IT Glossary - Z - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Z-Order

A programming concept determining the order in which objects are rendered or stacked on a screen.

You will find this term commonly used in General IT, Development

Z-Wave

Z-Wave is a wireless communication protocol primarily used for home automation and IoT devices.

You will find this term commonly used in IoT

Z-Wave Plus

An advanced version of the Z-Wave protocol for smart home devices, offering improved range and battery life.

You will find this term commonly used in Networking, IoT

Z-Wave Plus 2

The latest enhancement of the Z-Wave protocol for smart home devices, focusing on increased efficiency and security.

You will find this term commonly used in IoT, Networking

Zabbix

An open-source monitoring software tool for diverse IT components, including networks, servers, and applications.

You will find this term commonly used in Networking, Security

Zadara Storage

A provider of enterprise storage as a service (STaaS), offering cloud and on-premises data storage solutions.

You will find this term commonly used in Cloud Computing, Storage

ZAPI

Zimbra Application Programming Interface, enabling developers to create custom applications and services that interface with Zimbra Collaboration Suite.

You will find this term commonly used in Development, Email Solutions

Zebra Programming Language (ZPL)

A programming language for Zebra label printers, used to create label designs and control printer settings.

You will find this term commonly used in Development, Hardware

Zend Framework

An open-source, object-oriented web application framework implemented in PHP.

You will find this term commonly used in Development, Web Applications

Zero Day

A zero-day refers to a software vulnerability that is exploited by hackers before the vendor becomes aware of it and releases a patch.

You will find this term commonly used in Cybersecurity

Zero Knowledge Authentication

Zero Knowledge Authentication is a method of authentication where one party (the verifier) can verify the identity of another party (the prover) without the prover revealing any specific information about their identity.

You will find this term commonly used in Security

Zero Knowledge Proof

Zero Knowledge Proof is a cryptographic method where one party (the prover) can prove to another party (the verifier) that a statement is true without revealing any information apart from the fact that the statement is indeed true.

You will find this term commonly used in Cryptography

Zero Trust

Zero Trust is a security model that assumes no trust within the network and requires strict authentication and authorization for every user and device attempting to connect.

You will find this term commonly used in Cybersecurity, Networking

Zero Trust Architecture

Zero Trust Architecture (ZTA) is a security model based on the principle of "never trust, always verify," where access to resources and systems is continuously authenticated and authorized based on multiple factors and risk assessments.

You will find this term commonly used in Cybersecurity, Security Architecture, Network Security

Zero Trust Security

A security model based on the principle of "never trust, always verify," requiring strict identity verification for all users and devices attempting to access resources.

You will find this term commonly used in Cybersecurity

Zero-Configuration Networking

Zero-configuration networking (Zeroconf) is a set of protocols that enables devices to automatically discover and connect to each other on a local network without manual configuration or intervention, facilitating easy setup and connectivity.

You will find this term commonly used in Networking, IoT

Zero-Configuration Networking (Zeroconf)

Zeroconf refers to a set of technologies that automatically configure devices and services on a network without the need for manual configuration or a centralized server.

You will find this term commonly used in Networking

Zero-Configuration VPN

Zero-configuration VPN refers to a type of virtual private network (VPN) that automatically configures and connects without the need for manual intervention by the user.

You will find this term commonly used in Networking, Security

Zero-Coupon

A zero-coupon bond is a type of bond that does not pay periodic interest payments, but instead is issued at a discount to its face value and redeemed at its face value upon maturity.

You will find this term commonly used in Finance

Zero-Day Attack

A zero-day attack is a cyberattack that occurs on the same day a vulnerability is discovered, exploiting the vulnerability before a patch or fix is available from the software vendor.

You will find this term commonly used in Cybersecurity

Zero-Day Exploit

A zero-day exploit is a cyber attack targeting a software vulnerability that is unknown to the software vendor or security community, allowing attackers to exploit the vulnerability before a patch or fix is available.

You will find this term commonly used in Cybersecurity, Vulnerability, Exploitation

Zero-Day Vulnerability

A zero-day vulnerability is a security flaw in software or hardware that is unknown to the vendor or to the public and can be exploited by attackers to compromise systems or steal data.

You will find this term commonly used in Cybersecurity

Zero-Downtime Deployment

Zero-downtime deployment is a software deployment strategy that ensures continuous availability of a system or service during the deployment process, minimizing or eliminating downtime for users.

You will find this term commonly used in System Administration

Zero-Knowledge Authentication

Zero-knowledge authentication is a method of authentication where one party (the verifier) can verify the identity of another party (the prover) without receiving or storing any information about the prover's identity, thus preserving privacy and security.

You will find this term commonly used in Security, Authentication

Zero-Knowledge Protocol

Zero-knowledge protocol is a method in cryptography where one party (the prover) can prove to another party (the verifier) that they have certain information without revealing the information itself, ensuring privacy and security.

You will find this term commonly used in Cryptography

Zero-Touch Deployment

Zero-touch deployment is a method of deploying devices or software applications automatically without any manual intervention, typically used in large-scale IT environments.

You will find this term commonly used in Networking, System Administration

Zero-Trust Architecture

Zero Trust Architecture is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of their location or network.

You will find this term commonly used in Cybersecurity, Networking

Zero-Width Space (ZWSP)

A non-printing character used in computerized text processing to indicate line break opportunities among other things.

You will find this term commonly used in General IT, Text Processing

Zeta Architecture

An architectural concept in big data that combines technologies and methodologies from various big data ecosystems to solve scalability and performance issues.

You will find this term commonly used in Big Data, Architecture

Zettabyte

A zettabyte is a unit of digital information storage equal to 1 sextillion bytes or 10^21 bytes.

You will find this term commonly used in Data Storage

Zettajoule

A zettajoule is a unit of energy equal to one sextillion joules (10^21 joules).

You will find this term commonly used in Energy

ZFS

ZFS, or Zettabyte File System, is a combined file system and logical volume manager designed by Sun Microsystems (now Oracle). It offers features like data integrity verification, RAID-Z, and snapshots.

You will find this term commonly used in Data Storage

ZFS (Zettabyte File System)

A combined file system and logical volume manager designed to provide storage management features such as pooled storage, snapshots, and data integrity verification.

You will find this term commonly used in General IT

Zigbee

Zigbee is a wireless communication standard used for short-range, low-power devices in IoT applications.

You will find this term commonly used in IoT

Zigzag Coding

A technique used in data compression and encryption, organizing data in a zigzag pattern to improve efficiency or security.

You will find this term commonly used in Security, Data Compression

Zimbra

Zimbra is an email and collaboration platform that provides features such as email, calendar, and file sharing, often used by businesses and organizations.

You will find this term commonly used in General IT

Zimlet

A Zimlet is a plugin or extension for the Zimbra email and collaboration platform, allowing users to add custom features, integrations, or functionalities to their Zimbra experience.

You will find this term commonly used in General IT, Collaboration

ZIP (Zone Improvement Plan)

A format used for compressing files and data to reduce file size and facilitate easier transfer.

You will find this term commonly used in General IT

Zip file

A zip file is a compressed archive file format that stores one or more files or directories in a compressed format.

You will find this term commonly used in Data Storage

Zoho CRM

A cloud-based customer relationship management platform for managing sales, marketing, and support in a single system.

You will find this term commonly used in CRM, Cloud Computing

Zombie

In the context of cybersecurity, a zombie refers to a compromised computer or device under the control of a hacker without the user's knowledge, typically used for malicious purposes such as launching DDoS attacks.

You will find this term commonly used in Cybersecurity

Zombie Code

Zombie code refers to sections of code within a software program that are no longer executed but remain in the codebase, often as a result of incomplete cleanup or refactoring.

You will find this term commonly used in Software Development

Zombie Process

In operating systems, a zombie process is a process that has completed execution but still has an entry in the process table, typically waiting for its parent process to retrieve its exit status.

You will find this term commonly used in Operating Systems

Zombie VM

A zombie VM (Virtual Machine) refers to a virtual machine instance that continues to consume resources despite being inactive or unused, often due to administrative oversight or misconfiguration.

You will find this term commonly used in Virtualization

Zonal Isolation

A networking concept in cloud environments that restricts resource visibility and access within specific zones for security and management.

You will find this term commonly used in Cloud Computing, Networking, Security

Zone

In IT, a zone refers to a logical division of a network where certain security policies and settings are applied.

You will find this term commonly used in Networking, Security

Zone File

A file stored on a server that contains mappings between domain names and IP addresses, crucial for DNS functioning.

You will find this term commonly used in Networking, DNS

Zoning

Zoning in IT refers to the process of dividing a storage area network (SAN) into smaller segments or zones to improve security and manageability.

You will find this term commonly used in Networking, Storage

Zoning Map

A zoning map is a graphical representation of the zoning regulations and designations within a geographical area, specifying how land can be used for different purposes such as residential, commercial, or industrial.

You will find this term commonly used in Geographic Information Systems (GIS)

Zoning Policy

Zoning policy refers to the set of rules and configurations that determine how zoning is implemented within a storage area network (SAN), specifying which devices can communicate with each other and restricting access between zones.

You will find this term commonly used in Networking, Security

What's Your
Career Path?
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
172 Hrs 23 Min
icons8-video-camera-58
768 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart