IT Glossary - T - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Traffic Engineering

The process of optimizing the performance of a telecommunications network by dynamically analyzing, predicting, and regulating the behavior of data transmitted over that network, often using sophisticated modeling and simulation techniques.

You will find this term commonly used in Networking, Telecommunications

Traffic Management

The practice of managing data transfer on networks through the prioritization of certain data streams, controlling bandwidth allocation, and managing network congestion to ensure efficient and reliable data transmission.

You will find this term commonly used in Networking, IT Management

Traffic Shaping

The practice of regulating network traffic to optimize or guarantee performance, improve latency, or increase usable bandwidth for some applications over others.

You will find this term commonly used in Networking

Transaction

A sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.

You will find this term commonly used in Databases

Transaction Log

A log that records all transactions that have been executed by a system to ensure data integrity.

You will find this term commonly used in Databases

Transaction Processing

The collection, storage, modification, and retrieval of transactions of an enterprise. Transaction processing ensures that data integrity is maintained in multi-access environments and in the event of system failure.

You will find this term commonly used in Databases, General IT

Transactional Database

A type of database that prioritizes correct and complete transactions. It uses a series of operations that are treated as a single unit, ensuring that either all operations within the transaction are completed or none are.

You will find this term commonly used in Databases

Transactional Email

Email sent to facilitate an agreed-upon transaction between the sender and the recipient. Transactional emails are typically automated and triggered by a user's actions, such as order confirmations, receipts, and password resets.

You will find this term commonly used in Communications, E-commerce

Transactional Memory

A concurrency control mechanism that simplifies the development of concurrent programs by allowing blocks of instructions to execute in an atomic manner.

You will find this term commonly used in Software Development

Transceiver

A device that can both transmit and receive communications, in particular a combined radio transmitter and receiver. Transceivers are used in networking to connect nodes and facilitate communication.

You will find this term commonly used in Networking

Transclusion

Including part of a document within another document by reference.

You will find this term commonly used in Web Development

Transcoding

The direct digital-to-digital conversion of one encoding to another. This is often done to incompatible or obsolete data in order to convert it into a more suitable format.

You will find this term commonly used in Digital Media

Transcoding in Streaming Media

The process of converting a media file or stream from one format to another, typically to ensure compatibility across different platforms and devices. It is crucial in digital media distribution to accommodate various bandwidths and device capabilities.

You will find this term commonly used in Digital Media, Networking

Transfer Protocol

A set of rules that define how data is transferred over a network.

You will find this term commonly used in Networking

Transformer (in AI)

A deep learning model architecture used primarily in the field of natural language processing (NLP).

You will find this term commonly used in AI

Transformer Networks

A type of deep learning model that relies on self-attention mechanisms to draw global dependencies between input and output, widely used in the field of natural language processing (NLP).

You will find this term commonly used in AI

Transient Fault

A fault in a system that occurs briefly and then disappears, making it difficult to detect and fix.

You will find this term commonly used in Hardware/Software

Transient State

In computing, a transient state refers to a temporary condition of a system or process. This term is often used in relation to network connections, virtual machines, and in programming during the initialization or cleanup processes.

You will find this term commonly used in General IT, Software Development

Transistor

A semiconductor device used to amplify or switch electronic signals and electrical power. Transistors are one of the basic building blocks of modern electronics.

You will find this term commonly used in Electronics, Hardware

Transistor Logic

A system of implementing logical functions using the properties of transistors.

You will find this term commonly used in Hardware

Translation Lookaside Buffer (TLB)

A memory cache that stores recent translations of virtual memory to physical memory addresses.

You will find this term commonly used in Hardware

Transparency

In computing, transparency refers to a system's ability to hide the complexity of its processes from its users. For example, distributed systems strive for location transparency, where users don't need to know the physical location of resources.

You will find this term commonly used in General IT, Systems Design

Transparency (in Computing)

The quality of a system or system component being invisible to the user or not requiring the user to be aware of its complexity or inner workings.

You will find this term commonly used in General IT

Transparency in Algorithms

The principle that algorithms should be understandable and their actions predictable to those affected by their decisions.

You will find this term commonly used in AI/Ethics

Transpiler

A type of compiler that transforms source code written in one programming language into another programming language. Transpilers are often used to convert newer versions of programming languages into versions compatible with older environments.

You will find this term commonly used in Software Development

Transpiler (or Source-to-Source Compiler)

A type of compiler that takes the source code of a program written in one programming language and produces the equivalent source code in another language.

You will find this term commonly used in Software Development

Transport Layer

The fourth layer in the OSI model of computer networking. The transport layer is responsible for the transfer of data between end systems or hosts and is where session management, segmentation, and error checking occur.

You will find this term commonly used in Networking

Transport Protocol

A protocol that delivers data across a network, such as TCP or UDP.

You will find this term commonly used in Networking

Traversal Algorithm

An algorithm used to visit all the nodes of a graph or tree data structure.

You will find this term commonly used in Algorithms

Tree

A widely used abstract data type (ADT) or data structure that simulates a hierarchical tree structure, with a root value and subtrees of children, represented as a set of linked nodes.

You will find this term commonly used in Data Structures

Tree Structure

A hierarchical structure that simulates a tree with a single root and branches out to leaves. In computing, it is used in data structures, algorithms, and file systems to organize data.

You will find this term commonly used in Software Development, Algorithms

Tree Topology

A network topology in which all the nodes are connected to a central node in a hierarchy that resembles a tree structure. This topology combines the characteristics of linear bus and star topologies.

You will find this term commonly used in Networking

Tree Traversal

The process of visiting (checking and/or updating) each node in a tree data structure, exactly once. Such traversals are classified by the order in which the nodes are visited. The most common types are in-order, pre-order, and post-order traversal.

You will find this term commonly used in Algorithms, Data Structures

Treemap

A visual representation of hierarchical data using nested rectangles.

You will find this term commonly used in Data Visualization

Trello

A web-based, Kanban-style, list-making application and is a subsidiary of Atlassian.

You will find this term commonly used in Project Management, Collaboration

Trend Analysis

The practice of collecting data and attempting to spot a pattern, often used in data analysis and forecasting.

You will find this term commonly used in Data Science

Tri-band

A term used in wireless communications to denote capabilities or devices that operate over three different frequencies or bands. It is often used in the context of Wi-Fi routers and mobile phones.

You will find this term commonly used in Networking, Wireless Communications

Triangulation

In computing, a method for determining the location of a point by forming triangles to it from known points.

You will find this term commonly used in GIS/Location Services

Trickle Charging

A charging process that maintains a full charge by applying a small amount of current.

You will find this term commonly used in Hardware

Trigger (in Databases)

A procedural code that is automatically executed in response to certain events on a particular table or view in a database.

You will find this term commonly used in Databases

Trim Command (in SSD)

A command that enables an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally.

You will find this term commonly used in Hardware

Triple DES

A symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. It is a method of increasing the security of DES by applying it three times to each data block.

You will find this term commonly used in Security, Cybersecurity

Triple Fault

A condition in a CPU that occurs when an exception is generated while trying to call an exception handler.

You will find this term commonly used in Hardware

Triple Play Services

In telecommunications, triple play service is a marketing term for the provisioning of the three services: high-speed Internet access, television, and telephone over a single broadband connection.

You will find this term commonly used in Networking, Telecommunications

Triple Store

A type of database used for storing and retrieving data in the form of triples, using the subject-predicate-object model. This is often used in storing, querying, and managing RDF (Resource Description Framework) data.

You will find this term commonly used in Databases, Web Development

Triple-DES (3DES)

An encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. It was developed to overcome the limitations of DES by increasing the encryption level through multiple encryptions.

You will find this term commonly used in Security, Cryptography

Trivial File Transfer Protocol (TFTP)

A simple, lightweight version of the File Transfer Protocol (FTP) that allows files to be transferred from one computer to another over a network. TFTP is used for transferring small files across networks, such as when booting a computer from a network.

You will find this term commonly used in Networking

Trojan

A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.

You will find this term commonly used in Cybersecurity

Trojan Horse

Malicious software disguised as legitimate programs or files, which, when executed, perform unauthorized actions on a computer system.

You will find this term commonly used in Cybersecurity

Trolley Problem (in AI Ethics)

A thought experiment in ethics and AI that highlights the dilemma of programming moral decisions into autonomous machines.

You will find this term commonly used in AI Ethics

What's Your
Career Path?
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart