IT Glossary
Key Terms To Know In The IT Industry
Traffic Engineering
The process of optimizing the performance of a telecommunications network by dynamically analyzing, predicting, and regulating the behavior of data transmitted over that network, often using sophisticated modeling and simulation techniques.
You will find this term commonly used in Networking, Telecommunications
Traffic Management
The practice of managing data transfer on networks through the prioritization of certain data streams, controlling bandwidth allocation, and managing network congestion to ensure efficient and reliable data transmission.
You will find this term commonly used in Networking, IT Management
Traffic Shaping
The practice of regulating network traffic to optimize or guarantee performance, improve latency, or increase usable bandwidth for some applications over others.
You will find this term commonly used in Networking
Transaction
A sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.
You will find this term commonly used in Databases
Transaction Log
A log that records all transactions that have been executed by a system to ensure data integrity.
You will find this term commonly used in Databases
Transaction Processing
The collection, storage, modification, and retrieval of transactions of an enterprise. Transaction processing ensures that data integrity is maintained in multi-access environments and in the event of system failure.
You will find this term commonly used in Databases, General IT
Transactional Database
A type of database that prioritizes correct and complete transactions. It uses a series of operations that are treated as a single unit, ensuring that either all operations within the transaction are completed or none are.
You will find this term commonly used in Databases
Transactional Email
Email sent to facilitate an agreed-upon transaction between the sender and the recipient. Transactional emails are typically automated and triggered by a user's actions, such as order confirmations, receipts, and password resets.
You will find this term commonly used in Communications, E-commerce
Transactional Memory
A concurrency control mechanism that simplifies the development of concurrent programs by allowing blocks of instructions to execute in an atomic manner.
You will find this term commonly used in Software Development
Transceiver
A device that can both transmit and receive communications, in particular a combined radio transmitter and receiver. Transceivers are used in networking to connect nodes and facilitate communication.
You will find this term commonly used in Networking
Transclusion
Including part of a document within another document by reference.
You will find this term commonly used in Web Development
Transcoding
The direct digital-to-digital conversion of one encoding to another. This is often done to incompatible or obsolete data in order to convert it into a more suitable format.
You will find this term commonly used in Digital Media
Transcoding in Streaming Media
The process of converting a media file or stream from one format to another, typically to ensure compatibility across different platforms and devices. It is crucial in digital media distribution to accommodate various bandwidths and device capabilities.
You will find this term commonly used in Digital Media, Networking
Transfer Protocol
A set of rules that define how data is transferred over a network.
You will find this term commonly used in Networking
Transformer (in AI)
A deep learning model architecture used primarily in the field of natural language processing (NLP).
You will find this term commonly used in AI
Transformer Networks
A type of deep learning model that relies on self-attention mechanisms to draw global dependencies between input and output, widely used in the field of natural language processing (NLP).
You will find this term commonly used in AI
Transient Fault
A fault in a system that occurs briefly and then disappears, making it difficult to detect and fix.
You will find this term commonly used in Hardware/Software
Transient State
In computing, a transient state refers to a temporary condition of a system or process. This term is often used in relation to network connections, virtual machines, and in programming during the initialization or cleanup processes.
You will find this term commonly used in General IT, Software Development
Transistor
A semiconductor device used to amplify or switch electronic signals and electrical power. Transistors are one of the basic building blocks of modern electronics.
You will find this term commonly used in Electronics, Hardware
Transistor Logic
A system of implementing logical functions using the properties of transistors.
You will find this term commonly used in Hardware
Translation Lookaside Buffer (TLB)
A memory cache that stores recent translations of virtual memory to physical memory addresses.
You will find this term commonly used in Hardware
Transparency
In computing, transparency refers to a system's ability to hide the complexity of its processes from its users. For example, distributed systems strive for location transparency, where users don't need to know the physical location of resources.
You will find this term commonly used in General IT, Systems Design
Transparency (in Computing)
The quality of a system or system component being invisible to the user or not requiring the user to be aware of its complexity or inner workings.
You will find this term commonly used in General IT
Transparency in Algorithms
The principle that algorithms should be understandable and their actions predictable to those affected by their decisions.
You will find this term commonly used in AI/Ethics
Transpiler
A type of compiler that transforms source code written in one programming language into another programming language. Transpilers are often used to convert newer versions of programming languages into versions compatible with older environments.
You will find this term commonly used in Software Development
Transpiler (or Source-to-Source Compiler)
A type of compiler that takes the source code of a program written in one programming language and produces the equivalent source code in another language.
You will find this term commonly used in Software Development
Transport Layer
The fourth layer in the OSI model of computer networking. The transport layer is responsible for the transfer of data between end systems or hosts and is where session management, segmentation, and error checking occur.
You will find this term commonly used in Networking
Transport Protocol
A protocol that delivers data across a network, such as TCP or UDP.
You will find this term commonly used in Networking
Traversal Algorithm
An algorithm used to visit all the nodes of a graph or tree data structure.
You will find this term commonly used in Algorithms
Tree
A widely used abstract data type (ADT) or data structure that simulates a hierarchical tree structure, with a root value and subtrees of children, represented as a set of linked nodes.
You will find this term commonly used in Data Structures
Tree Structure
A hierarchical structure that simulates a tree with a single root and branches out to leaves. In computing, it is used in data structures, algorithms, and file systems to organize data.
You will find this term commonly used in Software Development, Algorithms
Tree Topology
A network topology in which all the nodes are connected to a central node in a hierarchy that resembles a tree structure. This topology combines the characteristics of linear bus and star topologies.
You will find this term commonly used in Networking
Tree Traversal
The process of visiting (checking and/or updating) each node in a tree data structure, exactly once. Such traversals are classified by the order in which the nodes are visited. The most common types are in-order, pre-order, and post-order traversal.
You will find this term commonly used in Algorithms, Data Structures
Treemap
A visual representation of hierarchical data using nested rectangles.
You will find this term commonly used in Data Visualization
Trello
A web-based, Kanban-style, list-making application and is a subsidiary of Atlassian.
You will find this term commonly used in Project Management, Collaboration
Trend Analysis
The practice of collecting data and attempting to spot a pattern, often used in data analysis and forecasting.
You will find this term commonly used in Data Science
Tri-band
A term used in wireless communications to denote capabilities or devices that operate over three different frequencies or bands. It is often used in the context of Wi-Fi routers and mobile phones.
You will find this term commonly used in Networking, Wireless Communications
Triangulation
In computing, a method for determining the location of a point by forming triangles to it from known points.
You will find this term commonly used in GIS/Location Services
Trickle Charging
A charging process that maintains a full charge by applying a small amount of current.
You will find this term commonly used in Hardware
Trigger (in Databases)
A procedural code that is automatically executed in response to certain events on a particular table or view in a database.
You will find this term commonly used in Databases
Trim Command (in SSD)
A command that enables an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally.
You will find this term commonly used in Hardware
Triple DES
A symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. It is a method of increasing the security of DES by applying it three times to each data block.
You will find this term commonly used in Security, Cybersecurity
Triple Fault
A condition in a CPU that occurs when an exception is generated while trying to call an exception handler.
You will find this term commonly used in Hardware
Triple Play Services
In telecommunications, triple play service is a marketing term for the provisioning of the three services: high-speed Internet access, television, and telephone over a single broadband connection.
You will find this term commonly used in Networking, Telecommunications
Triple Store
A type of database used for storing and retrieving data in the form of triples, using the subject-predicate-object model. This is often used in storing, querying, and managing RDF (Resource Description Framework) data.
You will find this term commonly used in Databases, Web Development
Triple-DES (3DES)
An encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. It was developed to overcome the limitations of DES by increasing the encryption level through multiple encryptions.
You will find this term commonly used in Security, Cryptography
Trivial File Transfer Protocol (TFTP)
A simple, lightweight version of the File Transfer Protocol (FTP) that allows files to be transferred from one computer to another over a network. TFTP is used for transferring small files across networks, such as when booting a computer from a network.
You will find this term commonly used in Networking
Trojan
A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
You will find this term commonly used in Cybersecurity
Trojan Horse
Malicious software disguised as legitimate programs or files, which, when executed, perform unauthorized actions on a computer system.
You will find this term commonly used in Cybersecurity
Trolley Problem (in AI Ethics)
A thought experiment in ethics and AI that highlights the dilemma of programming moral decisions into autonomous machines.
You will find this term commonly used in AI Ethics
Career Path?
AWS Cloud Practitioner Career Path
$129.00 $51.60
Pentester Career Path
$129.00 $51.60
Network Administrator Career Path
$129.00 $51.60
AZ-104 Learning Path : Become an Azure Administrator
$51.60 – $169.00
Google DevOps Engineer Career Path
$129.00 $51.60
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
Certified Ethical Hacker Career Path
$129.00 $51.60
Video Editor Career Path
$129.00 $51.60
Cisco Network Engineer Career Path
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60
Information Security Analyst Career Path
$129.00 $51.60