IT Glossary - V - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Virtualization Platform

A Virtualization Platform is a software or hardware infrastructure that enables the creation and management of virtual machines and virtualized environments. It provides the necessary resources and tools to implement virtualization solutions.

You will find this term commonly used in Virtualization, Cloud Computing, General IT

Virtualization Security

Measures taken to secure virtualized infrastructure, including virtual machines, hypervisors, and virtual networks.

You will find this term commonly used in Cybersecurity

Virtualization Technology

Hardware and software techniques used to create virtualized environments, including virtual machines, virtual networks, and storage.

You will find this term commonly used in Virtualization

Virtualization-Based Security (VBS)

A security feature that uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system.

You will find this term commonly used in Cybersecurity

Virus

Malicious software that replicates itself and spreads to other computers or devices, often causing damage or disrupting operations.

You will find this term commonly used in Cybersecurity

Virus Scan

The process of examining files and system memory for the presence of computer viruses or malware.

You will find this term commonly used in Cybersecurity

Virus Signature

Unique patterns or characteristics of known viruses used by antivirus software to detect and remove malicious code.

You will find this term commonly used in Cybersecurity

Visibility Graph Analysis

A method used in spatial analysis and urban planning to analyze the visibility and accessibility of different points in a space.

You will find this term commonly used in Data Analysis, Urban Planning

Visibility Testing

In computer graphics, determining which objects, or parts of objects, are not visible from a certain viewpoint.

You will find this term commonly used in Graphic Design, Software Development

Visibility Zone

In cybersecurity, a defined segment of the network monitored for security threats and anomalies.

You will find this term commonly used in Cybersecurity

Visio

A diagramming and vector graphics application part of the Microsoft Office family used to create diagrams.

You will find this term commonly used in General IT, Graphic Design

Visitor Pattern

A software design pattern that allows adding new operations to existing object structures without modifying them.

You will find this term commonly used in Software Development

Visual Analytics

The science of analytical reasoning supported by interactive visual interfaces.

You will find this term commonly used in Data Analysis, Business Intelligence

Visual Basic .NET (VB.NET)

An object-oriented programming language implemented on the .NET Framework, evolved from the classic Visual Basic language.

You will find this term commonly used in Software Development

Visual Content Management

The process of organizing, storing, and retrieving digital visual content such as images and videos.

You will find this term commonly used in Web Development, Content Management

Visual Debugging

The process of using graphical interfaces in development environments to inspect and manipulate the state of applications during debugging.

You will find this term commonly used in Software Development

Visual Programming

A programming paradigm that allows programmers to create software by manipulating program elements graphically rather than by specifying them textually.

You will find this term commonly used in Software Development

Visual Programming Language (VPL)

A programming language that allows users to create programs by manipulating elements graphically rather than by specifying them textually.

You will find this term commonly used in Software Development, Education

Visual Scripting

A programming technique that allows developers to create software by manipulating program elements graphically rather than by writing code textually.

You will find this term commonly used in Software Development

Visual SourceSafe (VSS)

A version control system that allows multiple users to collaborate on a project by managing changes to the project's files.

You will find this term commonly used in Software Development

Visual Studio Code

A free, open-source, and powerful source code editor developed by Microsoft for Windows, Linux, and macOS.

You will find this term commonly used in Software Development

Visual Testing

In software testing, a process that involves examining the graphical user interface to ensure it meets its specifications.

You will find this term commonly used in Software Development, Testing

Viterbi Algorithm

An algorithm for finding the most likely sequence of hidden states that results in a sequence of observed events, especially in the context of Markov information sources and hidden Markov models.

You will find this term commonly used in AI, Machine Learning

Vivado Design Suite

An integrated design environment developed by Xilinx for synthesis and analysis of HDL designs, enabling the development of sophisticated digital circuits.

You will find this term commonly used in Hardware Design, FPGA Development

Vivarium Computing

An emerging field that explores the integration of biological systems with computational processes, aiming to create living computers.

You will find this term commonly used in Emerging Technologies

VividCortex

A database performance monitoring tool designed to provide deep database performance analytics.

You will find this term commonly used in Database Management, Monitoring

VLAN (Virtual Local Area Network)

A network infrastructure segmentation technique that allows multiple virtual networks to coexist on the same physical network.

You will find this term commonly used in Networking

VLAN Hopping

A network attack technique that exploits a VLAN configuration weakness, allowing the attacker to gain access to traffic on other VLANs.

You will find this term commonly used in Security, Networking

VLAN Switching

Technology that allows network administrators to segment a LAN into smaller VLANs for improved traffic management and security.

You will find this term commonly used in Networking

VLAN Tagging

A technique used to identify VLAN membership of frames by adding a VLAN identifier (tag) to Ethernet frames.

You will find this term commonly used in Networking

VLAN Trunking

A technique used to carry traffic for multiple VLANs over a single network link.

You will find this term commonly used in Networking

VLSI (Very Large Scale Integration)

The process of creating an integrated circuit (IC) by combining thousands or millions of transistors onto a single chip.

You will find this term commonly used in General IT

VLSM (Variable Length Subnet Mask)

A subnetting technique that allows for more efficient use of IP address space by using different subnet mask lengths for different subnets within the same network.

You will find this term commonly used in Networking

VLSM (Variable Length Subnet Masking)

A technique in IP address allocation that allows for more efficient use of IP addresses.

You will find this term commonly used in Networking

VM (Virtual Machine)

An emulation of a computer system that runs on top of a physical hardware platform, allowing multiple virtual machines to run on a single physical machine.

You will find this term commonly used in Virtualization

VM Cloning

Creating a copy of a virtual machine that can be used as a template to quickly deploy new VMs.

You will find this term commonly used in Virtualization

VM Resilience

The ability of a virtual machine to withstand and recover from failures or disruptions.

You will find this term commonly used in Virtualization

VMware

Specializes in certifications for VMware virtualization and cloud computing technologies, including professional, advanced professional, and expert levels.

You will find this term commonly used in Virtualization, Cloud Computing

VMware Certified Professional - Data Center Virtualization

Validates the skills required to implement, manage, and troubleshoot a vSphere infrastructure.

You will find this term commonly used in Virtualization

VMware ESXi

An enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers.

You will find this term commonly used in Virtualization

VMware Fusion

Software that enables Mac users to run Windows and other operating systems alongside macOS without rebooting.

You will find this term commonly used in Virtualization

VMware vSphere

A cloud computing virtualization platform that provides a complete infrastructure for virtualizing and managing virtual machines.

You will find this term commonly used in Virtualization

VMware Workstation

A hypervisor that runs on x64 versions of Windows and Linux; it enables users to set up multiple virtual machines (VMs) on a single physical machine.

You will find this term commonly used in Virtualization

VNC (Virtual Network Computing)

A graphical desktop-sharing system that allows users to remotely control and interact with the desktop environment of another computer.

You will find this term commonly used in Networking

Vocabulary Learning

In machine learning and natural language processing, the process of acquiring new words and their meanings to improve understanding and generation of human language.

You will find this term commonly used in AI, Natural Language Processing

Vocaloid

A software voice synthesizer program for music production that allows users to synthesize singing by typing in lyrics and melody.

You will find this term commonly used in Multimedia, Content Creation

VoD (Video on Demand)

A system that allows users to select and watch/listen to video or audio content when they choose to, rather than having to watch at a specific broadcast time.

You will find this term commonly used in Telecommunications, Networking

Voice Activation

Technology that allows devices to be operated through voice commands.

You will find this term commonly used in AI, User Interface

Voice Analysis

The study and interpretation of voice patterns for various applications, including security (voice biometrics) and health diagnostics.

You will find this term commonly used in AI, Security

Voice Assistant

A software agent that uses speech recognition, natural language processing, and artificial intelligence to perform tasks or services for an individual.

You will find this term commonly used in AI

What's Your
Career Path?
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00