IT Glossary - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Baseband Transmission

The transmission of a signal without modulation to a higher frequency, meaning the transmission of raw data as it is, over a dedicated channel. It is commonly used in LAN technologies for short-distance communication.

You will find this term commonly used in Networking, Data Communication

Bash (Bourne Again Shell)

A Unix shell and command language written as a free software replacement for the Bourne shell. Bash has become a de facto standard for shell scripting on most flavors of UNIX, offering powerful programming features to automate tasks and enable system management.

You will find this term commonly used in Software Development, Systems Administration

Batch Processing

A computing process where a group of transactions is collected over a period and processed as a single operation. This method is efficient for large, repetitive data jobs where immediate processing is not critical, commonly used in banking, payroll, and data mining operations.

You will find this term commonly used in General IT, Data Processing

Bayesian Filtering

A technique used for email filtering, spam detection, and other applications involving classification. It makes use of probabilities to predict the category of a piece of information.

You will find this term commonly used in Data Analysis, Cybersecurity

Bayesian Network

A statistical model that represents a set of variables and their conditional dependencies via a directed acyclic graph (DAG). Bayesian networks are used for a variety of purposes, including machine learning, data mining, and prediction.

You will find this term commonly used in AI, Data Analysis

BCP (Business Continuity Planning)

A strategic process that organizations implement to ensure critical business functions can continue during and after a disaster. BCP involves identifying potential threats, determining their impact, and developing policies and procedures to mitigate risks.

You will find this term commonly used in General IT, Security

Beacon

Small wireless devices that transmit signals to nearby portable electronic devices, primarily using Bluetooth technology. Beacons are used in location-based services, such as indoor navigation in malls and airports, to push notifications or advertisements directly to smartphones.

You will find this term commonly used in Networking, IoT

Beacon Frame

A packet sent by a wireless access point (AP) to signal its presence to wireless devices. It contains information about the network, such as its SSID and security settings, helping devices find and connect to the network.

You will find this term commonly used in Networking, Wireless Communication

Beacon Protocol

A network protocol designed for applications that need to broadcast small, critical pieces of information to nearby devices without requiring a paired connection. Beacon protocols are widely used in IoT applications for proximity detection and contextual awareness.

You will find this term commonly used in Networking, IoT

Behavior Specification Language

In software engineering, a language used to define or specify the behaviors of a system in a formal manner. These specifications are crucial for the development, testing, and maintenance of complex systems.

You will find this term commonly used in Software Development, System Design

Behavior-Driven Development (BDD)

A software development approach that encourages collaboration among developers, QA, and non-technical or business participants in a software project. It focuses on obtaining a clear understanding of desired software behavior through discussion with stakeholders.

You will find this term commonly used in Software Development, Agile Methodologies

Behavioral Analysis

A method used in cybersecurity to detect malicious activity by analyzing patterns of behavior rather than relying solely on known signatures. Behavioral analysis can identify anomalies that indicate potential security threats, offering proactive protection against new and evolving attacks.

You will find this term commonly used in Cybersecurity, Data Analysis

Behavioral Analytics

The use of data about people's behavior to understand intent and predict future actions. It's widely used in marketing, cybersecurity, and user experience design.

You will find this term commonly used in Data Analysis, Cybersecurity

Behavioral Biometrics

A field of study that deals with the measurement of patterns in human activities. In cybersecurity, it's used as a form of authentication by analyzing the unique ways in which individuals interact with computer systems and devices.

You will find this term commonly used in Security, Cybersecurity

Behavioral Elicitation Technique

In software engineering and user experience design, techniques used to understand user behavior, preferences, and requirements through observation, interviews, and other methods to inform system design.

You will find this term commonly used in Software Development, UX/UI Design

Benchmark Optimization

The process of improving software or system performance based on the results of benchmark tests, which assess the speed, efficiency, and capability of a system under a series of standardized tasks.

You will find this term commonly used in Performance Optimization, Software Development

Benchmark Testing

The process of running a set of standardized tests on a computer, server, or network to evaluate performance and compare it against reference standards or previous tests.

You will find this term commonly used in Performance Optimization, Testing

Bi-directional Data Sync

The process of synchronizing data in both directions between two or more systems or devices, ensuring consistency and accuracy across different storage locations or platforms.

You will find this term commonly used in Data Management, Software Development

Bi-directional Replication

The process of synchronizing data between two databases in real-time, allowing each database to receive and send updates. This ensures data consistency and availability in distributed database systems.

You will find this term commonly used in Databases, Data Management

Bi-directional Synchronization

The process of keeping data in two or more locations updated through the continuous reciprocal exchange of data. This ensures consistency and accuracy across systems or devices, often used in cloud computing, data backup, and collaborative applications.

You will find this term commonly used in Data Management, Cloud Computing

Bidirectional Charging

Refers to the capability of electric vehicles (EV) and devices to not only draw energy from the grid but also to feed electricity back into the grid. This concept is increasingly relevant in discussions about smart grids and sustainable energy management.

You will find this term commonly used in Emerging Technologies, Sustainability

Big Data

Refers to extremely large datasets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions. Big Data is characterized by its volume, velocity, and variety.

You will find this term commonly used in Data Analysis, General IT

Big Data Visualization

The representation of complex data sets in graphical or visual formats to help users understand, interpret, and derive insights from vast amounts of data. Utilizes tools and technologies designed for big data analytics.

You will find this term commonly used in Data Analysis, Big Data

Binary

A fundamental concept in computing and digital electronics, binary refers to a base-2 numeral system or binary number system, using only two symbols: 0 and 1. It's the core language of computers, representing data and facilitating operations at the most basic level.

You will find this term commonly used in General IT, Software Development

Binary Code

The most basic form of computer code or machine language, consisting of binary numbers (0s and 1s). Computers use binary code to perform various tasks and operations. It is the fundamental representation of data and instructions in computing and digital electronics.

You will find this term commonly used in General IT, Software Development

Binary Compatibility

The ability of software to run on hardware of the same architecture without modification, even if it was compiled with a different compiler or different versions of a compiler. Binary compatibility ensures that applications remain operational across updates and variations in the development environment.

You will find this term commonly used in Software Development, Hardware

Binary Large Object (BLOB)

A collection of binary data stored as a single entity in a database management system. BLOBs are typically used to store large files such as images, audio, and video. Storing BLOBs in databases allows for efficient management and access to multimedia and large data items.

You will find this term commonly used in Data Management, Databases

Binary Large Object (BLOB) Storage

A type of database storage for storing large binary objects such as images, audio files, and video clips. BLOB storage is designed for handling unstructured data efficiently.

You will find this term commonly used in Databases, Data Management

Binary Patching

The process of updating binary files with patches to fix bugs or vulnerabilities without the need for recompiling the source code. It's a quick way to distribute fixes and updates.

You will find this term commonly used in Software Development, Cybersecurity

Binary Release

A distribution of software in a binary format, ready for installation and use without the need for compilation. It's typically specific to a particular platform or operating system.

You will find this term commonly used in Software Development, Deployment

Binary Search

An efficient algorithm for finding an item from a sorted list of items. It works by repeatedly dividing in half the portion of the list that could contain the item, until the possible locations are narrowed down to just one.

You will find this term commonly used in Software Development

Binary Synchronous Communication (Bisync)

A communication protocol developed by IBM to synchronize data transmission over telecommunication networks between two points. It is used for batch file transmission and provides error correction.

You will find this term commonly used in Networking, Data Communication

Binary Translation

The process of translating and executing instructions from one computer architecture to another, enabling software compiled for one CPU architecture to run on another.

You will find this term commonly used in Software Development, Emulation

Bioacoustic Monitoring

The use of technology to capture and analyze sounds within ecosystems to monitor biodiversity and the presence or behavior of species. It's a growing field within environmental science and conservation efforts.

You will find this term commonly used in Emerging Technologies, Environmental IT

Bioinformatics

An interdisciplinary field that develops methods and software tools for understanding biological data. As an intersection of computer science, biology, mathematics, and engineering, bioinformatics focuses on the analysis and interpretation of various types of biological information, such as DNA sequences.

You will find this term commonly used in Data Analysis, Life Sciences

Biometric Authentication

A security process that relies on the unique biological characteristics of an individual to verify their identity. Common methods include fingerprint scanning, facial recognition, and iris scanning. Biometric authentication provides a high level of security for access control and identity verification.

You will find this term commonly used in Security, Cybersecurity

Biometric Authentication Systems

Systems that use unique physiological characteristics, such as fingerprints or iris patterns, to identify and authenticate individuals for access control or security verification.

You will find this term commonly used in Security, Cybersecurity

Biometric Encryption

A process that securely binds a digital key to a biometric or uses a biometric to encrypt data. It ensures that only the matching biometric data can decrypt and retrieve the original information.

You will find this term commonly used in Security, Cybersecurity

Biometric Identification System

A technology-based system that identifies individuals based on unique biological traits, such as fingerprints, facial features, iris patterns, or voice recognition. Widely used in security and access control systems.

You will find this term commonly used in Security, Biometrics

Biometric Verification System

A security system that compares biometric data captured in real-time to stored, confirmed authentic data in a database. It's used for identity verification to grant access or approve transactions.

You will find this term commonly used in Security, Cybersecurity

BIOS (Basic Input/Output System)

BIOS is a firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs. It's a crucial interface that bridges the operating system and the computer's hardware components.

You will find this term commonly used in Hardware, General IT

BIOS Chip

A chip that contains the BIOS (Basic Input/Output System) firmware on a computer motherboard. It initializes computer hardware and starts the bootloader to load the operating system.

You will find this term commonly used in Hardware, General IT

BIOS Password

A security feature found on motherboard BIOS setups that requires a unique password to grant access to the BIOS system settings. This security measure prevents unauthorized users from making changes to the BIOS settings.

You will find this term commonly used in Hardware, Security

BIOS Update

The process of updating the Basic Input/Output System firmware on a computer's motherboard. This is essential for fixing bugs, adding new features, or improving compatibility with hardware and software, ensuring the system's reliability and performance.

You will find this term commonly used in Hardware, General IT

Bit

The smallest unit of data in computing represented by a binary digit (0 or 1). Bits are foundational to digital communication, signifying the binary choices or states in computing and digital electronics.

You will find this term commonly used in General IT, Hardware

Bit Depth

The number of bits used to represent the color of a single pixel in a bitmapped image or video frame buffer, or the number of bits used for each audio sample in a digital audio stream. Higher bit depth allows for a higher number of possible values and finer detail.

You will find this term commonly used in Multimedia, General IT

Bit Error Rate (BER)

The percentage of bits that have errors relative to the total number of bits received in a transmission, a measure of the quality of a communication channel or system.

You will find this term commonly used in Networking, Telecommunications

Bit Field

A set of adjacent computer memory bits that have been allocated to hold a specific type of data. Bit fields are used in programming to compactly store and manipulate sets of parameters, such as device status flags, efficiently within a single integer variable.

You will find this term commonly used in Software Development, Hardware

Bit Manipulation

The act of algorithmically modifying bits or binary digits within a byte or group of bytes. Bit manipulation is a fundamental aspect of low-level programming, enabling efficient data processing, storage, and communication.

You will find this term commonly used in Software Development, Hardware

Bit Rate

The number of bits that are conveyed or processed per unit of time in telecommunications and computing. High bit rates allow for higher quality audio or video files but also require more storage space and bandwidth to transmit.

You will find this term commonly used in Multimedia, Networking

What's Your
Career Path?
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Training Hours
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Training Hours
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Training Hours
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Training Hours
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Training Hours
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart