IT Glossary - S - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

SaaS (Software as a Service)

A software delivery model where software is hosted by a third-party provider and made available to customers over the internet, usually on a subscription basis.

You will find this term commonly used in Cloud Computing, General IT

SAFe (Scaled Agile Framework)

A set of organization and workflow patterns intended to guide enterprises in scaling lean and agile practices beyond single teams.

You will find this term commonly used in Software Development, Agile Methodologies

Salesforce

A cloud-based software company that provides customer relationship management service and also sells a complementary suite of enterprise applications.

You will find this term commonly used in CRM, Cloud Computing

Salesforce Certified Administrator

Demonstrates the ability to configure and manage a Salesforce application.

You will find this term commonly used in CRM Administration

Salesforce Certified Advanced Administrator

Demonstrates advanced knowledge of Salesforce administration, focusing on higher-level features, customization, and management.

You will find this term commonly used in CRM, Administration

Salesforce Certified Developer

Validates skills in custom development for Salesforce applications, including the ability to develop business logic and interfaces using the Salesforce platform.

You will find this term commonly used in CRM, Software Development

SAM (Software Asset Management)

The process of managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization.

You will find this term commonly used in General IT, Software Management

SAML (Security Assertion Markup Language)

A standard for exchanging authentication and authorization data between parties, particularly between an identity provider and a service provider.

You will find this term commonly used in Security, Cybersecurity

SAN

Storage Area Network, a specialized network that provides access to storage resources.

You will find this term commonly used in Storage

SAN (Storage Area Network)

A dedicated high-speed network that provides access to shared storage resources, such as disk arrays or tape libraries.

You will find this term commonly used in Storage

Sandbox

An isolated environment where untrusted programs can be executed without affecting the host system, commonly used for testing and security purposes.

You will find this term commonly used in Security, Cybersecurity

SANS Institute

Offers training and certifications in cybersecurity and information security, known for in-depth technical courses and GIAC certifications.

You will find this term commonly used in Cybersecurity

SATA (Serial ATA)

An interface used to connect ATA hard drives to a computer's motherboard, supporting faster data transfer speeds than its predecessor, PATA.

You will find this term commonly used in General IT, Hardware

SCADA (Supervisory Control and Data Acquisition)

A control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management.

You will find this term commonly used in Networking, Security

Scalability

The ability of a system, network, or process to handle growing amounts of work or users without sacrificing performance or reliability.

You will find this term commonly used in General IT

Scalability Testing

A type of testing to ensure a software application can handle the expected number of users, the amount of data, the number of transactions, etc.

You will find this term commonly used in Software Development, Testing

Scalable

A system or application's ability to handle increasing amounts of work or users without significant performance degradation.

You will find this term commonly used in General IT, Networking

Schema

In databases, a schema represents the organizational structure of the database comprising tables, views, and the relationships between them.

You will find this term commonly used in Databases, Data Management

Schema Migration

The process of managing changes to a database schema over time, including updates, deletions, and additions to the schema structure.

You will find this term commonly used in Databases, Software Development

Script Kiddie

A derogatory term for an inexperienced cybercriminal who uses scripts or programs developed by others to attack computer systems and networks.

You will find this term commonly used in Cybersecurity

Scripting

Writing code to automate tasks or processes.

You will find this term commonly used in General IT

Scrum

An Agile framework used for managing software development projects, emphasizing iterative development and collaboration.

You will find this term commonly used in Project Management, General IT

Scrum Master

A role within a Scrum team responsible for ensuring the team follows agile practices and principles.

You will find this term commonly used in Software Development, Agile Methodologies

SD-WAN (Software-Defined Wide Area Network)

A specific application of software-defined networking (SDN) technology applied to WAN connections, which are used to connect enterprise networks over large geographic distances.

You will find this term commonly used in Networking, Software Defined Networking

SDDC (Software-Defined Data Center)

A data center where all infrastructure is virtualized and delivered as a service, and the control of the data center is automated by software.

You will find this term commonly used in Networking, Cloud Computing

SDK (Software Development Kit)

A collection of software development tools in one installable package, designed to facilitate the creation of applications.

You will find this term commonly used in Software Development

SDLC (Software Development Life Cycle)

The process of planning, designing, developing, testing, deploying, and maintaining software applications.

You will find this term commonly used in Programming, General IT

SDP (Software-Defined Perimeter)

A security framework that denies access to resources until the identity of the device and the user has been verified.

You will find this term commonly used in Security, Cybersecurity

Search Algorithm

An algorithm for finding an item with specified properties among a collection of items. It can be either a general algorithm or a domain specific search algorithm.

You will find this term commonly used in Software Development, Algorithms

Search Engine

A program or website that enables users to search for information on the internet by entering keywords or phrases.

You will find this term commonly used in General IT

Search Engine Optimization (SEO)

The process of improving the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine.

You will find this term commonly used in General IT, Marketing

Secure Access Service Edge (SASE)

A network architecture that combines VPN and SD-WAN capabilities with cloud-native security functions.

You will find this term commonly used in Networking, Security

Secure Boot

A security feature that ensures only trusted software is executed during the boot process of a computer system.

You will find this term commonly used in Security, General IT

Secure Coding

Practices that aim to write software in such a way that prevents the introduction of security vulnerabilities.

You will find this term commonly used in Software Development, Security

Secure Shell (SSH)

A cryptographic network protocol for secure communication over an unsecured network.

You will find this term commonly used in Security

Secure Socket Layer (SSL)

Secure Socket Layer (SSL) is a cryptographic protocol that ensures secure communication over a computer network by encrypting data transmitted between clients and servers, preventing unauthorized access and data tampering.

You will find this term commonly used in Security, Networking, Cryptography

Security

The protection of computer systems, networks, and data from unauthorized access, attacks, damage, or theft.

You will find this term commonly used in Security, Cybersecurity

Security Assertion Markup Language (SAML)

An open standard that allows identity providers to pass authorization credentials to service providers.

You will find this term commonly used in Security, Web Development

Security Breach

Unauthorized access to, or disclosure of, sensitive information, usually as a result of a cyber attack or data breach.

You will find this term commonly used in Cybersecurity, Security

Security Engineer

Designs and implements systems and measures to protect an organization's data and infrastructure from cyber threats.

You will find this term commonly used in Cybersecurity, IT Security

Security Operations Center (SOC)

A centralized unit that deals with security issues on an organizational and technical level.

You will find this term commonly used in Security, Cybersecurity

Security Token

A physical or digital device that provides two factor authentication for a user to prove their identity in a login process.

You will find this term commonly used in Cybersecurity

Self-Driving Cars

Autonomous vehicles equipped with sensors and software to navigate and operate without human input.

You will find this term commonly used in AI, Robotics, General IT

Self-Healing

The ability of a system or network to automatically detect and recover from failures or errors.

You will find this term commonly used in General IT, Networking

Semantic Analysis

The process of understanding the meaning and interpretation of words, phrases, and sentences in the context of a language.

You will find this term commonly used in AI, Natural Language Processing

Semantic Web

An extension of the World Wide Web through standards by the World Wide Web Consortium (W3C). It promotes common data formats and exchange protocols on the Web.

You will find this term commonly used in General IT, Web Development

Semiconductor

A material that has a conductivity between conductors (usually metals) and nonconductors or insulators (such as most ceramics). Semiconductors are used in the manufacture of various kinds of electronic devices.

You will find this term commonly used in Hardware, Electronics

Sensor

A device that detects or measures physical properties and converts them into signals that can be interpreted and used by computers.

You will find this term commonly used in General IT

SEO (Search Engine Optimization)

The process of improving the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine.

You will find this term commonly used in General IT, Marketing

Serialization

The process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file.

You will find this term commonly used in Software Development, Programming

What's Your
Career Path?
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
172 Hrs 23 Min
icons8-video-camera-58
768 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart