IT Glossary - O - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Oscillation

In computing, often refers to the repetitive variation, typically in time, of some measure about a central value or between two or more different states. Used in various contexts, including signal processing and computing performance.

You will find this term commonly used in Hardware, Signal Processing

OSCP (Offensive Security Certified Professional)

Demonstrates technical skills and understanding of the penetration testing process and lifecycle.

You will find this term commonly used in Ethical Hacking, Cybersecurity

OSI Model

The Open Systems Interconnection model is a conceptual framework used to understand network communication protocols.

You will find this term commonly used in Networking, General IT, Security

Out-of-Band Management

The management and monitoring of IT infrastructure using a separate channel or network from the primary data path.

You will find this term commonly used in Network Management, Security, General IT

Out-of-Box Experience (OOBE)

The experience a consumer has when first using a new product, especially in terms of ease of setting up and starting the product. In IT, it often relates to the initial setup process of software or hardware.

You will find this term commonly used in User Experience, Hardware

Out-of-Home (OOH) Advertising

Advertising that reaches consumers while they are outside their homes, which increasingly incorporates digital and interactive technologies.

You will find this term commonly used in Marketing, Digital Signage

Out-of-the-Box

Refers to software or hardware products that are ready to use immediately without requiring additional configuration or customization.

You will find this term commonly used in Software Deployment, Hardware Installation, General IT

Outbound Firewall Rules

Firewall rules that control the traffic going out from a network or device to the internet or another network, typically to prevent unauthorized data exfiltration or to block unwanted outgoing traffic.

You will find this term commonly used in Security, Networking

Outlier Analysis

The process of identifying and analyzing data points that deviate significantly from the norm or expected pattern.

You will find this term commonly used in Data Analysis, Machine Learning, General IT

Outlier Detection

The process of identifying data points that deviate significantly from the rest of the dataset.

You will find this term commonly used in Data Analysis, Machine Learning, AI

Output Device

Hardware component that receives data from a computer and displays or otherwise conveys it to the user.

You will find this term commonly used in Hardware, General IT, User Interface

Output Management

The process of managing the generation, distribution, and archiving of documents and reports produced by an organization's IT systems.

You will find this term commonly used in Document Management, Workflow Automation, General IT

Output Stream

In computing, a stream that data is written to, typically moving data from a program to a device or file.

You will find this term commonly used in Programming, IO Operations

Outsourced IT Support

IT support services provided by external companies or individuals, often on a subscription or contract basis.

You will find this term commonly used in IT Support, Outsourcing, General IT

Outsourcing

The practice of hiring external vendors to perform tasks or provide services traditionally handled by in-house staff.

You will find this term commonly used in General IT

Over Provisioning

The practice of providing more resources or capacity than is necessary for a particular requirement to ensure performance can meet unexpected demand.

You will find this term commonly used in Cloud Computing, Storage

Over-The-Air (OTA) Broadcasting

Broadcasting of television or radio signals over the airwaves, received by antennas on consumer devices.

You will find this term commonly used in Broadcasting, Media, General IT

Over-the-Air (OTA) Updates

The process of remotely updating software or firmware on devices without requiring physical access.

You will find this term commonly used in IoT, Software Development, General IT

Over-the-Air Programming (OTAP)

The method of distributing new software, configuration settings, and even updating encryption keys to devices like mobile phones, set-top boxes, or secure voice communication equipment over a wireless network.

You will find this term commonly used in Telecommunications, Security

Over-the-Counter (OTC)

Securities traded directly between parties, often outside of formal exchanges, typically involving less regulation and oversight.

You will find this term commonly used in Finance, Trading, General IT

Over-The-Network (OTN)

Refers to processes or actions taken over a network, often involving the downloading or uploading of data or software updates without the need for physical media.

You will find this term commonly used in Networking, Software Maintenance

Over-the-Top (OTT)

Content delivery services that bypass traditional distribution channels, delivering content directly to users over the internet.

You will find this term commonly used in Media Streaming, Entertainment, General IT

Over-the-Top (OTT) Content

Digital content, such as streaming video, audio, or gaming services, delivered directly to users over the internet.

You will find this term commonly used in Media Streaming, Entertainment, General IT

Over-the-Top (OTT) Messaging

Messaging services that deliver messages over the internet, bypassing traditional SMS or MMS messaging services provided by mobile carriers.

You will find this term commonly used in Communication, Messaging, General IT

Over-the-Top Application (OTT)

An app or service that provides a product over the Internet and bypasses traditional distribution, examples include streaming services like Netflix and Hulu.

You will find this term commonly used in Networking, Digital Media

Over-The-Top Platform (OTT)

A term used to refer to content providers that distribute streaming media as a standalone product directly to viewers over the Internet, bypassing telecommunications, multichannel television, and broadcast television platforms.

You will find this term commonly used in Online Streaming, Media

Over-the-Wire (OTW)

Communications or data transfers that occur over physical wires or cables, as opposed to wireless transmissions.

You will find this term commonly used in Networking, Telecommunications, General IT

Overclocking

The practice of running a computer component at a higher clock rate than it was designed for, to achieve better performance.

You will find this term commonly used in Hardware, General IT, Gaming

Overfitting

A machine learning phenomenon where a model learns to fit the training data too closely, capturing noise or random fluctuations rather than the underlying pattern.

You will find this term commonly used in Machine Learning, Data Science, AI

Overflow Error

An error that occurs when a computer attempts to handle a number that is outside of the range of values it can represent with a given number of bits.

You will find this term commonly used in Software Development, Programming

Overhead

The additional resources (time, memory, etc.) consumed by a system beyond the minimum required to perform its function.

You will find this term commonly used in Performance Optimization, Systems Administration, General IT

Overhead Projector

A device that projects images or text onto a screen or wall for large group viewing, commonly used in presentations and classrooms.

You will find this term commonly used in Presentation, Education, General IT

Overlay

In computing, a method of adding additional information or visuals on top of a primary set of data or image. This can refer to graphical overlays on a video or informational overlays in a software application.

You will find this term commonly used in User Interface Design, Software Development

Overlay File System

A type of file system that allows the layering of files and directories on top of existing file systems, often used in containerized environments.

You will find this term commonly used in Storage, Virtualization

Overlay Network

A computer network that is built on top of another network. Nodes in the overlay network are connected by virtual or logical links, each of which corresponds to a path in the underlying network.

You will find this term commonly used in Networking

Overlay Networks

Networks that are built on top of one or more existing network layers to introduce new functionalities or enhance existing ones without altering the underlying network.

You will find this term commonly used in Networking, Internet Technology

Overlay Protocols

Protocols designed to operate on top of other network protocols to enhance functionalities, such as creating distributed networks over the internet without modifying underlying IP protocols.

You will find this term commonly used in Networking, Protocol Design

Oversampling

The process of sampling a signal with a sampling frequency significantly higher than the Nyquist rate to improve the quality of signal processing and data conversion.

You will find this term commonly used in Digital Signal Processing

Oversubscription

In networking and computing, the practice of selling or providing more capacity to multiple customers than exists physically, betting not all resources will be used at the same time.

You will find this term commonly used in Networking, Cloud Computing

OWASP Top Ten

A regularly updated report outlining the ten most critical web application security risks, helping developers, and IT professionals to ensure the security of their applications and services.

You will find this term commonly used in Cybersecurity, Web Application Security

OWIN (Open Web Interface for .NET)

An open specification for an interface between .NET web applications and web servers. It decouples the web application from the server, making .NET web applications more modular.

You will find this term commonly used in Web Development, .NET Framework

Ownership Controls

In IT, mechanisms or policies put in place to ensure that data or resources are controlled by a specified entity or individual, addressing access, modification, and distribution.

You will find this term commonly used in Security, Data Management

Ownership Management

In IT, it refers to the process and policies for managing and tracking the ownership of digital assets, resources, or services within an organization.

You will find this term commonly used in IT Management, Security

Ownership Verification

The process of verifying that a user or system has the rights and permissions to access, modify, or manage a digital resource or data, crucial for security and access control systems.

You will find this term commonly used in Security, Data Management

What's Your
Career Path?
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart