IT Glossary - V - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Voice Biometrics

A technology that uses unique vocal characteristics to verify a person's identity.

You will find this term commonly used in Security

Voice Command Device

A device that interprets and executes spoken commands.

You will find this term commonly used in AI, User Interface

Voice Encoding

The process of converting analog voice signals into a digital format for transmission over digital networks.

You will find this term commonly used in Networking, Telecommunications

Voice Encryption

The process of encoding voice communication to prevent unauthorized eavesdropping.

You will find this term commonly used in Cybersecurity, Telecommunications

Voice Over

Adding a voice track to multimedia presentations or videos.

You will find this term commonly used in Multimedia, Content Creation

Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) is a technology that enables voice communication and multimedia sessions over the internet, typically using IP-based networks, allowing users to make calls and conduct video conferences over the internet.

You will find this term commonly used in Networking, Communication, Telephony

Voice over IP (VoIP)

A technology that enables voice communication and multimedia sessions over the internet.

You will find this term commonly used in Networking

Voice over LTE (VoLTE)

VoLTE is a technology that enables voice calls to be made over 4G LTE networks, offering higher quality audio and faster call setup compared to traditional circuit-switched voice calls. It utilizes packet-switching for voice data transmission.

You will find this term commonly used in Telecommunications, Networking, General IT

Voice over New Radio (VoNR)

A technology that enables voice services over 5G networks, providing higher quality and more reliable voice calls.

You will find this term commonly used in Telecommunications

Voice over Wi-Fi (VoWiFi)

A technology that enables voice calls to be made over a Wi-Fi network, providing coverage in areas with poor cellular reception.

You will find this term commonly used in Networking

Voice Recognition

Voice Recognition, also known as Speech Recognition, is a technology that enables a computer or device to understand and interpret spoken language, converting it into text or commands. It allows for hands-free control and interaction with devices.

You will find this term commonly used in AI, Natural Language Processing, General IT

Voice Recognition Software

Applications that use algorithms to convert spoken words into text or commands, enabling hands-free interaction with computers or devices.

You will find this term commonly used in AI

Voice User Experience (VUX)

The aspect of user experience design that deals with how users interact with voice-controlled devices and applications.

You will find this term commonly used in User Interface, User Experience

Voice User Interface (VUI)

A technology that allows users to interact with computers, smartphones, or other devices through voice commands or speech recognition.

You will find this term commonly used in AI

Voice-Activated Device

Electronic devices that can be controlled or operated through spoken commands.

You will find this term commonly used in AI

Voice-Enabled Technology

Technology that allows users to interact with devices using voice commands.

You will find this term commonly used in AI, User Interface

Voice-to-Text Conversion

The process of converting spoken words into written text, often used in voice recognition and dictation systems.

You will find this term commonly used in AI, Speech Recognition

Voiceprint

A unique digital representation of an individual's voice characteristics used for authentication or identification purposes.

You will find this term commonly used in Security

VoIP (Voice over Internet Protocol)

VoIP is a technology that allows voice communication and multimedia sessions over the internet, instead of traditional telephone lines. It converts voice signals into digital data packets for transmission over IP networks.

You will find this term commonly used in Networking, Telecommunications, General IT

VoiP (Voice over IP)

A technology that enables voice communication over the internet using the Internet Protocol (IP).

You will find this term commonly used in Networking

VoIP Adapter

A device that converts analog voice signals into digital data that can be transmitted over the internet.

You will find this term commonly used in Networking, Telecommunications

VoIP Gateway

A device or software application that converts voice traffic between the public switched telephone network (PSTN) and IP networks.

You will find this term commonly used in Networking

VoIP Phone

A telephone that uses Voice over Internet Protocol (VoIP) technology to make and receive calls over the internet.

You will find this term commonly used in Networking

VoIP Security

VoIP Security refers to the measures and protocols implemented to protect Voice over Internet Protocol (VoIP) systems and networks from various security threats, such as eavesdropping, tampering, and denial-of-service attacks.

You will find this term commonly used in Security, Cybersecurity, Networking

Volatile Function

In programming, a function whose value can change even if the input does not. This term is often used in the context of spreadsheet applications.

You will find this term commonly used in Software Development

Volatile Memory

Memory that requires power to maintain the stored information; it loses its contents when power is turned off.

You will find this term commonly used in General IT, Hardware

Volatile Storage

Storage that loses its data when power is turned off, such as RAM.

You will find this term commonly used in Hardware, Storage

Volatility (in computing)

Refers to the portion of a computer's memory that is temporary and loses its content when the computer is turned off or restarted.

You will find this term commonly used in Hardware, Operating Systems

VolP (Volume of Pages)

Not a standard IT term; possibly a typo or misunderstanding.

You will find this term commonly used in N/A

VolP Priority

A network management technique that gives higher priority to VoIP traffic to ensure call quality over networks.

You will find this term commonly used in Networking, Telecommunications

Voltage Regulator

A Voltage Regulator is an electronic device or circuit that maintains a constant output voltage level despite changes in input voltage or load conditions. It ensures stable and reliable operation of electronic devices and systems.

You will find this term commonly used in Hardware, Electrical Engineering, General IT

VoLTE (Voice over LTE)

A voice communication standard for delivering voice services over 4G LTE networks.

You will find this term commonly used in Networking

Volume Encryption

The process of encrypting an entire volume or disk drive, as opposed to individual files or folders.

You will find this term commonly used in Cybersecurity

Volume Licensing

The practice of selling software licenses in bulk to a specific organization, often with volume discounts.

You will find this term commonly used in General IT, Business Strategy

Volume Shadow Copy Service

A Windows service that creates backup copies of files or volumes, even while they are in use.

You will find this term commonly used in General IT

Volume Shadow Copy Service (VSS)

A Windows service that creates backup copies of files or volumes, even while they are in use.

You will find this term commonly used in General IT

Volume Testing

A type of software testing where the software is subjected to a huge volume of data to test its performance under different volumes of data.

You will find this term commonly used in Software Development, Testing

Volumetric Attack

A type of DDoS attack where the attacker aims to overwhelm the bandwidth of the targeted site or service.

You will find this term commonly used in Cybersecurity

Volumetric Efficiency

In cloud computing, refers to the efficiency with which data storage can be scaled up to meet demand without wasting resources.

You will find this term commonly used in Cloud Computing

Volunteer Computing

A type of distributed computing where volunteers provide computing resources (such as processing power or storage) to support projects, typically for research or public good.

You will find this term commonly used in Distributed Computing

Voronoi Diagram

A partitioning of a plane into regions based on distance to points in a specific subset of the plane, used in various fields including computer graphics and spatial analysis.

You will find this term commonly used in AI, Computational Geometry

Vortex

In computing, a point of convergence or a powerful flow, often used metaphorically to describe highly dynamic systems or processes.

You will find this term commonly used in General IT

VoWiFi (Voice over WiFi)

A technology that allows users to make voice calls over a Wi-Fi network rather than through a traditional cellular network.

You will find this term commonly used in Telecommunications, Networking

VPC (Virtual Private Cloud)

A cloud computing environment that is logically isolated from other virtual networks in the same cloud provider's infrastructure.

You will find this term commonly used in Cloud Computing

VPN (Virtual Private Network)

A secure network connection that enables users to access a private network over a public network, such as the internet.

You will find this term commonly used in Security, Networking

VPN Client

Software applications or devices used to establish secure VPN connections to remote networks or servers.

You will find this term commonly used in Security

VPN Concentrator

A device used to create and manage VPN connections, typically used in large-scale VPN deployments.

You will find this term commonly used in Security

VPN Server

A server that hosts VPN services and enables secure remote access to a private network over the internet.

You will find this term commonly used in Security

VPN Tunnel

A VPN Tunnel is a secure and encrypted connection established between a user's device and a VPN server, through which all data traffic is routed to ensure privacy and security. It creates a secure pathway within a public network, such as the internet.

You will find this term commonly used in Networking, Security, Cybersecurity

VPNaaS (Virtual Private Network as a Service)

A service model that provides virtual private network functionality to users over the internet as a subscription service.

You will find this term commonly used in Security, Networking

What's Your
Career Path?
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Hrs 38 Min
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Hrs 5 Min
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart