IT Glossary - P - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Permutation

The arrangement of all or part of a set of objects, with regard to the order of the arrangement. It's a concept used in various computing fields, including cryptography and algorithms.

You will find this term commonly used in Algorithms, Cryptography

Persistence

The ability of data to remain stored and accessible even after the application or system is shut down.

You will find this term commonly used in General IT, Data Storage

Persistent Storage

Storage that retains data even when power is turned off, such as hard disk drives (HDDs) and solid-state drives (SSDs).

You will find this term commonly used in Data Storage, General IT

Personal Area Network (PAN)

A network connecting devices in close proximity, typically within the range of an individual person, such as Bluetooth devices.

You will find this term commonly used in Networking, General IT

Personal Identification Number (PIN)

A numeric or alphanumeric password used in the process of authenticating a user accessing a secure system or device.

You will find this term commonly used in Security, General IT

Personalization

Tailoring products, services, or content to individual user preferences or characteristics.

You will find this term commonly used in AI, Web Development

PGP (Pretty Good Privacy)

A data encryption and decryption program used for secure communication and data storage.

You will find this term commonly used in Security, Cryptography

Phablet

A mobile device that combines the features of a phone and a tablet.

You will find this term commonly used in General IT, Mobile Devices

Phantom Power

A method of transmitting electrical power through microphone cables to operate microphones that contain active electronic circuitry. It is also used in various computing and audio devices.

You will find this term commonly used in Electronics, Audio Tech

Phase-Shift Keying (PSK)

A digital modulation process which conveys data by changing (modulating) the phase of a reference signal (the carrier wave). It's widely used in wireless communications.

You will find this term commonly used in Telecommunications

Phishing

A cyberattack where perpetrators attempt to trick individuals into revealing sensitive information, such as passwords or financial data.

You will find this term commonly used in Cybersecurity

Phishing Email

A fraudulent email that attempts to deceive recipients into revealing sensitive information or taking malicious actions, often by impersonating trusted entities.

You will find this term commonly used in Cybersecurity, Security

Photonic Computing

The use of photons (light particles) for computing, rather than traditional electrons. It promises much faster data processing speeds and lower energy consumption than electronic computing.

You will find this term commonly used in Computing, Research

PHP

A server-side scripting language commonly used for web development.

You will find this term commonly used in General IT, Programming

Physical Layer

The first and lowest layer in the OSI model of computer networking. It is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium.

You will find this term commonly used in Networking

Physical Security

Measures taken to protect physical assets, premises, and resources from unauthorized access, damage, or theft.

You will find this term commonly used in Security, Cybersecurity

PID Controller

A control loop feedback mechanism widely used in industrial control systems. A PID Controller calculates an error value as the difference between a desired setpoint and a measured process variable and corrects it based on proportional, integral, and derivative terms.

You will find this term commonly used in Automation, Control Systems

Piggybacking

The unauthorized access of a wireless LAN. In a broader sense, it can refer to using someone else's resources for your own purposes without permission.

You will find this term commonly used in Security, Networking

PII (Personally Identifiable Information)

Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

You will find this term commonly used in Security, Privacy

Ping

A utility used to test the reachability of a host on a network.

You will find this term commonly used in Networking

Ping of Death

A type of cyber attack that exploits vulnerabilities in the Internet Control Message Protocol (ICMP).

You will find this term commonly used in Cybersecurity, Networking

Ping Sweep

A technique used to discover active hosts within a specific range of IP addresses.

You will find this term commonly used in Networking, Security

Pixel

The smallest unit of a digital image or graphic that can be displayed and edited on a computer screen. Composed of one or more bits of data, pixels are the building blocks of digital images.

You will find this term commonly used in Graphics, Web Design

PKI (Public Key Infrastructure)

Already included as "Public Key Infrastructure (PKI)"

You will find this term commonly used in -

Placeholder

Text or graphics used in a document or web form to indicate where user input or content should be placed. It provides hints about what information is needed or how it should be entered.

You will find this term commonly used in Web Development, UI Design

Plaintext

Unencrypted text or data that is readable without the need for decryption. It is the original message or data that is input into an encryption algorithm.

You will find this term commonly used in Cryptography

Platform

A hardware or software environment where programs run.

You will find this term commonly used in General IT

Platform Agnostic

A term used to describe software or applications that are compatible with multiple operating systems or platforms without requiring modification.

You will find this term commonly used in General IT, Software Development

Platform as a Service (PaaS)

A cloud computing model where providers offer a platform allowing customers to develop, run, and manage applications without dealing with infrastructure.

You will find this term commonly used in Cloud Computing, Software Development

Platform Integration

The process of enabling various software and hardware platforms to work together, often involving the integration of applications, systems, and services within an enterprise or between enterprises.

You will find this term commonly used in Software Development

Plug and Play

The ability of a computer system to automatically detect and configure hardware peripherals.

You will find this term commonly used in General IT

Plug-In

A software component that adds specific features or functionality to an existing application.

You will find this term commonly used in Software Development, General IT

Plug-In Hybrid

A vehicle with both a conventional internal combustion engine and a rechargeable battery.

You will find this term commonly used in Automotive Technology, Green Technology

PMP (Project Management Professional)

Recognized globally for project management, focusing on leading projects and teams.

You will find this term commonly used in Project Management

Pop-Up

A small window that appears on top of a webpage or application to display additional information or prompt user interaction.

You will find this term commonly used in Web Development, General IT

Port

A communication endpoint in a computer system used for transferring data between different processes or devices.

You will find this term commonly used in Networking

Port Forwarding

Redirecting network traffic from one port to another.

You will find this term commonly used in Networking, Security

Portability

The ease with which software or hardware can be transferred from one environment to another.

You will find this term commonly used in General IT

PostgreSQL

An open-source relational database management system known for its reliability and robust feature set.

You will find this term commonly used in General IT, Database

Power Efficiency

The ratio of useful power output to total power input in a system or device.

You will find this term commonly used in Green Technology, Hardware

Power Management

Controlling and optimizing the power usage of devices.

You will find this term commonly used in General IT, Networking

Power Supply

A device that provides electrical energy to an electrical load.

You will find this term commonly used in Hardware, General IT

Power Supply Unit (PSU)

A device that converts electrical power from an outlet into usable power for computer components, providing stable voltages and currents.

You will find this term commonly used in Hardware, General IT

Predictive Analytics

Predictive analytics is the use of data, statistical algorithms, and machine learning techniques to forecast future trends, behaviors, or outcomes based on historical data patterns, enabling proactive decision-making and planning.

You will find this term commonly used in Data Analytics, AI

Predictive Maintenance

Predictive maintenance is a maintenance strategy that uses data analysis, machine learning, and condition monitoring to predict equipment failures and schedule maintenance activities before breakdowns occur.

You will find this term commonly used in AI, Maintenance, Manufacturing

Predictive Modeling

Using statistical techniques and machine learning algorithms to predict future outcomes based on historical data.

You will find this term commonly used in AI, Data Analytics

Primary Key

A unique identifier for each record in a database table.

You will find this term commonly used in Database Management, General IT

Printer

A device that produces a physical copy of text or graphics on paper.

You will find this term commonly used in Hardware, General IT

Privacy

The protection of sensitive information from unauthorized access.

You will find this term commonly used in Security, Cybersecurity

Privacy Concerns

Issues related to the protection of personal information and the right to privacy in digital environments.

You will find this term commonly used in Security, Cybersecurity

What's Your
Career Path?
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart