IT Glossary - T - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Threat

Any potential danger to computer systems, networks, or data that could exploit vulnerabilities and cause harm.

You will find this term commonly used in Cybersecurity

Threat Intelligence

Threat intelligence is information collected, analyzed, and disseminated about potential or current cyber threats, attackers, vulnerabilities, and attack techniques, enabling organizations to proactively defend against security threats.

You will find this term commonly used in Cybersecurity, Security Operations, Intelligence Analysis

Threat Modeling

The process of identifying, understanding, and communicating potential threats to a system, and then determining the value that potential mitigations would have in reducing or neutralizing those threats.

You will find this term commonly used in Cybersecurity

Three-Tier Architecture

A client-server architecture that includes a user interface, application logic, and database storage layer. This model is a more scalable and flexible approach than the two-tier architecture.

You will find this term commonly used in Software Architecture

Throttling

Intentionally limiting or slowing down the processing of requests. In networking, it can refer to controlling the amount of bandwidth used by a program. In API management, it controls the rate of requests to prevent overloading services.

You will find this term commonly used in Networking, Web Development

Throughput

The amount of data that can be processed by a system or network from a given source to a given destination within a given period of time. Typically measured in bits per second (bps).

You will find this term commonly used in Networking, General IT

Thumbnail

A small image or representation of a larger image, used on the web to make browsing and loading more efficient. Thumbnails are typically used in digital galleries and online content to preview images or videos.

You will find this term commonly used in Web Development, Digital Media

Tiling Window Manager

A window manager that organizes applications into non-overlapping tiles, optimizing the use of screen space.

You will find this term commonly used in General IT

Time Complexity

A computational concept that describes the amount of computational time that an algorithm takes to complete as a function of the length of the input. It is used to estimate how an algorithm scales as the input size increases.

You will find this term commonly used in Software Development, Algorithms

Time Complexity Analysis

A theoretical concept used to describe the efficiency of algorithms, particularly how the execution time or the number of steps required grows with the size of the input.

You will find this term commonly used in Computer Science, Algorithms

Time Division Multiple Access (TDMA)

A channel access method for shared-medium networks which allows several users to share the same frequency channel by dividing the signal into different time slots.

You will find this term commonly used in Networking

Time Division Multiplexing (TDM)

A method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern.

You will find this term commonly used in Networking, Telecommunications

Time Series Database

A database optimized for time-stamped or time series data. Time series databases are built for handling metrics and events or measurements that are time-stamped.

You will find this term commonly used in Databases

Time Slice

The amount of time allocated to each process in a round-robin CPU scheduling algorithm.

You will find this term commonly used in Operating Systems

Time to First Byte (TTFB)

The time it takes for a browser to receive the first byte of data from the server.

You will find this term commonly used in Networking/Web Development

Time to Live (TTL) in DNS

The value that tells a DNS resolver how long to cache a query before requesting a new one.

You will find this term commonly used in Networking

Time-based One-time Password (TOTP)

An algorithm that generates a one-time password based on the current time, used for securing user authentication processes.

You will find this term commonly used in Security

Time-of-Check to Time-of-Use (TOCTOU)

A software bug caused by changes in a system between the checking of a condition and the use of the results of that check, which can lead to errors or security vulnerabilities.

You will find this term commonly used in Software Development, Security

Time-Sharing System

A type of operating system that allows many users to share the computer resources simultaneously. It was an advance over batch processing systems, where the computer would execute one program at a time.

You will find this term commonly used in Operating Systems, Computer Science

Time-stamp Counter (TSC)

A CPU register that counts the number of cycles since reset.

You will find this term commonly used in Hardware/Software Development

Time-to-Live (TTL)

A mechanism that limits the lifespan or lifetime of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data.

You will find this term commonly used in Networking

Time-to-Market

The period of time between the initial concept for a product and its eventual launch to the market. Reducing time-to-market is critical in industries where products are rapidly evolving.

You will find this term commonly used in General IT, Business

Timing Attack

An attack that uses the time taken by a system to execute cryptographic operations to find vulnerabilities.

You will find this term commonly used in Cybersecurity

Title Case

A text format where the first letter of each word is capitalized, used in programming and documentation.

You will find this term commonly used in General IT

Tizen

An open-source, Linux-based operating system for a wide range of devices, including smartphones, tablets, smart TVs, PCs, and smart home appliances. It is a project within the Linux Foundation and is governed by a Technical Steering Group.

You will find this term commonly used in Operating Systems, IoT

Tkinter

A Python binding to the Tk GUI toolkit. It is the standard Python interface to the Tk GUI toolkit and is Python's de facto standard GUI (Graphical User Interface) package.

You will find this term commonly used in Software Development

TLD (Top-Level Domain)

The highest level in the hierarchical Domain Name System of the Internet after the root domain. Examples include .com, .net, .org, .gov, .edu, and country-specific TLDs such as .uk, .ca, and .jp.

You will find this term commonly used in Web Development, Internet

TLS (Transport Layer Security)

A cryptographic protocol designed to provide communications security over a computer network. Websites use TLS to secure all communications between their servers and web browsers.

You will find this term commonly used in Security, Cybersecurity

Tmux

A terminal multiplexer for Unix-like operating systems. It allows multiple terminal sessions to be accessed simultaneously in a single window. It is useful for running more than one command-line program at the same time.

You will find this term commonly used in Software Development, System Administration

Toggle

A user interface element that allows the user to change a setting between two states.

You will find this term commonly used in User Interface Design

Token

A small hardware device or software application used to generate secure authentication codes for accessing a network or service.

You will find this term commonly used in Security, Cybersecurity

Token Ring

A networking protocol in which nodes are arranged in a ring topology and token passing is used as a method for preventing collisions and for controlling access to the network.

You will find this term commonly used in Networking

Token Ring Network

A local area network (LAN) in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host. Only a host that holds a token can send data on the network.

You will find this term commonly used in Networking

Token-Based Authentication

A security technique that authenticates the users who attempt to log in to a server, a network, or a database, or to access a service. This method uses tokens instead of traditional passwords.

You will find this term commonly used in Security, Cybersecurity

Tokenization

The process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value.

You will find this term commonly used in Security, Cybersecurity

Tomcat

Apache Tomcat is an open-source implementation of the Java Servlet, JavaServer Pages, Java Expression Language, and Java WebSocket technologies. It powers numerous large-scale, mission-critical web applications.

You will find this term commonly used in Web Development

Toolchain

A set of programming tools used together to perform complex software development tasks.

You will find this term commonly used in Software Development

Top-Down Design

A method of design where the system is decomposed from a high-level overview of the system to the details of its parts. This approach helps in understanding the overall system architecture and its components.

You will find this term commonly used in Software Development, Systems Design

Top-Down Programming

A programming approach that begins with the specification of large parts of a program and from there develops lower-level details. It contrasts with bottom-up programming, which starts with smaller components and integrates them into larger ones.

You will find this term commonly used in Software Development

Topology

The arrangement of the various elements (links, nodes, etc.) of a computer network. Common topologies include bus, star, ring, mesh, and tree.

You will find this term commonly used in Networking

Topology Discovery

The process of discovering the layout of a network, including devices and connections.

You will find this term commonly used in Networking

Tor (The Onion Router)

Free and open-source software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router".

You will find this term commonly used in Security, Privacy

Torque Script

A scripting language used for game development in the Torque game engine.

You will find this term commonly used in Game Development

Touch ID

A fingerprint recognition feature designed and released by Apple Inc. that allows users to unlock Apple devices, make purchases, and authenticate users in apps using their fingerprint.

You will find this term commonly used in Security, Mobile Computing

Touchscreen

An electronic visual display that the user can control through simple or multi-touch gestures by touching the screen with one or more fingers.

You will find this term commonly used in General IT, Hardware

Trace Routing

A computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.

You will find this term commonly used in Networking

Traceback

A report showing the sequence of function calls that led to an error in a program.

You will find this term commonly used in Software Development

Traceroute

A network diagnostic tool used to track the pathway taken by a packet on an IP network from source to destination, revealing the route of packets across an IP network.

You will find this term commonly used in Networking

Tracert

A command-line utility similar to traceroute, used in Windows operating systems to diagnose network connectivity issues by displaying the route packets take to reach a host and measuring transit delays.

You will find this term commonly used in Networking

Traffic Analysis

The process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted.

You will find this term commonly used in Cybersecurity, Network Security

What's Your
Career Path?
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart