IT Glossary - W - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Wireless Markup Language (WML)

A markup language based on XML, designed for creating pages that can be displayed in web browsers on mobile devices.

You will find this term commonly used in Web Development

Wireless Mesh Network

A network structure consisting of interconnected nodes that cooperate to distribute data amongst each other like a mesh.

You will find this term commonly used in Networking

Wireless Network Interface Controller (NIC)

A hardware component that connects a computer to a wireless network.

You will find this term commonly used in Networking/Hardware

Wireless Networking

The use of wireless technology to connect computers and devices to a network.

You will find this term commonly used in Networking

Wireless Presentation System

A system that allows users to share content from their devices to a presentation screen wirelessly, often used in conference rooms and classrooms.

You will find this term commonly used in Networking

Wireless Protocol Analysis

The examination and analysis of wireless protocols to ensure communication is efficient, secure, and compliant with standards.

You will find this term commonly used in Networking

Wireless Security

Measures taken to protect wireless networks and devices from unauthorized access or attacks.

You will find this term commonly used in Cybersecurity

Wireless Sensor Network

A wireless sensor network (WSN) is a network of spatially distributed autonomous sensors that monitor physical or environmental conditions, such as temperature, pressure, or humidity, and communicate wirelessly to collect and analyze data.

You will find this term commonly used in IoT, Environmental Monitoring, Wireless Communication

Wireless Sensor Network (WSN)

A network of interconnected sensors that wirelessly transmit data to a central system for monitoring and analysis.

You will find this term commonly used in Networking

Wireshark

A free and open-source packet analyzer used for network troubleshooting, analysis, software and communications protocol development.

You will find this term commonly used in Networking

Wiring Closet

A small room or cabinet used to house telecommunications equipment, such as switches and patch panels, typically for a local area network.

You will find this term commonly used in Networking

Wizard

A user interface component that guides users through a step-by-step process for completing a task or setting up software.

You will find this term commonly used in General IT

WLAN (Wireless Local Area Network)

A wireless network that connects devices within a limited geographical area, such as a home or office.

You will find this term commonly used in Networking

Word Embedding

A technique in natural language processing where words or phrases are mapped to vectors of real numbers, used in deep learning models.

You will find this term commonly used in AI

Word Processing

The creation, editing, formatting, and printing of text documents using specialized software.

You will find this term commonly used in General IT

Workflow Automation

Workflow automation is the use of technology to automate repetitive tasks, processes, or workflows, reducing manual intervention, streamlining operations, and improving efficiency, accuracy, and consistency of business processes.

You will find this term commonly used in Automation, Business Processes, Software Development

Workflow Engine

Software that manages and executes modeled computer processes. It is a key component in workflow technology and can automate sequences of tasks for process enhancement.

You will find this term commonly used in Workflow Management

Workflow Management

The automation of business processes, ensuring tasks are completed efficiently and in the correct order.

You will find this term commonly used in General IT, Automation

Workflow Optimization

The process of identifying and implementing the most efficient sequence of actions to complete tasks and processes.

You will find this term commonly used in Business Process Management

Workflow Software

Software that automates the flow of tasks in a business process. It is typically used to manage, coordinate, and automate repetitive tasks.

You will find this term commonly used in Business/Management

Workgroup

A collection of computers on a local area network (LAN) that share resources and responsibilities without centralized management.

You will find this term commonly used in Networking

Workspace Virtualization

Technology that allows users to access their desktops, applications, and data from any device, providing a consistent work environment regardless of location.

You will find this term commonly used in Virtualization

Workstation

A high-performance computer used for professional or technical applications, such as graphic design or engineering.

You will find this term commonly used in General IT

World Wide Web (WWW)

An information system on the internet that allows documents to be connected to other documents by hypertext links.

You will find this term commonly used in General IT

World Wide Web Consortium (W3C)

An international community that develops open standards to ensure the long-term growth of the Web.

You will find this term commonly used in Web Standards

Worldwide Interoperability for Microwave Access (WiMAX)

A technology that provides wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access.

You will find this term commonly used in Networking

WORM (Write Once, Read Many)

A type of data storage device that allows information to be written to it once and then read multiple times, preventing subsequent modification.

You will find this term commonly used in Data Storage

WPA (Wi-Fi Protected Access)

A security protocol designed to secure wireless computer networks.

You will find this term commonly used in Cybersecurity

WPA2 (Wi-Fi Protected Access 2)

A security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

You will find this term commonly used in Wireless Security

WPA2-Enterprise

A version of WPA2 used in business and enterprise environments, offering higher security through individual user authentication via RADIUS server.

You will find this term commonly used in Wireless Security

WPA2-Personal

A version of WPA2 designed for home and small office networks, providing good security without the complexity of RADIUS authentication.

You will find this term commonly used in Wireless Security

WPA3 (Wi-Fi Protected Access 3)

The third iteration of the Wi-Fi Protected Access security protocol, providing enhanced security features for wireless networks.

You will find this term commonly used in Security, Networking

Wrapper Class

In programming, a class whose instances are collections of other objects. It allows the grouping of objects as a single unit.

You will find this term commonly used in General IT

Wrapper Function

A function whose main purpose is to call a second function, often used to simplify complex function calls or to adapt them to a specific interface.

You will find this term commonly used in General IT/Programming

Write Amplification

A phenomenon in flash memory and solid-state drives where the actual amount of physical information written is a multiple of the logical amount intended to be written.

You will find this term commonly used in General IT

Write Coalescing

A technique used in computer storage to improve performance by combining multiple write commands into a single larger command before writing to the disk.

You will find this term commonly used in General IT

Write Protection

A physical or software mechanism that prevents modification or deletion of data on a device or medium.

You will find this term commonly used in Cybersecurity

Write-Ahead Logging (WAL)

A method used in databases to ensure data integrity by recording changes to data before it is actually made to the database.

You will find this term commonly used in Databases

Write-Back Cache

A caching technique in which data is written to cache alone and not immediately to the backing storage, improving performance.

You will find this term commonly used in General IT/Networking

Write-Once Memory

A type of non-volatile memory that can be written once and then read many times, used for secure data storage.

You will find this term commonly used in General IT

Write-Once, Run Anywhere (WORA)

A principle of software development that enables code to run on any platform without needing to be rewritten.

You will find this term commonly used in Software Development

Write-Protect

A mechanism that prevents the modification or deletion of data on a device or in a file.

You will find this term commonly used in Data Security

Write-Through Cache

A caching method where operations write data to both the cache and the backing storage, ensuring data consistency.

You will find this term commonly used in General IT/Networking

WYSIWYG

An acronym for "What You See Is What You Get," referring to software that allows content to be edited in a form resembling its appearance when printed or displayed as a finished product.

You will find this term commonly used in General IT, User Interface

WYSIWYG (What You See Is What You Get)

A user interface that allows users to view a document or webpage exactly as it will appear when printed or displayed.

You will find this term commonly used in General IT

WYSIWYG Editor

A system in which content (text and graphics) can be edited in a form closely resembling its appearance when printed or displayed as a finished product, such as in word processors or web content management systems.

You will find this term commonly used in General IT

What's Your
Career Path?
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart