IT Glossary
Key Terms To Know In The IT Industry
Speech to Text
The process of converting spoken words into written texts. This technology is often used in voice recognition systems.
You will find this term commonly used in AI, Human-Computer Interaction
Spline
A mathematical function used for creating smooth curves in computer graphics and other fields.
You will find this term commonly used in Computer Graphics, Modeling
Splunk
A software platform to search, analyze and visualize the machine-generated data gathered from the websites, applications, sensors, devices, etc.
You will find this term commonly used in Big Data, Security
Spoofing
The act of masquerading as a valid entity through falsification of data (such as an IP address or username), to gain an illegitimate advantage.
You will find this term commonly used in Cybersecurity
Spyware
Malicious software that secretly gathers information about a user.
You will find this term commonly used in Security
SQL
Structured Query Language, used for managing and manipulating relational databases.
You will find this term commonly used in Database Management
SQL (Structured Query Language)
A domain-specific language used for managing and manipulating relational databases.
You will find this term commonly used in General IT
SQL Database
A database that uses SQL (Structured Query Language) for defining and manipulating data.
You will find this term commonly used in Databases, Data Management
SSD (Solid State Drive)
A type of nonvolatile storage media that stores persistent data on solid-state flash memory.
You will find this term commonly used in Hardware, Storage
SSD Overprovisioning
The inclusion of extra capacity in a solid-state drive (SSD), which is not accessible to the end-user, to manage write operations and improve the drive's lifespan.
You will find this term commonly used in Hardware, Storage
SSL
Secure Sockets Layer, a protocol for securing communication over the internet.
You will find this term commonly used in Security
SSL (Secure Sockets Layer)
A cryptographic protocol used to secure communication over a computer network, commonly used for securing web traffic.
You will find this term commonly used in Security, Networking, Cybersecurity
SSL Acceleration
The use of a device that offloads the SSL encryption and decryption work from the web server to improve performance.
You will find this term commonly used in Networking, Web Security
SSL Certificate
A digital certificate that provides authentication for a website and enables an encrypted connection.
You will find this term commonly used in Security, Web Security
SSL/TLS
Protocols used to provide secure communication over a computer network by encrypting data transmitted between clients and servers.
You will find this term commonly used in Security, Cybersecurity
Stack Overflow
A popular Q&A website for programmers and developers to learn, share their knowledge, and build their careers.
You will find this term commonly used in Software Development, Community
Stateless
A communication protocol in which each transaction is independent of any previous transaction, unlike stateful protocols which require keeping of the internal state on the server.
You will find this term commonly used in Networking, Web Development
Stateless Application
An application that does not save client data generated in one session for use in the next session with that client.
You will find this term commonly used in Software Development, Web Development
Stateless Protocol
A communication protocol in which each message contains all the information needed to understand the message, independent of any previous messages.
You will find this term commonly used in Networking, Web Development
Static Code Analysis
The analysis of computer software that is performed without actually executing programs, in contrast with dynamic analysis, which is analysis performed on programs while they are executing.
You will find this term commonly used in Software Development, Quality Assurance
Static IP Address
An IP address that doesn't change. Contrast with a dynamic IP address which can change every time the device connects to the internet or the network.
You will find this term commonly used in Networking, Internet Technology
Static Typing
A programming language feature in which variable types are explicitly declared and thus are determined at compile time.
You will find this term commonly used in Software Development, Programming Languages
Steganography
The practice of concealing messages or information within other non-secret text or data.
You will find this term commonly used in Security, Cryptography
Stepper Motor
A type of DC motor that moves in discrete steps. It is used in a variety of applications requiring precise position control.
You will find this term commonly used in Hardware, Robotics
Sticky Session
A method used in web servers to achieve server-side load balancing; once a session is started on one server, all the requests from that user are sent to the same server.
You will find this term commonly used in Networking, Web Development
Storage
The process of retaining data in a digital format for future use.
You will find this term commonly used in General IT
Storage Area Network (SAN)
A specialized high-speed network that provides access to consolidated, block-level data storage.
You will find this term commonly used in Networking
Storage Virtualization
The process of abstracting logical storage from physical storage.
You will find this term commonly used in Storage
Stream Cipher
A method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time.
You will find this term commonly used in Security, Cryptography
Stream Processing
Real-time processing of data streams to extract insights or trigger actions as the data is generated.
You will find this term commonly used in Big Data, Analytics, General IT
Streaming
Transmitting data continuously in real-time over a network.
You will find this term commonly used in Networking
Structured Data
Data that is organized into a predefined format, such as a database.
You will find this term commonly used in Database Management
Structured Query Language (SQL) Injection
A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
You will find this term commonly used in Security, Web Development
Subnet
A logical subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.
You will find this term commonly used in Networking, Network Management
Subnet Mask
A 32-bit number that masks an IP address, and divides the IP address into network address and host address.
You will find this term commonly used in Networking, Network Management
Supervised Learning
A type of machine learning where a model is trained on a labeled dataset, meaning each training example is paired with an output label.
You will find this term commonly used in AI, Machine Learning
Supervisory Control and Data Acquisition (SCADA) Systems
Large-scale, industrial control systems used to monitor and control industrial, infrastructure, or facility-based processes.
You will find this term commonly used in Networking, Industrial Control Systems
Supply Chain Management
Supply chain management (SCM) is the process of planning, coordinating, and optimizing the flow of goods, services, information, and finances across the entire supply chain, from raw material sourcing to production, distribution, and delivery.
You will find this term commonly used in Logistics, Operations, Business Process Management
Swagger
A set of tools for designing, building, documenting, and consuming RESTful web services. It includes automated documentation, code generation, and test-case generation.
You will find this term commonly used in Software Development, API Development
Swarm Intelligence
The collective behavior of decentralized, self-organized systems, natural or artificial. The concept is employed in work on artificial intelligence.
You will find this term commonly used in AI, Robotics
Swift
A powerful and intuitive programming language for macOS, iOS, watchOS, and tvOS.
You will find this term commonly used in Software Development, Programming Languages
Switch
A network device that connects multiple devices within a local area network (LAN) and forwards data packets between them.
You will find this term commonly used in Networking, General IT
Switching
The process of directing data packets between devices on the same network or between networks.
You will find this term commonly used in Networking, Data Communication
Symmetric Encryption
A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
You will find this term commonly used in Security, Cryptography
Syntax Highlighting
A feature of text editors that displays text—especially source code—in different colors and fonts according to the category of terms.
You will find this term commonly used in Software Development, Programming
Synthetic Data
Artificial data generated programmatically to mimic real data for testing, training, or research purposes.
You will find this term commonly used in Data Science, General IT
Synthetic Intelligence
An alternative term often used to describe artificial intelligence that emphasizes the creation of intelligence through synthetic (or artificial) means.
You will find this term commonly used in AI, General IT
Synthetic Monitoring
Monitoring the performance and availability of applications and systems using simulated transactions.
You will find this term commonly used in General IT, Monitoring
Syslog
A standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them.
You will find this term commonly used in Software Development, System Administration
System
A collection of hardware, software, and firmware components that work together to perform a specific function or task.
You will find this term commonly used in General IT
Career Path?
AZ-104 Learning Path : Become an Azure Administrator
$51.60 – $169.00
Kubernetes Certification: The Ultimate Certification and Career Advancement Series
$129.00 $51.60
AWS Cloud Practitioner Career Path
$129.00 $51.60
Cisco Network Engineer Career Path
$129.00 $51.60
Data Analyst Career Path
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
Network Administrator Career Path
$129.00 $51.60
Information Security Analyst Career Path
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60
Video Editor Career Path
$129.00 $51.60
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Google DevOps Engineer Career Path
$129.00 $51.60