IT Glossary - T - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

T-SQL (Transact-SQL)

A proprietary extension by Microsoft to SQL (Structured Query Language). T-SQL expands on the SQL standard to include procedural programming, local variables, and support for error handling.

You will find this term commonly used in Databases

Tableau

A visual analytics engine that makes it easier to create interactive and shareable dashboards.

You will find this term commonly used in Data Visualization, Business Intelligence

TACACS (Terminal Access Controller Access-Control System)

A protocol developed for the authentication, authorization, and accounting (AAA) services in network equipment. It allows a remote access server to communicate with an authentication server to determine if the user has access to the network.

You will find this term commonly used in Networking, Security

Tag Management System

A tool used in web development and digital marketing for managing the deployment of tags on a website without having to modify the code. Tags can include analytics, tracking, and marketing optimization scripts.

You will find this term commonly used in Web Development, Digital Marketing

Tailgating

An unauthorized person following an authorized person into a secured area, often by closely following them through a door intended for single-person access. It's a security breach that physical security measures aim to prevent.

You will find this term commonly used in Security, Physical Security

Taint Analysis

A form of static code analysis that checks if data from an untrusted source could flow into a security-sensitive location, without being sanitized. This technique is used to prevent vulnerabilities like SQL injection and cross-site scripting (XSS) in web applications.

You will find this term commonly used in Security, Software Development

Taint Checking

In programming, taint checking refers to the process of tracking the "taintedness" of inputs to a program or system, which helps in the detection and prevention of injection vulnerabilities.

You will find this term commonly used in Software Development, Security

Task Automation

The use of software to reduce the need for human intervention in the execution of tasks. Task automation is widely used in IT to streamline processes, reduce errors, and improve efficiency.

You will find this term commonly used in General IT, Productivity

TCO (Total Cost of Ownership)

An estimation of the expenses associated with purchasing, deploying, using, and retiring a product or piece of equipment. TCO is important in the IT industry for budgeting and decision-making processes.

You will find this term commonly used in General IT, Business Analysis

TCP Wrappers

A host-based networking ACL system, used to filter network access to Internet protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows the host to deny or allow access based on the service and originating IP address.

You will find this term commonly used in Networking, Security

TCP/IP

Transmission Control Protocol/Internet Protocol is the suite of communications protocols used to connect hosts on the Internet. It specifies how data is exchanged over the network.

You will find this term commonly used in Networking

TDD (Test-Driven Development)

A software development process that relies on the repetition of a very short development cycle: requirements are turned into very specific test cases, then the software is improved to pass the new tests, only.

You will find this term commonly used in Software Development

Teardown

In technology, a teardown is the process of disassembling a device to understand its internal components, build quality, and for educational purposes. It's also used in reverse engineering to analyze how a product works.

You will find this term commonly used in Hardware, Research & Development

Tech Stack

The set of technologies an organization uses to build a web or mobile application. It includes everything from programming languages and frameworks to servers, databases, and software development tools.

You will find this term commonly used in Software Development, Technology

Technical Debt

A concept in software development that reflects the implied cost of additional rework caused by choosing an easy solution now instead of using a better approach that would take longer.

You will find this term commonly used in Software Development

Technical Support Engineer

Offers support to customers experiencing technical problems with hardware or software, providing solutions and troubleshooting tips.

You will find this term commonly used in Customer Support, IT Services

Technical Writer

Produces documentation that helps users understand and effectively use product or system capabilities.

You will find this term commonly used in Documentation, Communication

Technology Stack

The set of technologies an organization uses to build a web or mobile application. It includes the programming languages, frameworks, database management systems, and tools that developers use to create the application.

You will find this term commonly used in Software Development, Web Development

Telematics

The branch of information technology that deals with the long-distance transmission of computerized information. It is often used in the context of automotive technologies like GPS navigation and automated driving systems.

You will find this term commonly used in Networking, Automotive Technology

Telemetry

An automated communications process by which measurements and other data are collected at remote or inaccessible points and transmitted to receiving equipment for monitoring.

You will find this term commonly used in Networking, General IT

Telemetry Data

Data that is collected remotely and automatically sent back to receiving equipment for monitoring. Telemetry data is widely used in IT for monitoring network performance, application performance, and system health.

You will find this term commonly used in Networking, Performance Monitoring

Telnet

A network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

You will find this term commonly used in Networking

Template

In software development, a template is a generic class or other unit of source code that can be used as the basis for unique units of code. It supports the reuse of software architecture.

You will find this term commonly used in Software Development

Temporal Database

A database that manages time-sensitive data. It records not only the current state of data like conventional databases but also historical data, allowing for queries over time.

You will find this term commonly used in Databases

TensorFlow

An open-source software library for dataflow and differentiable programming across a range of tasks. It is a symbolic math library, and is also used for machine learning applications such as neural networks.

You will find this term commonly used in AI, Machine Learning

TensorFlow Lite

A lightweight version of Google's TensorFlow open-source library for machine learning, designed for mobile and edge devices. It enables on-device machine learning inference with low latency and a small binary size.

You will find this term commonly used in AI, Machine Learning

Terabyte (TB)

A unit of digital information storage equal to approximately one trillion bytes or 2^40 bytes. Terabytes are commonly used to measure storage capacity in devices like hard drives and solid-state drives.

You will find this term commonly used in General IT

Teraflops

A unit of computing speed equal to one trillion floating point operations per second. It's often used to measure the computational power of supercomputers and high-performance computing systems.

You will find this term commonly used in General IT, High-Performance Computing

Ternary Operator

A conditional operator in programming that takes three arguments. The first argument is a comparison argument; the second and third arguments are the outcomes, depending on the result of the comparison.

You will find this term commonly used in Software Development

Ternary Search

An algorithm that divides the search space into three parts and finds the desired index or position of a key value.

You will find this term commonly used in Algorithms

Ternary Search Tree

A type of trie (prefix tree) where nodes are arranged in a manner that allows for efficient searches, insertions, and deletions of strings.

You will find this term commonly used in Data Structures

Terraform

An open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files.

You will find this term commonly used in Cloud Computing

Terraform Cloud

A cloud service by HashiCorp that provides teams with a shared space to collaboratively manage Terraform configurations, workspaces, variables, and state files.

You will find this term commonly used in Cloud Computing

Terraform Enterprise

An on-premises distribution of Terraform, designed for use by large enterprises. It adds collaboration and governance features to the open-source Terraform tool, enabling teams to safely and efficiently manage their infrastructure as code.

You will find this term commonly used in Cloud Computing, Infrastructure as Code

Terraform Provider

In Terraform, a provider is a plugin that allows Terraform to interact with cloud providers, SaaS providers, and other APIs to manage external resources as part of its infrastructure as code approach.

You will find this term commonly used in Cloud Computing

Test Automation

The use of software to control the execution of tests, the comparison of actual outcomes to predicted outcomes, the setting up of test preconditions, and other test control and test reporting functions.

You will find this term commonly used in Software Development, QA

Test Fixture

A fixed state of a set of objects used as a baseline for running tests in software development. The purpose of a test fixture is to ensure that there is a well-known and fixed environment in which tests are run so that results are repeatable.

You will find this term commonly used in Software Development, QA

Tethering

The practice of using a mobile device as a mobile hotspot. When tethering is enabled, the device shares its internet connection with other devices connected to it via Wi-Fi, Bluetooth, or USB.

You will find this term commonly used in Networking, Mobile Computing

Text Encoding

The process of converting text into a sequence of bytes. Encoding schemes such as ASCII, UTF-8, and UTF-16 are used to represent character sets in computers.

You will find this term commonly used in Software Development, General IT

Text Mining

The process of deriving high-quality information from text. It involves the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources.

You will find this term commonly used in AI, Machine Learning

Text-to-Speech (TTS)

A form of speech synthesis that converts text into spoken voice output. TTS systems are used in various applications, including assistive technologies for the visually impaired, navigation systems, and more.

You will find this term commonly used in AI, Accessibility

TFTP (Trivial File Transfer Protocol)

A simple, lockstep, File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network.

You will find this term commonly used in Networking

Thermal Design Power (TDP)

The maximum amount of heat generated by a computer chip or component (such as a CPU, GPU, or system on a chip) that the cooling system in a computer is designed to dissipate under any workload.

You will find this term commonly used in Hardware, Computing

Thin Client

A lightweight computer that is purpose-built for remote access to a server (typically cloud or desktop virtualization environments). It depends heavily on another computer to fulfill its computational roles.

You will find this term commonly used in Networking, Cloud Computing

Thin Film Transistor (TFT)

A type of technology used in displays, including LCDs, where each pixel is controlled by one to four transistors. It's known for high image quality and is used in a wide range of devices, from monitors and TVs to mobile phones and tablets.

You will find this term commonly used in Hardware, Displays

Thin Provisioning

A method of optimizing the efficiency of available space in storage area networks and virtual environments by allocating disk storage space in a flexible manner among multiple users.

You will find this term commonly used in Storage, Virtualization

Thread

The smallest sequence of programmed instructions that can be managed independently by a scheduler. In the context of programming, it refers to the execution of concurrent operations within a single process.

You will find this term commonly used in Software Development

Thread (in IoT)

A low-power, wireless networking protocol designed specifically for home automation. It is based on IPv6 and enables devices to connect directly to the internet, facilitating device-to-device and device-to-cloud communication in the Internet of Things.

You will find this term commonly used in Networking, IoT

Thread Pool

A pool of threads that can be reused for executing tasks, which is more efficient than creating and destroying threads for each task.

You will find this term commonly used in Software Development

Threading

The process of allowing a program to run multiple operations concurrently in the same process space.

You will find this term commonly used in Programming/Software Development

What's Your
Career Path?
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Training Hours
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Training Hours
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Training Hours
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Training Hours
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Training Hours
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart