You will find this term commonly used in Mobile Applications, E-commerce

Mobile Security

Mobile security encompasses measures and technologies designed to protect mobile devices, data, and networks from security threats, breaches, and unauthorized access.

You will find this term commonly used in Security, Mobile Applications, Cybersecurity

Mobile Virtualization

Mobile virtualization is the process of creating virtualized instances of mobile devices, enabling multiple operating systems or applications to run independently on a single physical device.

You will find this term commonly used in Virtualization, Mobile Applications

Modbus

A serial communication protocol developed for industrial applications, specifically to connect electronic equipment. It allows the communication among many devices connected to the same network, for example, a system that measures temperature and humidity and communicates the results to a computer.

You will find this term commonly used in Industrial IT, Networking

Model

In software development, particularly in model-driven engineering and domain-driven design, a model is a simplified representation of the structure and behavior of a system, used to understand and predict its performance.

You will find this term commonly used in Software Development, Systems Design

Model-Driven Engineering (MDE)

A software development methodology focusing on creating and exploiting domain models, which are conceptual models of all the topics related to a specific problem.

You will find this term commonly used in Software Development, IT Management

Model-View-Controller (MVC)

A software architectural pattern that separates an application into three main logical components: the model, the view, and the controller.

You will find this term commonly used in Software Development

Model-View-ViewModel (MVVM)

An architectural pattern used in software engineering that facilitates the separation of the development of the graphical user interface from the development of the business logic or back-end logic.

You will find this term commonly used in Software Development

Modem

A device that modulates and demodulates digital data for transmission over telephone lines or other communication channels.

You will find this term commonly used in Networking

Modular Design

A design approach that subdivides a system into smaller parts (modules) that can be independently created and then used in different systems to drive multiple functionalities.

You will find this term commonly used in Software Development, General IT

Modular Programming

A software design technique that emphasizes separating the functionality of a program into independent, interchangeable modules.

You will find this term commonly used in Software Development

Modularity in Software Design

A design principle that divides a system into smaller parts called modules, each of which can be developed, tested, and managed independently.

You will find this term commonly used in Software Development, General IT

Modulation

The process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted.

You will find this term commonly used in Telecommunications

Modulation Techniques

Methods used to encode digital information onto an analog carrier signal, including amplitude, frequency, and phase modulation techniques. Crucial in telecommunications.

You will find this term commonly used in Telecommunications, Networking

Module

A self-contained unit of software that encapsulates a specific functionality, which can be used interchangeably with other modules to build complex systems.

You will find this term commonly used in Software Development

Momentary Switch

A type of switch that is only active as long as it's being activated or pressed. Commonly used in various computing and electronic devices.

You will find this term commonly used in Hardware

Monero

A secure, private, and untraceable cryptocurrency that is open-source and accessible to all. It uses a special kind of cryptography to ensure that all its transactions remain 100% unlinkable and untraceable.

You will find this term commonly used in Cryptocurrency

MongoDB

A cross-platform document-oriented database program that uses JSON-like documents with optional schemas.

You will find this term commonly used in Databases

Monolithic Architecture

A software development model where the application is built as a single and indivisible unit, typically suited for small to medium-sized applications.

You will find this term commonly used in Software Development

Monorepo

A development strategy where code for many projects is stored in the same repository. Advocates argue it simplifies management of dependencies and cross-project changes.

You will find this term commonly used in Software Development

Monotonic Function

In mathematics and computer science, a function that preserves the given order when mapped from one space to another, ensuring consistency in algorithms, especially in optimization problems.

You will find this term commonly used in Algorithms, Mathematics

Moore's Law

An observation stating that the number of transistors on integrated circuits doubles approximately every two years, leading to exponential growth in computing power.

You will find this term commonly used in General IT

Moore's Paradox

A situation in computing where the number of transistors on microchips doubles approximately every two years, leading to exponential increases in computing power and efficiency.

You will find this term commonly used in Hardware, Electronics

Moore's Second Law

Also known as Rock's Law, it suggests that the capital cost of a semiconductor fabrication plant doubles approximately every four years. It is a counterpart to Moore's Law, which predicts the increase in transistor density and hence processing power.

You will find this term commonly used in Hardware, Semiconductors

Morphing

In computer graphics, morphing is an animation technique in which one image is gradually transformed into another. This technique can be used in various applications, including film, television, advertising, and video games.

You will find this term commonly used in Computer Graphics, Animation

Morse Code

A method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes.

You will find this term commonly used in Telecommunications

Motion Graphics

Animation or digital footage creating the illusion of motion, often combined with audio for use in multimedia projects.

You will find this term commonly used in General IT, Media

Mouseover

A graphical control element that is activated when the mouse is hovered over it. Used in web design and software applications.

You will find this term commonly used in Software Development, Web Development

MPL (Microsoft Public License)

A free and open source software license released by Microsoft. It allows the software to be freely used, modified, and redistributed.

You will find this term commonly used in Software Development, Security

MPLS (Multiprotocol Label Switching)

A technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses.

You will find this term commonly used in Networking

MQTT (Message Queuing Telemetry Transport)

A lightweight, publish-subscribe network protocol that transports messages between devices.

You will find this term commonly used in IoT, Networking

MUD (Multi-User Dungeon)

A multiplayer real-time virtual world, usually text-based. MUDs combine elements of role-playing games, hack and slash, player versus player, interactive fiction, and online chat.

You will find this term commonly used in Gaming, Online Communities

Multi-cloud

Multi-cloud is a cloud computing strategy that involves using services and resources from multiple cloud providers, aiming to avoid vendor lock-in, increase redundancy, and optimize performance and cost.

You will find this term commonly used in Cloud Computing

Multi-factor Authentication

A security measure that requires users to provide two or more forms of verification before granting access to a system or application.

You will find this term commonly used in Security

Multi-Programming

A method of operating system process management that allows more than one process to be loaded into the executable memory at a time and running part of it.

You will find this term commonly used in Software Development, Operating Systems

Multi-Site Hosting

A web hosting setup that allows multiple websites to be hosted on a single server, often used to efficiently manage resources and reduce costs.

You will find this term commonly used in Web Development, Hosting

Multi-tenancy

Multi-tenancy is a software architecture where a single instance of a software application serves multiple tenants (users or organizations), each with its own isolated data and configuration.

You will find this term commonly used in General IT, Cloud Computing

What's Your
Career Path?
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart