IT Glossary - Z - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Z-Order

A programming concept determining the order in which objects are rendered or stacked on a screen.

You will find this term commonly used in General IT, Development

Z-Wave

Z-Wave is a wireless communication protocol primarily used for home automation and IoT devices.

You will find this term commonly used in IoT

Z-Wave Plus

An advanced version of the Z-Wave protocol for smart home devices, offering improved range and battery life.

You will find this term commonly used in Networking, IoT

Z-Wave Plus 2

The latest enhancement of the Z-Wave protocol for smart home devices, focusing on increased efficiency and security.

You will find this term commonly used in IoT, Networking

Zabbix

An open-source monitoring software tool for diverse IT components, including networks, servers, and applications.

You will find this term commonly used in Networking, Security

Zadara Storage

A provider of enterprise storage as a service (STaaS), offering cloud and on-premises data storage solutions.

You will find this term commonly used in Cloud Computing, Storage

ZAPI

Zimbra Application Programming Interface, enabling developers to create custom applications and services that interface with Zimbra Collaboration Suite.

You will find this term commonly used in Development, Email Solutions

Zebra Programming Language (ZPL)

A programming language for Zebra label printers, used to create label designs and control printer settings.

You will find this term commonly used in Development, Hardware

Zend Framework

An open-source, object-oriented web application framework implemented in PHP.

You will find this term commonly used in Development, Web Applications

Zero Day

A zero-day refers to a software vulnerability that is exploited by hackers before the vendor becomes aware of it and releases a patch.

You will find this term commonly used in Cybersecurity

Zero Knowledge Authentication

Zero Knowledge Authentication is a method of authentication where one party (the verifier) can verify the identity of another party (the prover) without the prover revealing any specific information about their identity.

You will find this term commonly used in Security

Zero Knowledge Proof

Zero Knowledge Proof is a cryptographic method where one party (the prover) can prove to another party (the verifier) that a statement is true without revealing any information apart from the fact that the statement is indeed true.

You will find this term commonly used in Cryptography

Zero Trust

Zero Trust is a security model that assumes no trust within the network and requires strict authentication and authorization for every user and device attempting to connect.

You will find this term commonly used in Cybersecurity, Networking

Zero Trust Architecture

Zero Trust Architecture (ZTA) is a security model based on the principle of "never trust, always verify," where access to resources and systems is continuously authenticated and authorized based on multiple factors and risk assessments.

You will find this term commonly used in Cybersecurity, Security Architecture, Network Security

Zero Trust Security

A security model based on the principle of "never trust, always verify," requiring strict identity verification for all users and devices attempting to access resources.

You will find this term commonly used in Cybersecurity

Zero-Configuration Networking

Zero-configuration networking (Zeroconf) is a set of protocols that enables devices to automatically discover and connect to each other on a local network without manual configuration or intervention, facilitating easy setup and connectivity.

You will find this term commonly used in Networking, IoT

Zero-Configuration Networking (Zeroconf)

Zeroconf refers to a set of technologies that automatically configure devices and services on a network without the need for manual configuration or a centralized server.

You will find this term commonly used in Networking

Zero-Configuration VPN

Zero-configuration VPN refers to a type of virtual private network (VPN) that automatically configures and connects without the need for manual intervention by the user.

You will find this term commonly used in Networking, Security

Zero-Coupon

A zero-coupon bond is a type of bond that does not pay periodic interest payments, but instead is issued at a discount to its face value and redeemed at its face value upon maturity.

You will find this term commonly used in Finance

Zero-Day Attack

A zero-day attack is a cyberattack that occurs on the same day a vulnerability is discovered, exploiting the vulnerability before a patch or fix is available from the software vendor.

You will find this term commonly used in Cybersecurity

Zero-Day Exploit

A zero-day exploit is a cyber attack targeting a software vulnerability that is unknown to the software vendor or security community, allowing attackers to exploit the vulnerability before a patch or fix is available.

You will find this term commonly used in Cybersecurity, Vulnerability, Exploitation

Zero-Day Vulnerability

A zero-day vulnerability is a security flaw in software or hardware that is unknown to the vendor or to the public and can be exploited by attackers to compromise systems or steal data.

You will find this term commonly used in Cybersecurity

Zero-Downtime Deployment

Zero-downtime deployment is a software deployment strategy that ensures continuous availability of a system or service during the deployment process, minimizing or eliminating downtime for users.

You will find this term commonly used in System Administration

Zero-Knowledge Authentication

Zero-knowledge authentication is a method of authentication where one party (the verifier) can verify the identity of another party (the prover) without receiving or storing any information about the prover's identity, thus preserving privacy and security.

You will find this term commonly used in Security, Authentication

Zero-Knowledge Protocol

Zero-knowledge protocol is a method in cryptography where one party (the prover) can prove to another party (the verifier) that they have certain information without revealing the information itself, ensuring privacy and security.

You will find this term commonly used in Cryptography

Zero-Touch Deployment

Zero-touch deployment is a method of deploying devices or software applications automatically without any manual intervention, typically used in large-scale IT environments.

You will find this term commonly used in Networking, System Administration

Zero-Trust Architecture

Zero Trust Architecture is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of their location or network.

You will find this term commonly used in Cybersecurity, Networking

Zero-Width Space (ZWSP)

A non-printing character used in computerized text processing to indicate line break opportunities among other things.

You will find this term commonly used in General IT, Text Processing

Zeta Architecture

An architectural concept in big data that combines technologies and methodologies from various big data ecosystems to solve scalability and performance issues.

You will find this term commonly used in Big Data, Architecture

Zettabyte

A zettabyte is a unit of digital information storage equal to 1 sextillion bytes or 10^21 bytes.

You will find this term commonly used in Data Storage

Zettajoule

A zettajoule is a unit of energy equal to one sextillion joules (10^21 joules).

You will find this term commonly used in Energy

ZFS

ZFS, or Zettabyte File System, is a combined file system and logical volume manager designed by Sun Microsystems (now Oracle). It offers features like data integrity verification, RAID-Z, and snapshots.

You will find this term commonly used in Data Storage

ZFS (Zettabyte File System)

A combined file system and logical volume manager designed to provide storage management features such as pooled storage, snapshots, and data integrity verification.

You will find this term commonly used in General IT

Zigbee

Zigbee is a wireless communication standard used for short-range, low-power devices in IoT applications.

You will find this term commonly used in IoT

Zigzag Coding

A technique used in data compression and encryption, organizing data in a zigzag pattern to improve efficiency or security.

You will find this term commonly used in Security, Data Compression

Zimbra

Zimbra is an email and collaboration platform that provides features such as email, calendar, and file sharing, often used by businesses and organizations.

You will find this term commonly used in General IT

Zimlet

A Zimlet is a plugin or extension for the Zimbra email and collaboration platform, allowing users to add custom features, integrations, or functionalities to their Zimbra experience.

You will find this term commonly used in General IT, Collaboration

ZIP (Zone Improvement Plan)

A format used for compressing files and data to reduce file size and facilitate easier transfer.

You will find this term commonly used in General IT

Zip file

A zip file is a compressed archive file format that stores one or more files or directories in a compressed format.

You will find this term commonly used in Data Storage

Zoho CRM

A cloud-based customer relationship management platform for managing sales, marketing, and support in a single system.

You will find this term commonly used in CRM, Cloud Computing

Zombie

In the context of cybersecurity, a zombie refers to a compromised computer or device under the control of a hacker without the user's knowledge, typically used for malicious purposes such as launching DDoS attacks.

You will find this term commonly used in Cybersecurity

Zombie Code

Zombie code refers to sections of code within a software program that are no longer executed but remain in the codebase, often as a result of incomplete cleanup or refactoring.

You will find this term commonly used in Software Development

Zombie Process

In operating systems, a zombie process is a process that has completed execution but still has an entry in the process table, typically waiting for its parent process to retrieve its exit status.

You will find this term commonly used in Operating Systems

Zombie VM

A zombie VM (Virtual Machine) refers to a virtual machine instance that continues to consume resources despite being inactive or unused, often due to administrative oversight or misconfiguration.

You will find this term commonly used in Virtualization

Zonal Isolation

A networking concept in cloud environments that restricts resource visibility and access within specific zones for security and management.

You will find this term commonly used in Cloud Computing, Networking, Security

Zone

In IT, a zone refers to a logical division of a network where certain security policies and settings are applied.

You will find this term commonly used in Networking, Security

Zone File

A file stored on a server that contains mappings between domain names and IP addresses, crucial for DNS functioning.

You will find this term commonly used in Networking, DNS

Zoning

Zoning in IT refers to the process of dividing a storage area network (SAN) into smaller segments or zones to improve security and manageability.

You will find this term commonly used in Networking, Storage

Zoning Map

A zoning map is a graphical representation of the zoning regulations and designations within a geographical area, specifying how land can be used for different purposes such as residential, commercial, or industrial.

You will find this term commonly used in Geographic Information Systems (GIS)

Zoning Policy

Zoning policy refers to the set of rules and configurations that determine how zoning is implemented within a storage area network (SAN), specifying which devices can communicate with each other and restricting access between zones.

You will find this term commonly used in Networking, Security

What's Your
Career Path?
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Training Hours
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Training Hours
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Training Hours
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Training Hours
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Training Hours
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Training Hours
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart