IT Glossary - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

XLink (XML Linking Language)

A language used in XML documents to create hyperlinks between parts of the document or between different documents.

You will find this term commonly used in Web Development, XML Technologies

XML (eXtensible Markup Language)

XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable, commonly used for data interchange between systems or platforms, as well as configuration files.

You will find this term commonly used in Data Interchange, Markup Language, Data Representation

XML Document

A structured text file that conforms to the rules of the XML markup language.

You will find this term commonly used in General IT

XML Encryption

XML Encryption is a standard for encrypting and decrypting XML documents to ensure confidentiality and integrity during transmission and storage. It allows sensitive data within XML documents to be securely protected using cryptographic algorithms and key management techniques.

You will find this term commonly used in Cybersecurity, Data Encryption

XML Namespace

An XML Namespace is a mechanism for uniquely identifying elements and attributes within an XML document to avoid naming conflicts. It allows elements and attributes with the same name to be distinguished based on their namespace URI, providing a means of organizing and categorizing XML content.

You will find this term commonly used in Web Development, Markup Language

XML Parsing

The process of analyzing an XML document to extract relevant information according to the document's structure and syntax rules.

You will find this term commonly used in General IT

XML Schema

XML Schema is a language for defining the structure, content, and data types of XML documents using a schema-based approach. It allows developers to specify constraints and validation rules for ensuring the integrity and consistency of XML data across different systems and applications.

You will find this term commonly used in Web Development, Data Validation

XML Schema Definition (XSD)

A specific way to define the structure, content, and semantics of XML documents.

You will find this term commonly used in General IT

XML Signature

XML Signature is a standard for digitally signing XML documents to verify their authenticity and integrity. It allows senders to attach cryptographic signatures to XML content, providing assurance that the data has not been tampered with or altered during transmission.

You will find this term commonly used in Cybersecurity, Digital Signatures

XML-RPC

A remote procedure call protocol that uses XML to encode its calls and HTTP as a transport mechanism.

You will find this term commonly used in Networking

XML-RPC (Remote Procedure Call)

XML-RPC is a protocol that defines a set of rules for making remote procedure calls between software applications over the internet using XML messages. It allows clients to invoke methods on servers and receive responses in a platform-independent manner.

You will find this term commonly used in Web Development, API Integration

XML-RPC (XML Remote Procedure Call)

A remote procedure call protocol that uses XML to encode its calls and HTTP as a transport mechanism.

You will find this term commonly used in General IT, Networking

XMODEM

XMODEM is a simple file transfer protocol used to transmit data between computers over a serial connection. It provides basic error detection and correction capabilities, making it suitable for transferring files reliably over unreliable communication channels.

You will find this term commonly used in Networking, Data Transmission

XMODEM Protocol

The XMODEM protocol is a simple file transfer protocol used to transmit binary files between computers over a serial connection. It operates in full-duplex mode, sending data packets sequentially and verifying their integrity using checksums or CRCs.

You will find this term commonly used in Networking, Data Transmission

XMPP (eXtensible Messaging and Presence Protocol)

A communication protocol for message-oriented middleware based on XML (Extensible Markup Language).

You will find this term commonly used in Networking, Instant Messaging

XMS (Expanded Memory Specification)

XMS is a standard for accessing extended memory beyond the 640 KB limit imposed by the original IBM PC architecture. It allows DOS-based applications to utilize additional memory provided by expansion cards or memory managers.

You will find this term commonly used in General IT, Legacy Systems

XMS (Extended Memory Specification)

XMS is a standard for accessing extended memory beyond the 640 KB limit imposed by the original IBM PC architecture. It allows DOS-based applications to utilize additional memory provided by expansion cards or memory managers.

You will find this term commonly used in General IT, Legacy Systems

XNA Framework

A set of tools with a managed runtime environment provided by Microsoft that facilitates video game development and management.

You will find this term commonly used in Game Development, Software Frameworks

XNOR Gate

An XNOR gate is a digital logic gate that performs the logical operation of equality comparison. It produces a high output when both inputs are the same (either both high or both low) and a low output when the inputs are different.

You will find this term commonly used in Electrical Engineering, Digital Logic

XNS (Xerox Network Systems)

A protocol suite developed by Xerox for networking among various devices. It played a key role in the development of Ethernet and other networking standards.

You will find this term commonly used in Networking, Protocol Design

XOR Cipher

A simple encryption algorithm that uses the XOR (exclusive or) operation, often used for its simplicity in certain contexts.

You will find this term commonly used in Security, Cryptography

XOR Network

A type of neural network that is specifically designed to solve the XOR problem, demonstrating non-linear classification.

You will find this term commonly used in AI, Machine Learning

XOT (X.25 over TCP)

A protocol for encapsulating X.25 packets over TCP/IP networks, enabling legacy X.25 applications to use modern IP networks.

You will find this term commonly used in Networking, Legacy Systems Integration

XP (Extreme Programming)

A software development methodology which is intended to improve software quality and responsiveness to changing customer requirements.

You will find this term commonly used in Software Development, Agile Methodologies

XPath

XPath is a query language used for navigating and selecting elements or nodes in XML documents, enabling the extraction of specific data or information based on location paths or patterns within the document structure.

You will find this term commonly used in Data Extraction, XML, Query Language

XPath (XML Path Language)

XPath is a query language used to navigate and select nodes in XML documents. It provides a syntax for specifying patterns to match elements and attributes within an XML structure.

You will find this term commonly used in Web Development, Data Analysis

XPe (Windows XP Embedded)

A componentized version of the Microsoft Windows XP operating system designed to allow developers to selectively include or exclude features.

You will find this term commonly used in Operating Systems, Embedded Systems

XPL (eXtensible Programming Language)

A programming language designed for easy data manipulation and transformation, especially useful in XML data processing.

You will find this term commonly used in Software Development, Data Processing

XPointer (XML Pointer Language)

A system for addressing components within XML documents, working alongside XPath to allow more complex document referencing.

You will find this term commonly used in Web Development, XML Technologies

XQuery

XQuery is a programming language designed for querying and extracting data from XML documents. It allows users to manipulate and transform XML data using a declarative syntax similar to SQL.

You will find this term commonly used in Database Management, Data Analysis

XQuery Full-Text

XQuery Full-Text is an extension to the XQuery language that adds support for full-text search capabilities. It allows users to perform complex queries on XML documents based on the content of text nodes, enabling advanced search and retrieval operations.

You will find this term commonly used in Database Management, Data Analysis

XQuery Update Facility

XQuery Update Facility is an extension to the XQuery language that provides mechanisms for modifying and updating XML documents. It allows users to insert, delete, and modify nodes within an XML document using a declarative syntax similar to XQuery.

You will find this term commonly used in Database Management, Data Manipulation

XR (Extended Reality)

A term referring to all real-and-virtual combined environments and human-machine interactions generated by computer technology and wearables, including augmented reality (AR), virtual reality (VR), and mixed reality (MR).

You will find this term commonly used in Virtual/Augmented Reality, User Experience

XRD (eXtensible Resource Descriptor)

A standard way to describe and discover resources on the web and to make these descriptions extensible and reusable.

You will find this term commonly used in Web Development, Resource Discovery

XSalsa20

A variant of the Salsa20 stream cipher with an extended nonce size for better security without sacrificing performance.

You will find this term commonly used in Security, Cryptography

XSD (XML Schema Definition)

XSD is a language for specifying the structure and content of XML documents using a schema-based approach. It allows developers to define data types, elements, and constraints for validating and interpreting XML data according to predefined rules.

You will find this term commonly used in Web Development, Data Validation

XSL (eXtensible Stylesheet Language)

A language for expressing stylesheets that control the presentation of XML documents, used to transform XML data into other formats such as HTML or PDF.

You will find this term commonly used in General IT, Web Development

XSLT (eXtensible Stylesheet Language Transformations)

XSLT is a language for transforming XML documents into other formats, such as HTML, plain text, or XML itself. It enables the separation of content and presentation by applying stylesheets to XML data.

You will find this term commonly used in Web Development, Content Management

XSS (Cross-Site Scripting)

XSS is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. It can be used to steal sensitive information, hijack user sessions, or deface websites.

You will find this term commonly used in Cybersecurity, Web Development, Security

XSS (Cross-Site Scripting) Filter

A security mechanism that detects and prevents cross-site scripting (XSS) attacks by sanitizing input and output data in web applications.

You will find this term commonly used in Cybersecurity, Web Development

XSS Filter

A security feature implemented in web browsers to mitigate the risk of cross-site scripting attacks.

You will find this term commonly used in Cybersecurity

XTS (XEX-based Tweaked-codebook mode with ciphertext Stealing)

A mode of operation for block ciphers designed to provide strong security for disk encryption.

You will find this term commonly used in Security, Data Encryption

XUL (XML User Interface Language)

A markup language for creating rich, graphical user interfaces that are portable across different types of devices and operating systems.

You will find this term commonly used in Software Development, UI Design

XULRunner

A runtime environment developed by Mozilla that allows developers to deploy XUL-based desktop applications.

You will find this term commonly used in Software Development, Application Frameworks

XVideo Extension

An extension of the X Window System that enables video playback in X applications with less CPU usage by offloading processing to the GPU.

You will find this term commonly used in General IT, Multimedia Processing

Y-Cable

A type of cable that splits a signal into two or combines two signals into one.

You will find this term commonly used in Hardware, Connectivity

Y-Combinator

A startup accelerator and venture capital firm based in Silicon Valley.

You will find this term commonly used in Entrepreneurship, Startup Ecosystem

Y-Cruncher

A multi-threaded program capable of computing various mathematical constants.

You will find this term commonly used in Mathematics, Computation

Y-Intercept

In mathematics and data analysis, the y-intercept is the point where the graph of a function intersects the y-axis.

You will find this term commonly used in Mathematics, Data Analysis

Y-Strainer

A type of filter used to remove solid particles from flowing liquids or gases.

You will find this term commonly used in Engineering, Fluid Mechanics

What's Your
Career Path?
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Training Hours
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Training Hours
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Training Hours
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Training Hours
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Training Hours
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Training Hours
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Training Hours
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Training Hours
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart