IT Glossary
Key Terms To Know In The IT Industry
Red Hat Certified Engineer (RHCE)
An advanced level certification that validates the skills, knowledge, and abilities required to be a senior system administrator responsible for Red Hat Enterprise Linux systems.
You will find this term commonly used in System Administration, Linux
Red Hat Enterprise Linux (RHEL)
An open source, enterprise-level Linux operating system developed by Red Hat.
You will find this term commonly used in General IT, Operating Systems
Red Team
In cybersecurity, a group that plays the role of an adversary to test or evaluate the security of a system.
You will find this term commonly used in Security, Cybersecurity
Red Team Exercises
Simulated cyber attacks against an organization's security posture to test its defenses.
You will find this term commonly used in Security, Cybersecurity
Red-Black Tree
A type of self-balancing binary search tree, used in computer science to implement associative arrays, and multi-dimensional indexes.
You will find this term commonly used in Algorithms, Data Structures
Redaction
The process of editing text for publication or removing sensitive information from a document before publication.
You will find this term commonly used in Security, Data Privacy
Redundancy
The duplication of critical components or functions of a system with the intention of increasing reliability of the system.
You will find this term commonly used in General IT, Networking
Redundant Power Supply
A power supply system designed to ensure that a system continues to operate in the event of one power supply failing.
You will find this term commonly used in Hardware, Reliability
Redux
An open-source JavaScript library for managing application state, commonly used with React for building user interfaces.
You will find this term commonly used in Software Development, Web Development
Redux Toolkit
A toolset for efficient Redux development, providing simplified APIs and utilities to reduce boilerplate code in projects using Redux.
You will find this term commonly used in Software Development, Web Development
Refactoring
The process of restructuring existing computer code without changing its external behavior, intended to improve nonfunctional attributes of the software.
You will find this term commonly used in Software Development, Quality Assurance
Reference Architecture
An authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions.
You will find this term commonly used in Software Development, System Architecture
Reference Data
Data used to categorize or classify other data within a system or application.
You will find this term commonly used in Data Management, Databases
Reflected XSS (Cross-Site Scripting)
A type of XSS attack where the malicious script is reflected off a web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request.
You will find this term commonly used in Security, Web Development
Reflection
In computer science, the ability of a program to examine and modify its own structure and behavior at runtime.
You will find this term commonly used in Software Development
Reflection API
An API that allows a program to perform operations on itself, such as inspecting classes and invoking methods at runtime.
You will find this term commonly used in Software Development
Refresh Rate
The number of times in a second that a display hardware updates its buffer. A higher refresh rate results in a smoother picture.
You will find this term commonly used in Hardware, Display Technology
Registry
In computing, a hierarchical database that stores low-level settings for the operating system and for applications that opt to use the registry.
You will find this term commonly used in General IT, Operating Systems
Registry Editor
A graphical tool in Windows that allows authorized users to view and edit the registry.
You will find this term commonly used in Operating Systems, Windows
Regression Analysis
A statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables, when the focus is on the relationship between a dependent variable and one or more independent variables.
You will find this term commonly used in Data Analysis, Machine Learning
Regression Testing
Regression testing is a software testing technique that verifies whether recent code changes have affected the existing functionality of an application, ensuring that previously developed and tested features still perform as intended.
You will find this term commonly used in Software Development, Testing
Regular Expression (Regex)
A sequence of characters that define a search pattern, mainly for use in pattern matching with strings.
You will find this term commonly used in Software Development, Data Processing
Regulatory Compliance
Adhering to laws, regulations, guidelines, and specifications relevant to business processes.
You will find this term commonly used in General IT, Compliance
Relational Algebra
A procedural query language, which takes instances of relations as input and yields instances of relations as output. It uses operators to perform queries.
You will find this term commonly used in Database
Relational Database
A database structured to recognize relations among stored items of information according to a relational model of data.
You will find this term commonly used in Database, Data Management
Relational Model
A database model based on first-order predicate logic, establishing a relationship among stored items of information.
You will find this term commonly used in Database, Data Modeling
Release Management
The process of managing, planning, scheduling, and controlling a software build through different stages and environments; including testing and deploying software releases.
You will find this term commonly used in Software Development, Project Management
Release Pipeline
The process and stages a code change goes through from development to deployment.
You will find this term commonly used in Software Development, DevOps
Reliability
The probability that a system will perform its intended function without failure under stated conditions for a specified period of time.
You will find this term commonly used in General IT, Quality Assurance
Remote Access
The ability to connect to and use a computer or network from a remote location, typically over the internet.
You will find this term commonly used in General IT
Remote Authentication Dial-In User Service (RADIUS)
A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.
You will find this term commonly used in Networking, Security
Remote Code Execution (RCE)
A security vulnerability that allows an attacker to execute arbitrary code on a victim's system remotely.
You will find this term commonly used in Security, Cybersecurity
Remote Desktop
Remote desktop refers to a technology that allows users to access and control a desktop or application hosted on a remote computer over a network connection, typically using remote desktop software or protocols.
You will find this term commonly used in Networking, Remote Work, Software Development
Remote Desktop Protocol (RDP)
A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.
You will find this term commonly used in Networking, Security
Remote Monitoring and Management (RMM)
A type of software designed to help managed IT service providers (MSPs) remotely and proactively monitor client endpoints, networks, and computers.
You will find this term commonly used in Networking, IT Management
Remote Procedure Call (RPC)
A protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details.
You will find this term commonly used in Networking, Distributed Systems
Remote Sensing
Remote sensing is the acquisition of information about an object or phenomenon without physical contact, typically using sensors mounted on satellites, aircraft, or drones to gather data about Earth's surface or atmosphere.
You will find this term commonly used in Environmental Monitoring, Geospatial Analysis
Replicated State Machine
A method of implementing fault-tolerance mechanisms in distributed computing systems by ensuring that multiple copies of data are kept in sync across different servers.
You will find this term commonly used in Distributed Systems, Fault Tolerance
Replication
The process of copying and maintaining database objects, like tables, in multiple database servers that are distributed across different physical locations.
You will find this term commonly used in Database, General IT
Replication Factor
In distributed computing, the number of copies of data that are kept in a distributed storage system to ensure data availability and durability.
You will find this term commonly used in Database, Distributed Systems
Reporting Tools
Software applications that collect data from various sources, process it, and present it in a readable format.
You will find this term commonly used in Data Analysis, Business Intelligence
Repository
In version control systems, a repository is a central file storage location. It is used by version control systems to store multiple versions of files.
You will find this term commonly used in Software Development
Repository Pattern
A design pattern that mediates between the domain and data mapping layers, acting like an in-memory domain object collection.
You will find this term commonly used in Software Development, Design Patterns
Request for Comments (RFC)
A publication from the technology community to describe methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.
You will find this term commonly used in Networking, Standards
Request Throttling
Limiting the number of user requests to a service within a certain timeframe to prevent overuse of resources.
You will find this term commonly used in Web Development, Security
Requirements Analysis
The process of determining user expectations for a new or modified product.
You will find this term commonly used in Software Development, Project Management
Residual Risk
The risk that remains after all efforts to identify and eliminate risk have been made.
You will find this term commonly used in Security, Risk Management
Resilience
The ability of a system to handle and recover from faults and failures.
You will find this term commonly used in General IT, Security
Resolution
In display technology, the number of distinct pixels that can be displayed in each dimension. In networking, the process of resolving a domain name to its corresponding IP address.
You will find this term commonly used in Hardware, Networking
Resource Allocation
The process of assigning and managing assets in a manner that supports an organization's strategic goals.
You will find this term commonly used in General IT, Project Management
Career Path?
Google DevOps Engineer Career Path
$129.00 $51.60
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path
$99.00 $39.00
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Pentester Career Path
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
Kubernetes Certification: The Ultimate Certification and Career Advancement Series
$129.00 $51.60
AWS Cloud Practitioner Career Path
$129.00 $51.60
Cisco Network Engineer Career Path
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60
Information Security Analyst Career Path
$129.00 $51.60
Video Editor Career Path
$129.00 $51.60
Entry Level Information Security Specialist Career Path
$129.00 $51.60