IT Glossary
Key Terms To Know In The IT Industry
Virtualization Platform
A Virtualization Platform is a software or hardware infrastructure that enables the creation and management of virtual machines and virtualized environments. It provides the necessary resources and tools to implement virtualization solutions.
You will find this term commonly used in Virtualization, Cloud Computing, General IT
Virtualization Security
Measures taken to secure virtualized infrastructure, including virtual machines, hypervisors, and virtual networks.
You will find this term commonly used in Cybersecurity
Virtualization Technology
Hardware and software techniques used to create virtualized environments, including virtual machines, virtual networks, and storage.
You will find this term commonly used in Virtualization
Virtualization-Based Security (VBS)
A security feature that uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system.
You will find this term commonly used in Cybersecurity
Virus
Malicious software that replicates itself and spreads to other computers or devices, often causing damage or disrupting operations.
You will find this term commonly used in Cybersecurity
Virus Scan
The process of examining files and system memory for the presence of computer viruses or malware.
You will find this term commonly used in Cybersecurity
Virus Signature
Unique patterns or characteristics of known viruses used by antivirus software to detect and remove malicious code.
You will find this term commonly used in Cybersecurity
Visibility Graph Analysis
A method used in spatial analysis and urban planning to analyze the visibility and accessibility of different points in a space.
You will find this term commonly used in Data Analysis, Urban Planning
Visibility Testing
In computer graphics, determining which objects, or parts of objects, are not visible from a certain viewpoint.
You will find this term commonly used in Graphic Design, Software Development
Visibility Zone
In cybersecurity, a defined segment of the network monitored for security threats and anomalies.
You will find this term commonly used in Cybersecurity
Visio
A diagramming and vector graphics application part of the Microsoft Office family used to create diagrams.
You will find this term commonly used in General IT, Graphic Design
Visitor Pattern
A software design pattern that allows adding new operations to existing object structures without modifying them.
You will find this term commonly used in Software Development
Visual Analytics
The science of analytical reasoning supported by interactive visual interfaces.
You will find this term commonly used in Data Analysis, Business Intelligence
Visual Basic .NET (VB.NET)
An object-oriented programming language implemented on the .NET Framework, evolved from the classic Visual Basic language.
You will find this term commonly used in Software Development
Visual Content Management
The process of organizing, storing, and retrieving digital visual content such as images and videos.
You will find this term commonly used in Web Development, Content Management
Visual Debugging
The process of using graphical interfaces in development environments to inspect and manipulate the state of applications during debugging.
You will find this term commonly used in Software Development
Visual Programming
A programming paradigm that allows programmers to create software by manipulating program elements graphically rather than by specifying them textually.
You will find this term commonly used in Software Development
Visual Programming Language (VPL)
A programming language that allows users to create programs by manipulating elements graphically rather than by specifying them textually.
You will find this term commonly used in Software Development, Education
Visual Scripting
A programming technique that allows developers to create software by manipulating program elements graphically rather than by writing code textually.
You will find this term commonly used in Software Development
Visual SourceSafe (VSS)
A version control system that allows multiple users to collaborate on a project by managing changes to the project's files.
You will find this term commonly used in Software Development
Visual Studio Code
A free, open-source, and powerful source code editor developed by Microsoft for Windows, Linux, and macOS.
You will find this term commonly used in Software Development
Visual Testing
In software testing, a process that involves examining the graphical user interface to ensure it meets its specifications.
You will find this term commonly used in Software Development, Testing
Viterbi Algorithm
An algorithm for finding the most likely sequence of hidden states that results in a sequence of observed events, especially in the context of Markov information sources and hidden Markov models.
You will find this term commonly used in AI, Machine Learning
Vivado Design Suite
An integrated design environment developed by Xilinx for synthesis and analysis of HDL designs, enabling the development of sophisticated digital circuits.
You will find this term commonly used in Hardware Design, FPGA Development
Vivarium Computing
An emerging field that explores the integration of biological systems with computational processes, aiming to create living computers.
You will find this term commonly used in Emerging Technologies
VividCortex
A database performance monitoring tool designed to provide deep database performance analytics.
You will find this term commonly used in Database Management, Monitoring
VLAN (Virtual Local Area Network)
A network infrastructure segmentation technique that allows multiple virtual networks to coexist on the same physical network.
You will find this term commonly used in Networking
VLAN Hopping
A network attack technique that exploits a VLAN configuration weakness, allowing the attacker to gain access to traffic on other VLANs.
You will find this term commonly used in Security, Networking
VLAN Switching
Technology that allows network administrators to segment a LAN into smaller VLANs for improved traffic management and security.
You will find this term commonly used in Networking
VLAN Tagging
A technique used to identify VLAN membership of frames by adding a VLAN identifier (tag) to Ethernet frames.
You will find this term commonly used in Networking
VLAN Trunking
A technique used to carry traffic for multiple VLANs over a single network link.
You will find this term commonly used in Networking
VLSI (Very Large Scale Integration)
The process of creating an integrated circuit (IC) by combining thousands or millions of transistors onto a single chip.
You will find this term commonly used in General IT
VLSM (Variable Length Subnet Mask)
A subnetting technique that allows for more efficient use of IP address space by using different subnet mask lengths for different subnets within the same network.
You will find this term commonly used in Networking
VLSM (Variable Length Subnet Masking)
A technique in IP address allocation that allows for more efficient use of IP addresses.
You will find this term commonly used in Networking
VM (Virtual Machine)
An emulation of a computer system that runs on top of a physical hardware platform, allowing multiple virtual machines to run on a single physical machine.
You will find this term commonly used in Virtualization
VM Cloning
Creating a copy of a virtual machine that can be used as a template to quickly deploy new VMs.
You will find this term commonly used in Virtualization
VM Resilience
The ability of a virtual machine to withstand and recover from failures or disruptions.
You will find this term commonly used in Virtualization
VMware
Specializes in certifications for VMware virtualization and cloud computing technologies, including professional, advanced professional, and expert levels.
You will find this term commonly used in Virtualization, Cloud Computing
VMware Certified Professional - Data Center Virtualization
Validates the skills required to implement, manage, and troubleshoot a vSphere infrastructure.
You will find this term commonly used in Virtualization
VMware ESXi
An enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers.
You will find this term commonly used in Virtualization
VMware Fusion
Software that enables Mac users to run Windows and other operating systems alongside macOS without rebooting.
You will find this term commonly used in Virtualization
VMware vSphere
A cloud computing virtualization platform that provides a complete infrastructure for virtualizing and managing virtual machines.
You will find this term commonly used in Virtualization
VMware Workstation
A hypervisor that runs on x64 versions of Windows and Linux; it enables users to set up multiple virtual machines (VMs) on a single physical machine.
You will find this term commonly used in Virtualization
VNC (Virtual Network Computing)
A graphical desktop-sharing system that allows users to remotely control and interact with the desktop environment of another computer.
You will find this term commonly used in Networking
Vocabulary Learning
In machine learning and natural language processing, the process of acquiring new words and their meanings to improve understanding and generation of human language.
You will find this term commonly used in AI, Natural Language Processing
Vocaloid
A software voice synthesizer program for music production that allows users to synthesize singing by typing in lyrics and melody.
You will find this term commonly used in Multimedia, Content Creation
VoD (Video on Demand)
A system that allows users to select and watch/listen to video or audio content when they choose to, rather than having to watch at a specific broadcast time.
You will find this term commonly used in Telecommunications, Networking
Voice Activation
Technology that allows devices to be operated through voice commands.
You will find this term commonly used in AI, User Interface
Voice Analysis
The study and interpretation of voice patterns for various applications, including security (voice biometrics) and health diagnostics.
You will find this term commonly used in AI, Security
Voice Assistant
A software agent that uses speech recognition, natural language processing, and artificial intelligence to perform tasks or services for an individual.
You will find this term commonly used in AI
Career Path?
Entry Level Information Security Specialist Career Path
$129.00 $51.60
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Data Analyst Career Path
$129.00 $51.60
Video Editor Career Path
$129.00 $51.60
Certified Ethical Hacker Career Path
$129.00 $51.60
AWS Cloud Practitioner Career Path
$129.00 $51.60
Network Administrator Career Path
$129.00 $51.60
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path
$99.00 $39.00
Pentester Career Path
$129.00 $51.60
Web Designer Career Path
$129.00 $51.60
Cisco Network Engineer Career Path
$129.00 $51.60
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00