IT Glossary
Key Terms To Know In The IT Industry
Resource Contention
A situation where concurrent processes compete for the same resources, potentially leading to performance degradation or deadlock.
You will find this term commonly used in Operating Systems, Concurrency
Resource Management
The process of using a company's resources in the most efficient way possible.
You will find this term commonly used in General IT, Project Management
Responsive Design
Web design approach aimed at creating sites that provide an optimal viewing experience across a wide range of devices and screen sizes.
You will find this term commonly used in General IT
Responsive Web Design
Responsive web design is an approach to web development that ensures web pages render well on a variety of devices and window or screen sizes, providing a consistent user experience across desktops, tablets, and smartphones.
You will find this term commonly used in Web Development, User Experience
REST (Representational State Transfer)
An architectural style designed for distributed hypermedia systems, making it a popular choice for building web services.
You will find this term commonly used in Software Development, Web Development
REST (Representational State Transfer) API
An architectural style for designing networked applications, where web services are viewed as resources and can be identified by their URLs.
You will find this term commonly used in Software Development, Web Development
REST API Security
Security measures and protocols applied to RESTful APIs to protect against common web vulnerabilities and threats.
You will find this term commonly used in Security, Web Development
RESTful API
An API that adheres to the constraints of REST (Representational State Transfer) architectural style and allows for interaction with RESTful web services.
You will find this term commonly used in Software Development, Web Development
RESTful Services
Web services that adhere to the REST architectural style, allowing for interaction with RESTful web services through a uniform and predefined set of stateless operations.
You will find this term commonly used in Software Development, Web Development
RESTful Web Services
Services that follow the REST architectural principles, allowing for interaction with RESTful APIs over HTTP with standard verbs like GET, POST, PUT, and DELETE.
You will find this term commonly used in Web Development, APIs
Retention Policy
Policies employed by organizations to determine what data should be stored or archived, for how long, and when it should be deleted.
You will find this term commonly used in Database, Security
Retina Display
A brand name used by Apple for its series of IPS LCD and OLED displays that have a higher pixel density than traditional Apple displays.
You will find this term commonly used in Hardware, Consumer Electronics
Retrofitting
The process of adding new technology or features to older systems.
You will find this term commonly used in General IT, Upgrades
Return on Investment (ROI)
A measure used to evaluate the efficiency or profitability of an investment, comparing the magnitude and timing of gains from an investment to its cost.
You will find this term commonly used in General IT, Business
Return on Investment (ROI) Analysis
A calculation used to assess the efficiency of an investment or to compare the efficiencies of several different investments.
You will find this term commonly used in Business, Financial Analysis
Reverse Engineering
The process of extracting knowledge or design information from anything man-made and reproducing it or reproducing anything based on the extracted information.
You will find this term commonly used in Security, Software Development
Reverse Engineering Software
The process of deconstructing software's binaries to understand its composition, functionality, and operation. This can be done for various purposes, including security analysis, debugging, and compatibility development.
You will find this term commonly used in Software Development, Security
Reverse Lookup
The process of querying a DNS to determine the domain name associated with an IP address.
You will find this term commonly used in Networking, Internet
Reverse Proxy
A type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as if they originated from the proxy server itself.
You will find this term commonly used in Networking, Security
Revision Control
The management of changes to documents, computer programs, large web sites, and other collections of information.
You will find this term commonly used in Software Development, Version Control
Revision Control System (RCS)
A software tool that allows multiple users to work on a set of files, recording changes to those files and allowing for the reversion to previous versions.
You will find this term commonly used in Software Development, Version Control
RFI (Request for Information)
A standard business process whose purpose is to collect written information about the capabilities of various suppliers.
You will find this term commonly used in Business, Procurement
RFID (Radio-Frequency Identification)
Uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information.
You will find this term commonly used in General IT, Hardware
RFID Tag
A small object, such as an adhesive sticker, that can be attached to or incorporated into a product for the purpose of identification using radio waves.
You will find this term commonly used in Hardware, Security
RFP (Request for Proposal)
A document that solicits proposal, often made through a bidding process, by an agency or company interested in procurement of a commodity, service, or valuable asset.
You will find this term commonly used in Business, Procurement
RGB (Red, Green, Blue)
A color model in which red, green, and blue light are added together in various ways to reproduce a broad array of colors.
You will find this term commonly used in Hardware, Design
RGB Color Model
A color model in which red, green, and blue light are added together in various ways to reproduce a broad array of colors seen on digital displays.
You will find this term commonly used in Design, Hardware
Right to Repair
A movement advocating for legislation that would allow consumers the ability to repair and modify their own electronic devices.
You will find this term commonly used in General IT, Legal
Ring Topology
A network configuration where each node is connected to two other nodes, forming a single continuous pathway for signals through each node - a ring.
You will find this term commonly used in Networking, Computer Networks
RISC (Reduced Instruction Set Computer)
A computer's microprocessor architecture that allows fewer cycles per instruction (CPI) than a complex instruction set computer (CISC).
You will find this term commonly used in Hardware, Computer Architecture
RISC (Reduced Instruction Set Computing)
A computer architecture design philosophy that emphasizes a smaller set of simple and efficient instructions, often resulting in faster performance.
You will find this term commonly used in Hardware
RISC-V
An open standard instruction set architecture (ISA) based on established reduced instruction set computing (RISC) principles.
You will find this term commonly used in Hardware, Computer Architecture
Risk Analysis
The process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.
You will find this term commonly used in Security, Business Continuity
Risk Assessment
Risk assessment is the process of evaluating potential risks and their impacts on an organization's operations, assets, or projects, typically followed by the identification and implementation of risk mitigation strategies.
You will find this term commonly used in General IT, Risk Management, Security
Risk Management
Risk management is the process of identifying, assessing, and prioritizing risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and impact of unforeseen events.
You will find this term commonly used in General IT, Business Operations, Security
Risk Mitigation
Strategies and techniques used to manage and minimize risks to an acceptable level.
You will find this term commonly used in Security, Risk Management
Robot Framework
An open-source automation framework for acceptance testing, acceptance test-driven development (ATDD), and robotic process automation (RPA).
You will find this term commonly used in Software Development, Testing
Robotic Automation
Robotic automation is the use of robots or robotic systems to automate tasks, processes, or workflows in various industries and applications, reducing manual labor, improving efficiency, and enhancing productivity and safety in operations.
You will find this term commonly used in Robotics, Automation, Manufacturing
Robotic Process Automation
Robotic process automation (RPA) is the use of software robots or artificial intelligence to automate repetitive tasks and business processes, improving efficiency, accuracy, and scalability while reducing human intervention.
You will find this term commonly used in AI, Automation, Business Processes
Robotic Process Automation (RPA)
The technology that allows anyone today to configure computer software, or a “robot” to emulate and integrate the actions of a human interacting within digital systems to execute a business process.
You will find this term commonly used in AI, Business Automation
Robotic Process Automation (RPA) Tools
Software platforms that provide tools for configuring task automation scripts, which emulate human actions interacting with digital systems to execute business processes.
You will find this term commonly used in AI, Business Automation
Robotics
The interdisciplinary field of engineering and science focused on designing, building, and programming robots to perform tasks autonomously or semi-autonomously.
You will find this term commonly used in General IT, AI
Robustness
The ability of a computer system to cope with errors during execution and to handle erroneous input.
You will find this term commonly used in Software Development, Quality Assurance
Role-Based Access Control (RBAC)
A method of regulating access to computer or network resources based on the roles of individual users within an enterprise.
You will find this term commonly used in Security, Cybersecurity
Root
In computer file systems, the top-most directory in which all other directories and files reside. In networking, the initial authoritative name server. In mathematics and algorithms, the fundamental part from which the rest of the structure derives.
You will find this term commonly used in General IT, Networking, Algorithms
Root Analysis
The process of discovering the root cause of a problem or issue.
You will find this term commonly used in Quality Assurance, Problem Solving
Root Cause Analysis
Root cause analysis (RCA) is a problem-solving technique used to identify the underlying causes of an issue or problem, aiming to prevent its recurrence by addressing the fundamental factors contributing to its occurrence.
You will find this term commonly used in General IT, Problem Solving, Quality Management
Root Certificate
A public key certificate that identifies the Root Certificate Authority (CA).
You will find this term commonly used in Security, Cybersecurity
Root Directory
The first or top-most directory in a hierarchy. It can be likened to the root of a tree — the starting point where all branches originate.
You will find this term commonly used in Operating Systems, File Systems
Root Domain
The highest hierarchical level of a domain name which is under the control of a particular organization or individual.
You will find this term commonly used in Networking, Web Development
Career Path?
Network Security Analyst Career Path
$129.00 $51.60
Cisco Network Engineer Career Path
$129.00 $51.60
Google DevOps Engineer Career Path
$129.00 $51.60
Network Administrator Career Path
$129.00 $51.60
Information Security Analyst Career Path
$129.00 $51.60
Kubernetes Certification: The Ultimate Certification and Career Advancement Series
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
AZ-104 Learning Path : Become an Azure Administrator
$51.60 – $169.00
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path
$99.00 $39.00
Data Analyst Career Path
$129.00 $51.60
Web Designer Career Path
$129.00 $51.60
AWS Cloud Practitioner Career Path
$129.00 $51.60