IT Glossary
Key Terms To Know In The IT Industry
Wireless Markup Language (WML)
A markup language based on XML, designed for creating pages that can be displayed in web browsers on mobile devices.
You will find this term commonly used in Web Development
Wireless Mesh Network
A network structure consisting of interconnected nodes that cooperate to distribute data amongst each other like a mesh.
You will find this term commonly used in Networking
Wireless Network Interface Controller (NIC)
A hardware component that connects a computer to a wireless network.
You will find this term commonly used in Networking/Hardware
Wireless Networking
The use of wireless technology to connect computers and devices to a network.
You will find this term commonly used in Networking
Wireless Presentation System
A system that allows users to share content from their devices to a presentation screen wirelessly, often used in conference rooms and classrooms.
You will find this term commonly used in Networking
Wireless Protocol Analysis
The examination and analysis of wireless protocols to ensure communication is efficient, secure, and compliant with standards.
You will find this term commonly used in Networking
Wireless Security
Measures taken to protect wireless networks and devices from unauthorized access or attacks.
You will find this term commonly used in Cybersecurity
Wireless Sensor Network
A wireless sensor network (WSN) is a network of spatially distributed autonomous sensors that monitor physical or environmental conditions, such as temperature, pressure, or humidity, and communicate wirelessly to collect and analyze data.
You will find this term commonly used in IoT, Environmental Monitoring, Wireless Communication
Wireless Sensor Network (WSN)
A network of interconnected sensors that wirelessly transmit data to a central system for monitoring and analysis.
You will find this term commonly used in Networking
Wireshark
A free and open-source packet analyzer used for network troubleshooting, analysis, software and communications protocol development.
You will find this term commonly used in Networking
Wiring Closet
A small room or cabinet used to house telecommunications equipment, such as switches and patch panels, typically for a local area network.
You will find this term commonly used in Networking
Wizard
A user interface component that guides users through a step-by-step process for completing a task or setting up software.
You will find this term commonly used in General IT
WLAN (Wireless Local Area Network)
A wireless network that connects devices within a limited geographical area, such as a home or office.
You will find this term commonly used in Networking
Word Embedding
A technique in natural language processing where words or phrases are mapped to vectors of real numbers, used in deep learning models.
You will find this term commonly used in AI
Word Processing
The creation, editing, formatting, and printing of text documents using specialized software.
You will find this term commonly used in General IT
Workflow Automation
Workflow automation is the use of technology to automate repetitive tasks, processes, or workflows, reducing manual intervention, streamlining operations, and improving efficiency, accuracy, and consistency of business processes.
You will find this term commonly used in Automation, Business Processes, Software Development
Workflow Engine
Software that manages and executes modeled computer processes. It is a key component in workflow technology and can automate sequences of tasks for process enhancement.
You will find this term commonly used in Workflow Management
Workflow Management
The automation of business processes, ensuring tasks are completed efficiently and in the correct order.
You will find this term commonly used in General IT, Automation
Workflow Optimization
The process of identifying and implementing the most efficient sequence of actions to complete tasks and processes.
You will find this term commonly used in Business Process Management
Workflow Software
Software that automates the flow of tasks in a business process. It is typically used to manage, coordinate, and automate repetitive tasks.
You will find this term commonly used in Business/Management
Workgroup
A collection of computers on a local area network (LAN) that share resources and responsibilities without centralized management.
You will find this term commonly used in Networking
Workspace Virtualization
Technology that allows users to access their desktops, applications, and data from any device, providing a consistent work environment regardless of location.
You will find this term commonly used in Virtualization
Workstation
A high-performance computer used for professional or technical applications, such as graphic design or engineering.
You will find this term commonly used in General IT
World Wide Web (WWW)
An information system on the internet that allows documents to be connected to other documents by hypertext links.
You will find this term commonly used in General IT
World Wide Web Consortium (W3C)
An international community that develops open standards to ensure the long-term growth of the Web.
You will find this term commonly used in Web Standards
Worldwide Interoperability for Microwave Access (WiMAX)
A technology that provides wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access.
You will find this term commonly used in Networking
WORM (Write Once, Read Many)
A type of data storage device that allows information to be written to it once and then read multiple times, preventing subsequent modification.
You will find this term commonly used in Data Storage
WPA (Wi-Fi Protected Access)
A security protocol designed to secure wireless computer networks.
You will find this term commonly used in Cybersecurity
WPA2 (Wi-Fi Protected Access 2)
A security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.
You will find this term commonly used in Wireless Security
WPA2-Enterprise
A version of WPA2 used in business and enterprise environments, offering higher security through individual user authentication via RADIUS server.
You will find this term commonly used in Wireless Security
WPA2-Personal
A version of WPA2 designed for home and small office networks, providing good security without the complexity of RADIUS authentication.
You will find this term commonly used in Wireless Security
WPA3 (Wi-Fi Protected Access 3)
The third iteration of the Wi-Fi Protected Access security protocol, providing enhanced security features for wireless networks.
You will find this term commonly used in Security, Networking
Wrapper Class
In programming, a class whose instances are collections of other objects. It allows the grouping of objects as a single unit.
You will find this term commonly used in General IT
Wrapper Function
A function whose main purpose is to call a second function, often used to simplify complex function calls or to adapt them to a specific interface.
You will find this term commonly used in General IT/Programming
Write Amplification
A phenomenon in flash memory and solid-state drives where the actual amount of physical information written is a multiple of the logical amount intended to be written.
You will find this term commonly used in General IT
Write Coalescing
A technique used in computer storage to improve performance by combining multiple write commands into a single larger command before writing to the disk.
You will find this term commonly used in General IT
Write Protection
A physical or software mechanism that prevents modification or deletion of data on a device or medium.
You will find this term commonly used in Cybersecurity
Write-Ahead Logging (WAL)
A method used in databases to ensure data integrity by recording changes to data before it is actually made to the database.
You will find this term commonly used in Databases
Write-Back Cache
A caching technique in which data is written to cache alone and not immediately to the backing storage, improving performance.
You will find this term commonly used in General IT/Networking
Write-Once Memory
A type of non-volatile memory that can be written once and then read many times, used for secure data storage.
You will find this term commonly used in General IT
Write-Once, Run Anywhere (WORA)
A principle of software development that enables code to run on any platform without needing to be rewritten.
You will find this term commonly used in Software Development
Write-Protect
A mechanism that prevents the modification or deletion of data on a device or in a file.
You will find this term commonly used in Data Security
Write-Through Cache
A caching method where operations write data to both the cache and the backing storage, ensuring data consistency.
You will find this term commonly used in General IT/Networking
WYSIWYG
An acronym for "What You See Is What You Get," referring to software that allows content to be edited in a form resembling its appearance when printed or displayed as a finished product.
You will find this term commonly used in General IT, User Interface
WYSIWYG (What You See Is What You Get)
A user interface that allows users to view a document or webpage exactly as it will appear when printed or displayed.
You will find this term commonly used in General IT
WYSIWYG Editor
A system in which content (text and graphics) can be edited in a form closely resembling its appearance when printed or displayed as a finished product, such as in word processors or web content management systems.
You will find this term commonly used in General IT
Career Path?
Comprehensive IT User Support Specialist Training: Accelerate Your Career
$51.60 – $169.00
Pentester Career Path
$129.00 $51.60
Data Analyst Career Path
$129.00 $51.60
AZ-104 Learning Path : Become an Azure Administrator
$51.60 – $169.00
Entry Level Information Security Specialist Career Path
$129.00 $51.60
AWS Cloud Practitioner Career Path
$129.00 $51.60
Certified Ethical Hacker Career Path
$129.00 $51.60
Network Administrator Career Path
$129.00 $51.60
Google DevOps Engineer Career Path
$129.00 $51.60
Leadership Mastery: The Executive Information Security Manager
$129.00 $51.60
Network Security Analyst Career Path
$129.00 $51.60
IT Project Manager Career Path
$129.00 $51.60