IT Glossary - R - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Red Hat Certified Engineer (RHCE)

An advanced level certification that validates the skills, knowledge, and abilities required to be a senior system administrator responsible for Red Hat Enterprise Linux systems.

You will find this term commonly used in System Administration, Linux

Red Hat Enterprise Linux (RHEL)

An open source, enterprise-level Linux operating system developed by Red Hat.

You will find this term commonly used in General IT, Operating Systems

Red Team

In cybersecurity, a group that plays the role of an adversary to test or evaluate the security of a system.

You will find this term commonly used in Security, Cybersecurity

Red Team Exercises

Simulated cyber attacks against an organization's security posture to test its defenses.

You will find this term commonly used in Security, Cybersecurity

Red-Black Tree

A type of self-balancing binary search tree, used in computer science to implement associative arrays, and multi-dimensional indexes.

You will find this term commonly used in Algorithms, Data Structures

Redaction

The process of editing text for publication or removing sensitive information from a document before publication.

You will find this term commonly used in Security, Data Privacy

Redundancy

The duplication of critical components or functions of a system with the intention of increasing reliability of the system.

You will find this term commonly used in General IT, Networking

Redundant Power Supply

A power supply system designed to ensure that a system continues to operate in the event of one power supply failing.

You will find this term commonly used in Hardware, Reliability

Redux

An open-source JavaScript library for managing application state, commonly used with React for building user interfaces.

You will find this term commonly used in Software Development, Web Development

Redux Toolkit

A toolset for efficient Redux development, providing simplified APIs and utilities to reduce boilerplate code in projects using Redux.

You will find this term commonly used in Software Development, Web Development

Refactoring

The process of restructuring existing computer code without changing its external behavior, intended to improve nonfunctional attributes of the software.

You will find this term commonly used in Software Development, Quality Assurance

Reference Architecture

An authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions.

You will find this term commonly used in Software Development, System Architecture

Reference Data

Data used to categorize or classify other data within a system or application.

You will find this term commonly used in Data Management, Databases

Reflected XSS (Cross-Site Scripting)

A type of XSS attack where the malicious script is reflected off a web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request.

You will find this term commonly used in Security, Web Development

Reflection

In computer science, the ability of a program to examine and modify its own structure and behavior at runtime.

You will find this term commonly used in Software Development

Reflection API

An API that allows a program to perform operations on itself, such as inspecting classes and invoking methods at runtime.

You will find this term commonly used in Software Development

Refresh Rate

The number of times in a second that a display hardware updates its buffer. A higher refresh rate results in a smoother picture.

You will find this term commonly used in Hardware, Display Technology

Registry

In computing, a hierarchical database that stores low-level settings for the operating system and for applications that opt to use the registry.

You will find this term commonly used in General IT, Operating Systems

Registry Editor

A graphical tool in Windows that allows authorized users to view and edit the registry.

You will find this term commonly used in Operating Systems, Windows

Regression Analysis

A statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables, when the focus is on the relationship between a dependent variable and one or more independent variables.

You will find this term commonly used in Data Analysis, Machine Learning

Regression Testing

Regression testing is a software testing technique that verifies whether recent code changes have affected the existing functionality of an application, ensuring that previously developed and tested features still perform as intended.

You will find this term commonly used in Software Development, Testing

Regular Expression (Regex)

A sequence of characters that define a search pattern, mainly for use in pattern matching with strings.

You will find this term commonly used in Software Development, Data Processing

Regulatory Compliance

Adhering to laws, regulations, guidelines, and specifications relevant to business processes.

You will find this term commonly used in General IT, Compliance

Relational Algebra

A procedural query language, which takes instances of relations as input and yields instances of relations as output. It uses operators to perform queries.

You will find this term commonly used in Database

Relational Database

A database structured to recognize relations among stored items of information according to a relational model of data.

You will find this term commonly used in Database, Data Management

Relational Model

A database model based on first-order predicate logic, establishing a relationship among stored items of information.

You will find this term commonly used in Database, Data Modeling

Release Management

The process of managing, planning, scheduling, and controlling a software build through different stages and environments; including testing and deploying software releases.

You will find this term commonly used in Software Development, Project Management

Release Pipeline

The process and stages a code change goes through from development to deployment.

You will find this term commonly used in Software Development, DevOps

Reliability

The probability that a system will perform its intended function without failure under stated conditions for a specified period of time.

You will find this term commonly used in General IT, Quality Assurance

Remote Access

The ability to connect to and use a computer or network from a remote location, typically over the internet.

You will find this term commonly used in General IT

Remote Authentication Dial-In User Service (RADIUS)

A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.

You will find this term commonly used in Networking, Security

Remote Code Execution (RCE)

A security vulnerability that allows an attacker to execute arbitrary code on a victim's system remotely.

You will find this term commonly used in Security, Cybersecurity

Remote Desktop

Remote desktop refers to a technology that allows users to access and control a desktop or application hosted on a remote computer over a network connection, typically using remote desktop software or protocols.

You will find this term commonly used in Networking, Remote Work, Software Development

Remote Desktop Protocol (RDP)

A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.

You will find this term commonly used in Networking, Security

Remote Monitoring and Management (RMM)

A type of software designed to help managed IT service providers (MSPs) remotely and proactively monitor client endpoints, networks, and computers.

You will find this term commonly used in Networking, IT Management

Remote Procedure Call (RPC)

A protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details.

You will find this term commonly used in Networking, Distributed Systems

Remote Sensing

Remote sensing is the acquisition of information about an object or phenomenon without physical contact, typically using sensors mounted on satellites, aircraft, or drones to gather data about Earth's surface or atmosphere.

You will find this term commonly used in Environmental Monitoring, Geospatial Analysis

Replicated State Machine

A method of implementing fault-tolerance mechanisms in distributed computing systems by ensuring that multiple copies of data are kept in sync across different servers.

You will find this term commonly used in Distributed Systems, Fault Tolerance

Replication

The process of copying and maintaining database objects, like tables, in multiple database servers that are distributed across different physical locations.

You will find this term commonly used in Database, General IT

Replication Factor

In distributed computing, the number of copies of data that are kept in a distributed storage system to ensure data availability and durability.

You will find this term commonly used in Database, Distributed Systems

Reporting Tools

Software applications that collect data from various sources, process it, and present it in a readable format.

You will find this term commonly used in Data Analysis, Business Intelligence

Repository

In version control systems, a repository is a central file storage location. It is used by version control systems to store multiple versions of files.

You will find this term commonly used in Software Development

Repository Pattern

A design pattern that mediates between the domain and data mapping layers, acting like an in-memory domain object collection.

You will find this term commonly used in Software Development, Design Patterns

Request for Comments (RFC)

A publication from the technology community to describe methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.

You will find this term commonly used in Networking, Standards

Request Throttling

Limiting the number of user requests to a service within a certain timeframe to prevent overuse of resources.

You will find this term commonly used in Web Development, Security

Requirements Analysis

The process of determining user expectations for a new or modified product.

You will find this term commonly used in Software Development, Project Management

Residual Risk

The risk that remains after all efforts to identify and eliminate risk have been made.

You will find this term commonly used in Security, Risk Management

Resilience

The ability of a system to handle and recover from faults and failures.

You will find this term commonly used in General IT, Security

Resolution

In display technology, the number of distinct pixels that can be displayed in each dimension. In networking, the process of resolving a domain name to its corresponding IP address.

You will find this term commonly used in Hardware, Networking

Resource Allocation

The process of assigning and managing assets in a manner that supports an organization's strategic goals.

You will find this term commonly used in General IT, Project Management

What's Your
Career Path?
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart