IT Glossary - R - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Root of Trust

A set of functions in the trusted computing module that is always trusted by the operating system.

You will find this term commonly used in Security, Hardware

Rootkit

Malicious software that provides unauthorized access to a computer system while concealing its presence from users and security tools.

You will find this term commonly used in Cybersecurity

Round Robin

A scheduling algorithm that is most commonly used in networking and operating systems to distribute tasks among resources.

You will find this term commonly used in Networking, Operating Systems

Round Robin Scheduling

A scheduling algorithm in computing that assigns work in equal portions, in order, to each resource, in a circular manner.

You will find this term commonly used in Operating Systems, Scheduling

Round-Trip Time (RTT)

The time it takes for a signal to go from the source to the destination plus the time it takes for an acknowledgment of that signal to be received back at the source.

You will find this term commonly used in Networking, Internet

Route Aggregation

The process of combining several routes into a single advertisement to reduce the size of routing tables.

You will find this term commonly used in Networking, Internet

Route Optimization

The process of determining the most cost-efficient route. It's not just about finding the shortest path between points, but also optimizing for other factors such as cost, time, and resource availability.

You will find this term commonly used in Networking, Logistics

Router

A networking device that forwards data packets between computer networks, typically using IP addresses.

You will find this term commonly used in Networking

Routing Protocol

A protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network.

You will find this term commonly used in Networking

Routing Table

A data table stored in a router or a networked computer that lists the routes to particular network destinations.

You will find this term commonly used in Networking, Internet

Row-Level Security

A feature of many modern databases that allows database administrators to control access to rows in a database table based on the characteristics of the user executing a query.

You will find this term commonly used in Database, Security

RPC (Remote Procedure Call)

A protocol that one program can use to request a service from a program located on another computer in a network.

You will find this term commonly used in Networking, Distributed Systems

RSA (Rivest-Shamir-Adleman)

A public-key cryptosystem that is widely used for secure data transmission.

You will find this term commonly used in Security, Cryptography

RSA Algorithm

A public-key cryptosystem that is widely used for secure data transmission. It's based on the difficulty of factoring the product of two large prime numbers.

You will find this term commonly used in Security, Cryptography

RSA Encryption

A public-key cryptosystem that is widely used for secure data transmission. Named after its inventors Rivest, Shamir, and Adleman.

You will find this term commonly used in Security, Cryptography

RSS (Really Simple Syndication)

A web feed format used to publish frequently updated content, such as blog posts or news articles, in a standardized format.

You will find this term commonly used in General IT, Web

Rubber Duck Debugging

A method of debugging code by explaining it, line by line, to an inanimate object, like a rubber duck, to understand the problem more clearly.

You will find this term commonly used in Software Development, Debugging

Ruby

A dynamic, object-oriented programming language known for its simplicity and productivity.

You will find this term commonly used in General IT, Programming

Ruby on Rails

A popular open-source web application framework written in Ruby, known for its simplicity and productivity.

You will find this term commonly used in General IT, Web

Ruby on Rails (Rails)

A server-side web application framework written in Ruby under the MIT License. It is a model–view–controller (MVC) framework, providing default structures for a database, a web service, and web pages.

You will find this term commonly used in Software Development, Web Development

RubyGems

A package manager for the Ruby programming language that provides a standard format for distributing Ruby programs and libraries.

You will find this term commonly used in Software Development, Web Development

Rule-Based System

A system that uses rules as the knowledge representation basis to solve problems.

You will find this term commonly used in AI, Expert Systems

Runtime

The period during which a program is running. It begins when a program is opened (or executed) and ends when the program is closed.

You will find this term commonly used in Software Development, General IT

Runtime Configuration

The process of setting and adjusting options and parameters of software applications during runtime without requiring a restart or redeployment.

You will find this term commonly used in Software Development, Configuration Management

Runtime Environment

A system for executing computer programs. Often, it is used synonymously with runtime system and runtime library.

You will find this term commonly used in Software Development, General IT

Runtime Error

An error that occurs during the execution of a program, as opposed to compilation errors.

You will find this term commonly used in Software Development, Debugging

Runtime Library

A collection of software programs used at program runtime to provide one or more native program functions or services.

You will find this term commonly used in Software Development, General IT

Runtime Optimization

Techniques and processes applied during the execution of a program to enhance performance and efficiency dynamically.

You will find this term commonly used in Software Development, Performance

Runtime Polymorphism

A process in object-oriented programming that allows a function to use variables of different types at runtime.

You will find this term commonly used in Software Development, Programming Concepts

Rust

A multi-paradigm programming language designed for performance and safety, especially safe concurrency.

You will find this term commonly used in Software Development

Rust Libraries

Collections of pre-compiled routines or functions that a program can use to optimize tasks.

You will find this term commonly used in Software Development

Rust Programming Language

A language focused on speed, memory safety, and parallelism, emphasizing safe concurrency and memory management without a garbage collector.

You will find this term commonly used in Software Development

RWD (Responsive Web Design)

An approach to web design that makes web pages render well on a variety of devices and window or screen sizes.

You will find this term commonly used in Web Development, Design

What's Your
Career Path?
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart