IT Glossary - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Windows Domain

A form of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database located on one or more clusters of central computers known as domain controllers.

You will find this term commonly used in Networking

Windows Integrated Authentication

A term used to refer to several authentication protocols used by Microsoft Windows systems, allowing users to log in with a single set of credentials.

You will find this term commonly used in Security

Windows Management Instrumentation (WMI)

A set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification.

You will find this term commonly used in General IT

Windows PowerShell

A command-line shell and scripting language designed for system administration and automation.

You will find this term commonly used in General IT

Windows Registry

A database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry.

You will find this term commonly used in General IT

Windows Server

A series of Microsoft server operating systems designed to handle corporate networking, Internet hosting, databases, messaging, and other services.

You will find this term commonly used in General IT

Windows Virtual Desktop

A comprehensive desktop and app virtualization service running in the cloud, allowing secure remote work.

You will find this term commonly used in Virtualization

Wire Protocol

A standard method used in telecommunications networks to facilitate the wireless transmission of data.

You will find this term commonly used in Networking

Wired Equivalent Privacy (WEP)

An outdated security protocol for Wi-Fi networks, now considered insecure and replaced by WPA and WPA2.

You will find this term commonly used in Wireless Security

Wired Network

A network in which devices are connected to the Internet or each other using cables.

You will find this term commonly used in Networking

Wired Security

Security measures specific to wired networks, focusing on preventing unauthorized access and ensuring data integrity and confidentiality.

You will find this term commonly used in Networking Security

Wireframe

A visual guide that represents the skeletal framework of a website or application, used in planning a site's structure and functionality.

You will find this term commonly used in Web Design

Wireframe Modeling

A technique used in 3D modeling to create a visual representation of a three-dimensional object using only lines and vertices.

You will find this term commonly used in Web Design/3D Modeling

Wireless Access Point

A device that allows wireless devices to connect to a wired network using Wi-Fi.

You will find this term commonly used in Networking

Wireless Broadband

High-speed internet and data service delivered through a wireless connection over a wide area.

You will find this term commonly used in Networking

Wireless Charging

The process of charging a device's battery without a physical wired connection, using electromagnetic fields to transfer power.

You will find this term commonly used in General IT

Wireless Communication

Communication between devices using wireless signals instead of physical cables.

You will find this term commonly used in Networking

Wireless Display (WiDi)

A technology that allows a portable device or computer to send the display signal to a television or monitor wirelessly.

You will find this term commonly used in Networking

Wireless Fidelity (Wi-Fi)

A family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access.

You will find this term commonly used in Networking

Wireless LAN (WLAN)

A type of local area network that uses wireless communication to connect devices within a limited area.

You will find this term commonly used in Networking

Wireless Markup Language (WML)

A markup language based on XML, designed for creating pages that can be displayed in web browsers on mobile devices.

You will find this term commonly used in Web Development

Wireless Mesh Network

A network structure consisting of interconnected nodes that cooperate to distribute data amongst each other like a mesh.

You will find this term commonly used in Networking

Wireless Network Interface Controller (NIC)

A hardware component that connects a computer to a wireless network.

You will find this term commonly used in Networking/Hardware

Wireless Networking

The use of wireless technology to connect computers and devices to a network.

You will find this term commonly used in Networking

Wireless Presentation System

A system that allows users to share content from their devices to a presentation screen wirelessly, often used in conference rooms and classrooms.

You will find this term commonly used in Networking

Wireless Protocol Analysis

The examination and analysis of wireless protocols to ensure communication is efficient, secure, and compliant with standards.

You will find this term commonly used in Networking

Wireless Security

Measures taken to protect wireless networks and devices from unauthorized access or attacks.

You will find this term commonly used in Cybersecurity

Wireless Sensor Network

A wireless sensor network (WSN) is a network of spatially distributed autonomous sensors that monitor physical or environmental conditions, such as temperature, pressure, or humidity, and communicate wirelessly to collect and analyze data.

You will find this term commonly used in IoT, Environmental Monitoring, Wireless Communication

Wireless Sensor Network (WSN)

A network of interconnected sensors that wirelessly transmit data to a central system for monitoring and analysis.

You will find this term commonly used in Networking

Wireshark

A free and open-source packet analyzer used for network troubleshooting, analysis, software and communications protocol development.

You will find this term commonly used in Networking

Wiring Closet

A small room or cabinet used to house telecommunications equipment, such as switches and patch panels, typically for a local area network.

You will find this term commonly used in Networking

Wizard

A user interface component that guides users through a step-by-step process for completing a task or setting up software.

You will find this term commonly used in General IT

WLAN (Wireless Local Area Network)

A wireless network that connects devices within a limited geographical area, such as a home or office.

You will find this term commonly used in Networking

Word Embedding

A technique in natural language processing where words or phrases are mapped to vectors of real numbers, used in deep learning models.

You will find this term commonly used in AI

Word Processing

The creation, editing, formatting, and printing of text documents using specialized software.

You will find this term commonly used in General IT

Workflow Automation

Workflow automation is the use of technology to automate repetitive tasks, processes, or workflows, reducing manual intervention, streamlining operations, and improving efficiency, accuracy, and consistency of business processes.

You will find this term commonly used in Automation, Business Processes, Software Development

Workflow Engine

Software that manages and executes modeled computer processes. It is a key component in workflow technology and can automate sequences of tasks for process enhancement.

You will find this term commonly used in Workflow Management

Workflow Management

The automation of business processes, ensuring tasks are completed efficiently and in the correct order.

You will find this term commonly used in General IT, Automation

Workflow Optimization

The process of identifying and implementing the most efficient sequence of actions to complete tasks and processes.

You will find this term commonly used in Business Process Management

Workflow Software

Software that automates the flow of tasks in a business process. It is typically used to manage, coordinate, and automate repetitive tasks.

You will find this term commonly used in Business/Management

Workgroup

A collection of computers on a local area network (LAN) that share resources and responsibilities without centralized management.

You will find this term commonly used in Networking

Workspace Virtualization

Technology that allows users to access their desktops, applications, and data from any device, providing a consistent work environment regardless of location.

You will find this term commonly used in Virtualization

Workstation

A high-performance computer used for professional or technical applications, such as graphic design or engineering.

You will find this term commonly used in General IT

World Wide Web (WWW)

An information system on the internet that allows documents to be connected to other documents by hypertext links.

You will find this term commonly used in General IT

World Wide Web Consortium (W3C)

An international community that develops open standards to ensure the long-term growth of the Web.

You will find this term commonly used in Web Standards

Worldwide Interoperability for Microwave Access (WiMAX)

A technology that provides wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access.

You will find this term commonly used in Networking

WORM (Write Once, Read Many)

A type of data storage device that allows information to be written to it once and then read multiple times, preventing subsequent modification.

You will find this term commonly used in Data Storage

WPA (Wi-Fi Protected Access)

A security protocol designed to secure wireless computer networks.

You will find this term commonly used in Cybersecurity

WPA2 (Wi-Fi Protected Access 2)

A security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

You will find this term commonly used in Wireless Security

WPA2-Enterprise

A version of WPA2 used in business and enterprise environments, offering higher security through individual user authentication via RADIUS server.

You will find this term commonly used in Wireless Security

What's Your
Career Path?
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Training Hours
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Training Hours
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Training Hours
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Training Hours
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Training Hours
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Training Hours
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart