IT Glossary - U - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

U2F (Universal 2nd Factor)

An open authentication standard that strengthens and simplifies two-factor authentication using specialized USB or NFC devices.

You will find this term commonly used in Security, Cybersecurity

U2F Protocol

A standard that enables the use of physical security tokens for two-factor authentication, designed to enhance the security of online services.

You will find this term commonly used in Cybersecurity

U2R (User to Root)

An attack type where an attacker starts out with access to a normal user account on the system and is able to exploit vulnerability to gain root access to the system.

You will find this term commonly used in Security, Cybersecurity

UAC (User Account Control)

A technology and security infrastructure introduced with Microsoft's Windows Vista. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges.

You will find this term commonly used in Security, Cybersecurity

UART (Universal Asynchronous Receiver-Transmitter)

A computer hardware device for asynchronous serial communication in which the data format and transmission speeds are configurable.

You will find this term commonly used in Hardware, Networking

UAT (User Acceptance Testing)

The last phase of the software testing process, during which actual software users test the software to make sure it can handle required tasks in real-world scenarios.

You will find this term commonly used in Software Development, Quality Assurance

Ubiquitous Computing

Ubiquitous Computing refers to the concept of integrating computing capabilities into everyday objects and environments, making them smart and interconnected to enhance user experiences and automate tasks.

You will find this term commonly used in Internet of Things (IoT), General IT, Emerging Technologies

Ubiquitous Language

A term used in Domain-Driven Design (DDD) for a body of language used by all team members to connect all the activities of the team with the software.

You will find this term commonly used in Software Development, Design

Ubuntu

A popular distribution of the Linux operating system, known for its ease of use and community support.

You will find this term commonly used in Operating Systems

UDD (User-Driven Development)

A development methodology that focuses on involving the user in the development process to create more user-friendly software.

You will find this term commonly used in Software Development

UDDI (Universal Description, Discovery, and Integration)

A platform-independent, XML-based registry for businesses to list themselves on the Internet and a mechanism to register and locate web service applications.

You will find this term commonly used in Networking, Software Development

UDP (User Datagram Protocol)

A communications protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups.

You will find this term commonly used in Networking

UDP Flood

A type of Denial of Service (DoS) attack in which the attacker sends a large number of UDP packets to a random port on a remote host.

You will find this term commonly used in Security, Cybersecurity

UEFI (Unified Extensible Firmware Interface)

A specification for a software program that connects a computer's firmware to its operating system (OS). It is designed to replace BIOS.

You will find this term commonly used in General IT, Hardware

UI (User Interface)

The means by which the user and a computer system interact, particularly the use of input devices and software.

You will find this term commonly used in General IT, Software Development

UI/UX Designer

Focuses on designing user interfaces and experiences, ensuring software is accessible, user-friendly, and aesthetically pleasing.

You will find this term commonly used in UI/UX Design, Web Development

UL (Upload)

The process of sending data from a local system to a remote system, such as a server or another client, with the intent that the remote system should save a copy of whatever is being transferred.

You will find this term commonly used in Networking, General IT

UMA (Unified Memory Architecture)

A shared memory architecture used by integrated graphics processors (IGPs) and some SOCs where the GPU shares system memory.

You will find this term commonly used in Hardware, Graphics Processing

UML (Unified Modeling Language)

UML is a standardized modeling language used in software engineering for visualizing, specifying, constructing, and documenting software systems and processes. It provides a set of diagrams to represent different aspects of a system.

You will find this term commonly used in Software Development, System Analysis and Design

Unallocated Space

Disk space on a hard drive that is not formatted or assigned to a partition. This space can be used to create new partitions.

You will find this term commonly used in Hardware, Data Management

Unboxing

The process of converting an object from its boxed (object) form into its value (primitive) form in languages that use boxing and unboxing.

You will find this term commonly used in Programming

Underclocking

The process of lowering the clock rate of a computer's CPU or GPU, reducing power consumption and heat generation.

You will find this term commonly used in Hardware, Performance Optimization

Underflow

In computing, an error condition that occurs when a mathematical operation results in a smaller number than a computer can actually represent.

You will find this term commonly used in Software Development

Undervolting

The process of reducing the voltage supplied to a component, primarily a CPU or GPU, to decrease heat output and power consumption without compromising performance significantly.

You will find this term commonly used in Hardware, Performance Optimization

Unicast

The sending of messages to a single network destination identified by a unique address. This is the most common form of message delivery on networks.

You will find this term commonly used in Networking

Unicode

Unicode is a character encoding standard that assigns a unique numeric value to every character and symbol in all the world's writing systems. It enables consistent representation of text across different platforms and languages.

You will find this term commonly used in General IT, Software Development, Internationalization

Unicode Transformation Format (UTF)

A family of character encoding formats for representing text, allowing for the encoding of all possible characters (code points) in Unicode.

You will find this term commonly used in Software Development, Web Development

Unified Communication and Collaboration (UCC)

An industry term for a set of technologies that provides an integrated approach to communication and collaboration, through the merging of telephone, video, messaging, and other interactive systems.

You will find this term commonly used in Networking, Business IT

Unified Communications

Unified communications (UC) refers to the integration of various communication tools and channels, such as voice, video, messaging, and collaboration applications, into a single platform or interface for seamless communication and collaboration.

You will find this term commonly used in Communication, Collaboration, Networking

Unified Communications (UC)

The integration of communication tools that help people exchange ideas and do their jobs more effectively. It can include systems like instant messaging, voice, video conferencing, and data sharing.

You will find this term commonly used in Networking, Business IT

Unified Communications as a Service (UCaaS)

UCaaS is a cloud-based service model that delivers Unified Communications (UC) capabilities, such as voice calling, video conferencing, messaging, and collaboration tools, over the internet on a subscription basis. It offers flexibility, scalability, and cost savings compared to traditional on-premises UC systems.

You will find this term commonly used in Cloud Computing, Collaboration Tools, Networking

Unified Data Analytics Platform

A Unified Data Analytics Platform is a comprehensive solution that integrates various tools and technologies for collecting, storing, processing, analyzing, and visualizing data from different sources and formats. It provides a unified environment for data-driven insights and decision-making.

You will find this term commonly used in Big Data, Data Analytics, Business Intelligence

Unified Endpoint Management (UEM)

Unified Endpoint Management (UEM) is a comprehensive approach to managing and securing all endpoint devices, such as smartphones, tablets, laptops, and IoT devices, from a single centralized platform. It provides centralized control and visibility over devices, applications, and data.

You will find this term commonly used in Security, Device Management, General IT

Unified Endpoint Security

Unified Endpoint Security is an integrated approach to endpoint protection that combines various security technologies, such as antivirus, endpoint detection and response (EDR), and endpoint management, into a single unified platform for comprehensive threat prevention, detection, and remediation.

You will find this term commonly used in Cybersecurity, Security, Endpoint Protection

Unified Modeling Language (UML) Diagram

A standardized visual language for specifying, visualizing, constructing, and documenting the artifacts of software systems, as well as for business modeling and other non-software systems.

You will find this term commonly used in Software Development, Design

Unified Modeling Language (UML) Diagrams

Standardized diagrams for specifying, visualizing, constructing, and documenting the artifacts of software systems, as well as for business modeling and other non-software systems.

You will find this term commonly used in Software Engineering

Unified Network Management (UNM)

Unified Network Management (UNM) is an approach to managing and monitoring network infrastructure, devices, and services from a centralized platform or console. It provides comprehensive visibility, control, and automation of network operations to optimize performance and security.

You will find this term commonly used in Networking, Network Management, General IT

Unified Threat Intelligence

Unified Threat Intelligence refers to the aggregation, analysis, and sharing of threat intelligence data from various sources to provide organizations with a unified view of potential security threats and vulnerabilities. It helps organizations improve threat detection, response, and mitigation efforts.

You will find this term commonly used in Cybersecurity, Threat Intelligence, Security

Unified Threat Management (UTM)

Unified Threat Management (UTM) is a comprehensive security solution that combines multiple security features, such as firewall, intrusion detection, antivirus, and content filtering, into a single integrated platform for simplified management and protection against various threats.

You will find this term commonly used in Cybersecurity, Security, Networking

Uniform Resource Identifier (URI)

A string of characters that unambiguously identifies a particular resource.

You will find this term commonly used in Web Development

Unikernel

A specialized, single-address-space machine image constructed by using library operating systems.

You will find this term commonly used in Software Development, Cloud Computing

Uninterruptible Power Supply (UPS)

An Uninterruptible Power Supply (UPS) is a device that provides emergency power to connected equipment during power outages or fluctuations in electrical supply. It ensures continuity of operation and protects against data loss and hardware damage.

You will find this term commonly used in Hardware, System Administration, General IT

Unit Testing

A software testing method by which individual units of source code, sets of one or more computer program modules together with associated control data, usage procedures, and operating procedures, are tested to determine whether they are fit for use.

You will find this term commonly used in Software Development, Quality Assurance

Universal App

A Universal App, also known as a Cross-Platform App, is a software application that is developed to run on multiple platforms, such as desktops, mobile devices, and web browsers, without the need for separate versions or modifications. It offers consistent functionality and user experience across different devices and operating systems.

You will find this term commonly used in Software Development, Mobile Development, General IT

Universal Asynchronous Receiver/Transmitter (UART)

A piece of computer hardware that translates data between parallel and serial forms. UARTs are used in conjunction with communication standards such as RS-232.

You will find this term commonly used in Hardware, Networking

Universal Plug and Play (UPnP)

A set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points, and mobile devices to seamlessly discover each other's presence on the network and establish functional network services.

You will find this term commonly used in Networking, Security

Universal Serial Bus (USB) Standards

Specifications that define the limits and capabilities of USB technology, including data transfer rates and power supply.

You will find this term commonly used in Hardware, General IT

Universal Serial Bus 3.0 (USB 3.0)

USB 3.0 is an updated version of the USB standard that offers faster data transfer speeds, improved power management, and backward compatibility with older USB devices. It features a new SuperSpeed transfer mode with higher bandwidth for faster performance.

You will find this term commonly used in Hardware, General IT, Peripheral Devices

Unix

A family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix.

You will find this term commonly used in Operating Systems

Unstructured Data

Unstructured Data refers to data that does not have a predefined data model or organization, making it difficult to analyze and process using traditional database techniques. Examples include text documents, images, videos, and social media posts.

You will find this term commonly used in Big Data, Data Analytics, General IT

What's Your
Career Path?
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Training Hours
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Training Hours
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Training Hours
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Training Hours
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Training Hours
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart