IT Glossary - S - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

SNMP Trap

A message sent by an SNMP-enabled device to a management station, indicating that an event has occurred.

You will find this term commonly used in Networking, Network Management

SOAR (Security Orchestration, Automation, and Response)

Technologies that enable organizations to collect inputs monitored by the security operations team.

You will find this term commonly used in Security, Cybersecurity

Social Engineering

The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.

You will find this term commonly used in Cybersecurity

Social Media

Websites and applications that enable users to create and share content or to participate in social networking.

You will find this term commonly used in General IT, Communication

Social Media Analytics

The practice of gathering data from social media websites and analyzing that data using social media analytics tools to make business decisions.

You will find this term commonly used in General IT, Marketing

Software

Programs and applications that run on a computer system, including operating systems, utilities, and applications.

You will find this term commonly used in General IT, Programming

Software Architect

Makes high-level design choices and dictates technical standards, including software coding standards, tools, and platforms.

You will find this term commonly used in Software Development, Architecture

Software Architecture

The high-level structure of a software system, including its components and their interactions.

You will find this term commonly used in General IT, Development

Software as a Product

Software developed for sale or distribution to end-users as a standalone product, as opposed to software developed for internal use within an organization.

You will find this term commonly used in General IT, Business

Software as a Service (SaaS)

A software delivery model where applications are hosted by a third-party provider and accessed over the internet.

You will find this term commonly used in General IT

Software as a Solution (SaaS)

See "SaaS (Software as a Service)"

You will find this term commonly used in Cloud Computing, General IT

Software Asset Management (SAM)

The process of managing and optimizing the purchase, deployment, maintenance, and disposal of software assets within an organization.

You will find this term commonly used in General IT, Networking

Software Bug

An error or flaw in a computer program that produces unexpected or incorrect results.

You will find this term commonly used in General IT

Software Composition Analysis (SCA)

The process of automatically identifying and assessing the risk of open source software within a codebase or application.

You will find this term commonly used in Software Development, Security

Software Configuration

The process of setting up software options to meet specific requirements, which may involve customizing how the software looks or operates.

You will find this term commonly used in Software Development, IT Management

Software Configuration Management

The process of managing changes to software systems, including version control, build management, and release management.

You will find this term commonly used in Project Management, General IT

Software Defined Networking (SDN)

Software-defined networking (SDN) is a network architecture approach that separates the control plane from the data plane, enabling centralized management and programmability of network infrastructure through software-based controllers.

You will find this term commonly used in Networking, Virtualization, Network Management

Software Defined Storage

Software-defined storage (SDS) is a storage architecture that separates storage hardware from software management and control, enabling centralized and automated management of storage resources across heterogeneous environments.

You will find this term commonly used in Storage, Virtualization, Cloud Computing

Software Defined Storage (SDS)

A storage architecture that separates storage hardware from software management, enabling flexibility, scalability, and automation.

You will find this term commonly used in Storage, General IT

Software Deployment

The process of installing, configuring, and making software available for use.

You will find this term commonly used in General IT, Development

Software Design Pattern

A general, reusable solution to a commonly occurring problem within a given context in software design.

You will find this term commonly used in Software Development, Programming

Software Development

The process of creating software programs or applications.

You will find this term commonly used in General IT

Software Development Kit (SDK)

A software development kit (SDK) is a set of tools, libraries, and documentation provided by software vendors or platforms to facilitate the development of applications for specific operating systems, frameworks, or platforms.

You will find this term commonly used in Software Development, Tools, Platform Integration

Software Development Life Cycle (SDLC)

The Software Development Life Cycle (SDLC) is a process framework used in software development to plan, design, build, test, deploy, and maintain software systems, ensuring quality, efficiency, and adherence to project requirements.

You will find this term commonly used in Software Development, Project Management

Software Development Lifecycle (SDLC)

The process of planning, creating, testing, and deploying software applications or systems.

You will find this term commonly used in General IT

Software Development Methodology

A software development methodology is a framework or process model used in software engineering to structure, plan, and control the development of software systems, defining principles, phases, and practices to guide the development process.

You will find this term commonly used in Software Development, Project Management

Software Engineer

Applies engineering principles to the design, development, maintenance, testing, and evaluation of software and systems.

You will find this term commonly used in Software Development, Engineering

Software Engineering

The application of engineering principles to software development.

You will find this term commonly used in General IT

Software Licensing

The legal agreements and terms that govern the use, distribution, and redistribution of software.

You will find this term commonly used in Legal, General IT

Software Maintenance

Software maintenance is the process of modifying, updating, and enhancing software applications or systems after their initial deployment, typically to fix bugs, improve performance, or add new features and functionalities.

You will find this term commonly used in Software Development, Maintenance

Software Patch

A piece of software designed to update or fix problems with a computer program.

You will find this term commonly used in Security

Software Piracy

The unauthorized copying, distribution, or use of software. It is illegal and considered a breach of copyright law.

You will find this term commonly used in Legal, Software Management

Software Quality Assurance (SQA)

A means of monitoring the software engineering processes and methods used to ensure quality.

You will find this term commonly used in Software Development, Quality Assurance

Software Repository

A storage location from which software packages may be retrieved and installed on a computer.

You will find this term commonly used in Software Development, Software Management

Software Testing

Software testing is the process of evaluating and verifying the functionality, performance, and quality of software applications or systems through systematic execution of test cases, aiming to identify defects and ensure reliability.

You will find this term commonly used in Software Development, Quality Assurance

Solid Programming

A set of principles designed to improve software maintainability and extendibility by promoting a more loosely coupled and modular architecture.

You will find this term commonly used in Software Development, Programming

Solid State Drive (SSD)

A data storage device that uses integrated circuit assemblies to store data persistently, typically faster and more reliable than traditional hard disk drives (HDDs).

You will find this term commonly used in Storage

Solidity

A contract-oriented programming language for writing smart contracts. It is used for implementing smart contracts on various blockchain platforms, most notably, Ethereum.

You will find this term commonly used in Software Development, Blockchain

Source Code

Source code is the human-readable version of a computer program written in programming languages, containing instructions and logic that define the behavior and functionality of software applications.

You will find this term commonly used in Software Development, Programming Languages

Source Code Management (SCM)

The management of changes to documents, programs, and other information stored as computer files.

You will find this term commonly used in Software Development, Version Control

Spam

Unsolicited or unwanted email messages, often sent in bulk, typically for advertising or phishing purposes.

You will find this term commonly used in Cybersecurity

Spam Filter

Software or hardware mechanisms designed to identify and remove unsolicited or unwanted email messages from an inbox.

You will find this term commonly used in Cybersecurity

Spam Filtering

The use of various methods to block email spam, or unsolicited bulk email.

You will find this term commonly used in Security, Email Systems

Spatial Computing

A computing paradigm that integrates digital information with the physical environment, often using technologies such as augmented reality (AR) and virtual reality (VR).

You will find this term commonly used in AR/VR, General IT

Spatial Database

A database that is optimized to store and query data related to objects in space, including points, lines, and polygons.

You will find this term commonly used in Databases, GIS

Spear Phishing

An email or electronic communications scam targeted towards a specific individual, organization, or business.

You will find this term commonly used in Security, Cybersecurity

Spear Phishing Attack

A targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons.

You will find this term commonly used in Cybersecurity

Specification by Example

An approach to software development that defines software requirements using realistic examples instead of abstract statements.

You will find this term commonly used in Software Development, Agile Methodologies

Speech Recognition

The ability of a computer program to identify words and phrases in spoken language and convert them to a machine-readable format.

You will find this term commonly used in AI, Human-Computer Interaction

Speech Synthesis

The artificial production of human speech.

You will find this term commonly used in AI, Human-Computer Interaction

What's Your
Career Path?
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart