IT Glossary - T - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

True Color

A method of representing and storing graphical image information in an RGB color model where each color is represented by 24 bits.

You will find this term commonly used in Graphics

TrueType

A standard for digital type fonts that was developed by Apple Computer, and is widely used in both Windows and Macintosh operating systems.

You will find this term commonly used in Graphics/Typography

Trunk Port

In networking, a trunk port is a port on a switch that is configured to carry traffic for multiple VLANs. It is used to route traffic between switches and routers in a network, allowing devices in different VLANs to communicate with each other.

You will find this term commonly used in Networking

Trunking

In networking, trunking is the practice of using a single communication link to carry multiple VLANs or network traffic. It is used to efficiently manage network traffic and simplify the network infrastructure.

You will find this term commonly used in Networking

Trust Anchor

A set of trusted keys used in digital security to verify the legitimacy of digital certificates and signatures.

You will find this term commonly used in Cybersecurity

Trust Management

In computer security, a broad approach to policies and mechanisms for ensuring the security of applications and electronic transactions, managing the trust relationships inherent in those processes.

You will find this term commonly used in Cybersecurity

Trust Relationship

In security, a trust relationship is the link established between two domains that allows users in one domain to access resources in the other domain.

You will find this term commonly used in Security, Networking

Trusted Computing Base (TCB)

The set of all hardware, firmware, and/or software components that are critical to a system's security.

You will find this term commonly used in Security

Trusted Execution Environment (TEE)

A secure area of a main processor. It guarantees code and data loaded inside to be protected with respect to confidentiality and integrity, thus establishing a secure execution environment for sensitive and trusted code.

You will find this term commonly used in Security, Mobile Computing

Trusted Platform Module (TPM)

A specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. It is used to enhance network security.

You will find this term commonly used in Security, Hardware

TTL (Time to Live)

A mechanism that limits the lifespan or the number of hops that data packets can take before they are discarded by a network router. TTL is used in networking to prevent data packets from circulating indefinitely.

You will find this term commonly used in Networking

TTL (Transistor-Transistor Logic)

A class of digital circuits built from transistors. It is used in the design of digital devices. It is notable for being a widespread integrated circuit (IC) family used in many applications such as computers, industrial controls, etc.

You will find this term commonly used in Hardware, Electronics

TTY (Teletypewriter)

Originally a device for sending typed messages over telephony networks. In computing, TTY has become a shorthand for terminal devices or terminal emulators, which provide an interface to the Unix shell.

You will find this term commonly used in General IT, Unix/Linux Systems

TUI (Terminal User Interface)

A type of user interface that allows users to interact with the computer through a command-line or text-based interface.

You will find this term commonly used in User Interface Design

TUI (Text User Interface)

An interface that uses text characters and symbols, rather than graphics, to interact with the computer.

You will find this term commonly used in User Interface Design

Tunneling Protocol

A protocol that allows for the secure passage of data from one network to another through a public network.

You will find this term commonly used in Networking

Tunnelling

The process of sending a network protocol or application through another network protocol, thereby encapsulating a protocol within another protocol.

You will find this term commonly used in Networking

Tuple

In the context of databases and programming, a tuple is an ordered list of elements. In relational databases, a tuple is essentially a row that contains data for a single record.

You will find this term commonly used in Databases, Software Development

Tuple Space

A repository of tuples (ordered lists of elements) that can be accessed concurrently.

You will find this term commonly used in Parallel Computing

Turing Award

An annual prize given by the Association for Computing Machinery (ACM) to an individual selected for contributions of lasting and major technical importance to the computer field. Often regarded as the "Nobel Prize of Computing."

You will find this term commonly used in General IT, Achievements

Turing Completeness

A characteristic of a system of data-manipulation rules (such as a computer's instruction set, a programming language, or a cellular automaton) that indicates the system can simulate any Turing machine.

You will find this term commonly used in Software Development, Theory

Turing Machine

A mathematical model of computation that defines an abstract machine, which manipulates symbols on a strip of tape according to a table of rules. It is used to understand the limits of what can be computed.

You will find this term commonly used in Computer Science, Theory

Turing Test

A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. Proposed by Alan Turing in 1950 as a measure of a machine's intelligence.

You will find this term commonly used in AI, Machine Learning

Turnkey Solution

A type of solution that is designed to be easily implemented into a current business, system, or process without the need for significant modification or customization.

You will find this term commonly used in General IT, Business Solutions

Turnstile (Concurrency)

A synchronization mechanism used to control access to a resource by multiple threads in computing.

You will find this term commonly used in Software Development

Tux

The name of the Linux kernel mascot, a penguin.

You will find this term commonly used in General IT

TV Tuner Card

A device that allows a computer to receive television signals for viewing TV programs on a computer.

You will find this term commonly used in Hardware

TV White Space

The unused broadcasting frequencies in the wireless spectrum. TV white spaces are unused and underutilized frequencies in the television broadcasting bands that can be used to deliver broadband and other services.

You will find this term commonly used in Networking, Wireless Communications

Twilio

A cloud communications platform as a service (PaaS) company that allows software developers to programmatically make and receive phone calls, send and receive text messages, and perform other communication functions using its web service APIs.

You will find this term commonly used in Cloud Computing, Communications

Twisted Pair

A type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility. Commonly used in telephony and network cabling to reduce crosstalk between pairs.

You will find this term commonly used in Networking

Twisted Pair Cable

A type of wiring where two conductors are twisted together to cancel out electromagnetic interference from external sources, improving reliability. It's widely used in telecommunications and computer networks for Ethernet connections.

You will find this term commonly used in Networking

Twitter Bootstrap

A free and open-source CSS framework directed at responsive, mobile-first front-end web development. It contains CSS- and (optionally) JavaScript-based design templates for typography, forms, buttons, navigation, and other interface components.

You will find this term commonly used in Web Development, Design

Two-Factor Authentication (2FA)

A security process that requires users to provide two different authentication factors (e.g., password and SMS code) to verify their identity.

You will find this term commonly used in Security, Cybersecurity

Two-Phase Commit

A type of atomic commitment protocol that ensures a distributed transaction either commits (completes successfully) on all involved systems or rolls back (fails) on all involved systems, maintaining system integrity.

You will find this term commonly used in Databases, Networking

Two-Phase Commit (2PC)

A distributed algorithm that ensures all parts of a transaction commit if and only if all are ready to commit, ensuring data consistency across a distributed system.

You will find this term commonly used in Databases/Networking

Two-Sided Market

A market platform that enables interactions between two distinct user groups that provide each other with network benefits. This concept is often relevant in e-commerce and online services where buyers and sellers interact.

You will find this term commonly used in E-commerce, Business Strategy

Two-Step Verification

A security process in which users provide two distinct forms of identification before accessing their account. It's a form of multi-factor authentication intended to provide an additional layer of security.

You will find this term commonly used in Cybersecurity

Two-Tier Architecture

A type of client-server system architecture where the client interacts directly with the server, often used in reference to web applications where the client is a web browser and the server hosts the web app.

You will find this term commonly used in Software Development, Web Development

Two-Way Binding

In web development, a form of data binding that allows for mutual data exchange between the UI and the model such that a change in one reflects immediately in the other.

You will find this term commonly used in Web Development

Twofish

A symmetric key block cipher that is a contender for the Advanced Encryption Standard.

You will find this term commonly used in Cybersecurity

Type Checking

The process of verifying and enforcing the constraints of types—data types, at compile time or runtime. This ensures that the operations being performed on data are compatible with the data type.

You will find this term commonly used in Software Development

Type Conversion

The process of converting a value from one data type to another.

You will find this term commonly used in Programming

Type Erasure

A technique used in generic programming to enforce type constraints at compile time but not at runtime.

You will find this term commonly used in Software Development

Type Inference

The ability of a programming language to automatically deduce the type of an expression at compile time. Type inference allows the programmer to omit certain type annotations while the compiler infers the types.

You will find this term commonly used in Software Development

Type Safety

The extent to which a programming language discourages or prevents type errors. Type-safe languages aim to ensure that operations are performed on compatible types, reducing bugs and enhancing code reliability.

You will find this term commonly used in Software Development

Type System

The collection of rules that assign a property called a type to the various constructs of a computer program, such as variables, expressions, functions or modules.

You will find this term commonly used in Programming

TypedArray

An object in JavaScript that provides a mechanism for accessing raw binary data. TypedArrays are used in web applications that require high-performance and efficient data manipulation, such as audio processing, graphics, and large data processing.

You will find this term commonly used in Web Development, Programming

TypeScript

A programming language developed and maintained by Microsoft. It is a strict syntactical superset of JavaScript, and adds optional static typing to the language.

You will find this term commonly used in Software Development

TypeScript Definition

Files in TypeScript (.d.ts files) that contain type information about an existing JavaScript codebase. These definitions allow TypeScript developers to use existing JavaScript libraries as if they were TypeScript libraries.

You will find this term commonly used in Software Development

Typo Squatting

The practice of registering domain names that are misspellings of popular websites in order to redirect traffic or phish for user information. Typo squatting exploits the likelihood of typographical errors made by Internet users.

You will find this term commonly used in Cybersecurity, Web Security

What's Your
Career Path?
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00