IT Glossary - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Asymmetric Multiprocessing

A computing architecture where each processor is assigned a specific task or tasks, allowing for more efficient processing by leveraging the strengths of different types of processors within the same system.

You will find this term commonly used in Computer Architecture, Parallel Computing

Asynchronous API

Asynchronous API refers to an API that does not require the calling code to block or wait for a response, but rather, uses callbacks, promises, or other mechanisms to notify when the response is available.

You will find this term commonly used in Web Development, Programming

Asynchronous Circuit

An Asynchronous Circuit is a type of electronic circuit that operates without a global clock, meaning that the operations within the circuit are completed upon the completion of the previous operations and not synchronized by a timing signal.

You will find this term commonly used in Electronics, Computer Engineering

Asynchronous JavaScript

Asynchronous JavaScript refers to the use of the async and await syntax in JavaScript, allowing for asynchronous, non-blocking operations that enable web applications to perform tasks like API calls without freezing the user interface.

You will find this term commonly used in Web Development

Asynchronous Job Processing

The execution of tasks or jobs in a non-blocking manner, allowing a system to initiate a task and then proceed with other tasks before the first task completes, often used to improve application performance and responsiveness.

You will find this term commonly used in Software Engineering, Performance Optimization

Asynchronous Learning

Asynchronous Learning refers to education, training, or learning that does not occur in the same place or at the same time, allowing participants to engage with learning materials at their own pace.

You will find this term commonly used in General IT, Education

Asynchronous Learning Networks

Online learning environments that allow participants to engage with educational content and activities at their own pace, without the need for real-time interaction.

You will find this term commonly used in E-Learning, Education Technology

Asynchronous Messaging

Asynchronous Messaging refers to a communication method where messages are sent between parties without requiring the sender and receiver to be simultaneously active, facilitating decoupled communication processes in distributed systems.

You will find this term commonly used in Networking, Software Development

Asynchronous Replication

A data replication method where changes at the primary site are replicated to the secondary site without waiting for confirmation that each change has been received, suitable for disaster recovery over long distances.

You will find this term commonly used in Data Management, Disaster Recovery

Asynchronous System

A system in which operations are executed without requiring synchronization in time, allowing processes to operate independently and proceed at their own pace.

You will find this term commonly used in Computer Science, Networking

Asynchronous Transfer Mode (ATM)

ATM is a networking technology that organizes digital data into small, fixed-sized packets called cells and transmits them over a physical medium using digital signal technology, designed for high-speed broadband networks.

You will find this term commonly used in Networking, Telecommunicati

Asynchronous Video Interview

A recruiting tool that allows job candidates to record answers to interview questions at their convenience, without the need for real-time interaction with the interviewer, enabling flexible and scalable candidate screening.

You will find this term commonly used in Human Resources Technology, Recruitment

ATA (Advanced Technology Attachment)

ATA is an interface standard for connecting storage devices like hard drives and optical drives to a motherboard, known for its simplicity and reliability in data transfer.

You will find this term commonly used in Hardware, IT Infrastructure

ATM (Asynchronous Transfer Mode)

ATM is a networking technology that uses short, fixed-length packets called cells to transport data across networks, designed for high-performance multimedia networking.

You will find this term commonly used in Networking

Atomicity

In computing, atomicity refers to operations that are completed as a single unit of work, such that they are indivisible. This concept is crucial in database transactions and multi-threaded programming to ensure data integrity.

You will find this term commonly used in Database, Software Engineering

Attack Detection Algorithms

Attack Detection Algorithms are computational techniques used to identify patterns of malicious activity within networks or systems, aiming to promptly detect and mitigate potential security threats.

You will find this term commonly used in Security, Cybersecurity

Attack Pattern Recognition

The use of algorithms and machine learning to detect patterns in data that may indicate a cybersecurity threat or attack.

You will find this term commonly used in Cybersecurity, Data Analysis

Attack Signature

An Attack Signature is a pattern that identifies malicious or harmful behavior, such as a sequence of bytes in network traffic, or a series of commands known to be used by malware. It is used in intrusion detection systems to detect threats.

You will find this term commonly used in Security, Cybersecurity

Attack Surface Analysis

Attack Surface Analysis is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system or network that are accessible to attackers, used to strengthen cybersecurity measures.

You will find this term commonly used in Security, Cybersecurity

Attack Surface Reduction

Strategies and techniques used to minimize the ways an attacker can exploit a system or network, often involving the removal of unnecessary services, restricting access, and segmenting networks.

You will find this term commonly used in Cybersecurity, IT Infrastructure

Attack Vector

An Attack Vector is a method or pathway used by a hacker to access or penetrate the defense of a computer or network system to deliver a payload or malicious outcome.

You will find this term commonly used in Security, Cybersecurity

Attribute-Based Access Control (ABAC)

ABAC is a method of access control that decides access rights based on attributes associated with users, resources, and the environment, allowing for more flexible and fine-grained access control policies compared to role-based access control (RBAC).

You will find this term commonly used in Security, Cybersecurity

Audio Codec

An Audio Codec is a device or software that encodes or decodes audio data from one format to another, facilitating the compression and decompression of digital audio data for storage, transmission, and playback.

You will find this term commonly used in Multimedia, IT Infrastructure

Audio Streaming Technology

Audio Streaming Technology enables the real-time transmission and playback of audio content over the internet, allowing users to listen to music, podcasts, and other audio programs without the need for downloading files beforehand.

You will find this term commonly used in Multimedia, Web Development

Audio-Visual Speech Recognition

A technology that combines audio and visual data processing to improve the accuracy of speech recognition systems, particularly in noisy environments.

You will find this term commonly used in AI, Machine Learning

Augmented Analytics

Augmented Analytics uses machine learning and artificial intelligence to automate data analysis processes, making it easier for end-users to gain insights without deep expertise in data science.

You will find this term commonly used in AI, Data Analysis

Augmented Coding

Augmented Coding uses AI and machine learning to assist developers in writing code, suggesting improvements and automating repetitive tasks, thereby increasing efficiency and reducing errors in the software development process.

You will find this term commonly used in Software Development, AI

Augmented Coding Tools

Software tools that leverage AI and machine learning to assist developers in writing code, suggesting improvements, and automating repetitive tasks, thereby enhancing productivity and reducing the potential for errors.

You will find this term commonly used in Software Development, AI

Augmented Data Discovery

Augmented Data Discovery uses machine learning and natural language processing to enhance data analysis processes, making it easier for end users to discover significant patterns and insights in their data without deep technical expertise.

You will find this term commonly used in AI, Data Analysis

Augmented Data Management

The use of AI and machine learning technologies to enhance data quality, metadata management, and data integration processes in an organization.

You will find this term commonly used in Data Management, AI

Augmented Intelligence

The enhancement of human decision-making through AI technologies, emphasizing the assistive role of AI, rather than replacing human intelligence with artificial intelligence.

You will find this term commonly used in AI, Human-Computer Interaction

Augmented Query Processing

Enhancements in database management systems that use AI and machine learning to optimize query execution, improve performance, and provide insights, by dynamically adapting to changing data patterns and workloads.

You will find this term commonly used in Data Management, AI

Augmented Reality (AR)

AR is a technology that overlays digital information, such as images, videos, or sounds, onto the physical world, enhancing real-world environments and offering interactive experiences.

You will find this term commonly used in AI, General IT

Augmented Virtuality

Augmented Virtuality (AV) is the integration of real-world objects into virtual environments, creating a more immersive experience by blending physical elements with digital simulation, often seen in mixed reality scenarios.

You will find this term commonly used in Virtual Reality, Mixed Reality

Authentication

Authentication is the process of verifying the identity of a user or device, typically involving credentials like passwords, biometric data, or security tokens, crucial for ensuring secure access to systems and data.

You will find this term commonly used in Security, Cybersecurity

Authentication Factor

An Authentication Factor is a piece of information used to verify a user's identity before granting access to a system, which can include something the user knows (password), something the user has (token), or something the user is (biometric verification).

You will find this term commonly used in Security, Cybersecurity

Authentication Mechanism

An Authentication Mechanism is a method or system used to verify the identity of a user, device, or entity in a computer system, often involving passwords, biometric verification, or security tokens.

You will find this term commonly used in Security, Cybersecurity

Authentication Protocol

An Authentication Protocol is a system that defines how devices or systems prove their identity to each other across a network, ensuring secure communication.

You will find this term commonly used in Security, Cybersecurity

Authentication, Authorization, and Accounting (AAA)

A framework for mediating network access, enforcing policies, auditing usage, and providing the information necessary to bill for services, commonly used in telecommunications and computer networking.

You will find this term commonly used in Network Security, IT Infrastructure

Authorization

Authorization is the process of granting or denying rights to use specific resources or execute particular operations within a system, based on authenticated user or service identities.

You will find this term commonly used in Security, Cybersecurity

Autoencoder

An autoencoder is a type of artificial neural network used to learn efficient codings of unlabeled data, typically for the purpose of dimensionality reduction or feature learning.

You will find this term commonly used in AI, Machine Learning

Automated Business Process

The use of technology to perform complex business processes automatically, without human intervention, improving efficiency and accuracy.

You will find this term commonly used in Business Process Management, Automation

Automated Code Review

The use of software tools to automatically review and analyze code for potential errors, security vulnerabilities, or deviations from coding standards and best practices.

You will find this term commonly used in Software Development, QA

Automated Compliance Monitoring

The use of software tools to automatically track and report on compliance with regulations, standards, and policies, helping organizations ensure they meet legal and operational requirements.

You will find this term commonly used in Regulatory Compliance, IT Management

Automated Configuration Management

The use of software tools to automate the setup, deployment, and management of hardware and software configurations across an IT environment, ensuring consistency and compliance with defined standards and policies.

You will find this term commonly used in DevOps, IT Management

Automated Data Capture

The use of technologies such as OCR, barcodes, and RFID to automatically collect data from documents or items, reducing the need for manual entry and increasing data accuracy and efficiency.

You will find this term commonly used in Data Management, Automation

Automated Deployment

Automated Deployment refers to the process of automatically deploying software to a staging or production environment, reducing the need for human intervention and increasing the speed and reliability of software releases.

You will find this term commonly used in DevOps, Software Development

Automated Incident Response

The use of software to automatically detect, investigate, and respond to cybersecurity incidents with minimal human intervention.

You will find this term commonly used in Cybersecurity, IT Management

Automated Logic Verification

The use of automated tools to verify the correctness of logic circuits and designs in the field of electronics and computer engineering, ensuring that they meet specified requirements before fabrication.

You will find this term commonly used in Electronics, Computer Engineering

Automated Penetration Testing

The use of software tools and scripts to automatically identify and exploit vulnerabilities in networks and systems as a means of assessing the security posture of an IT infrastructure.

You will find this term commonly used in Cybersecurity, Testing

What's Your
Career Path?
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Training Hours
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Training Hours
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Training Hours
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Training Hours
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Training Hours
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Training Hours
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Training Hours
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart