IT Glossary - ITU Online IT Training
Ready to start learning?Individual Plans →Team Plans →

IT Glossary

Showing terms starting with R (183 terms)

Red Hat Certified Engineer (RHCE)

An advanced level certification that validates the skills, knowledge, and abilities required to be a senior system administrator responsible for Red Hat Enterprise Linux systems.

Commonly used in System Administration, Linux

Red Hat Enterprise Linux (RHEL)

An open source, enterprise-level Linux operating system developed by Red Hat.

Commonly used in General IT, Operating Systems

Red Team

In cybersecurity, a group that plays the role of an adversary to test or evaluate the security of a system.

Commonly used in Security, Cybersecurity

Red Team Exercises

Simulated cyber attacks against an organization’s security posture to test its defenses.

Commonly used in Security, Cybersecurity

Red-Black Tree

A type of self-balancing binary search tree, used in computer science to implement associative arrays, and multi-dimensional indexes.

Commonly used in Algorithms, Data Structures

Redaction

The process of editing text for publication or removing sensitive information from a document before publication.

Commonly used in Security, Data Privacy

Redundancy

The duplication of critical components or functions of a system with the intention of increasing reliability of the system.

Commonly used in General IT, Networking

Redundant Power Supply

A power supply system designed to ensure that a system continues to operate in the event of one power supply failing.

Commonly used in Hardware, Reliability

Redux

An open-source JavaScript library for managing application state, commonly used with React for building user interfaces.

Commonly used in Software Development, Web Development

Redux Toolkit

A toolset for efficient Redux development, providing simplified APIs and utilities to reduce boilerplate code in projects using Redux.

Commonly used in Software Development, Web Development

Refactoring

The process of restructuring existing computer code without changing its external behavior, intended to improve nonfunctional attributes of the software.

Commonly used in Software Development, Quality Assurance

Reference Architecture

An authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions.

Commonly used in Software Development, System Architecture

Reference Data

Data used to categorize or classify other data within a system or application.

Commonly used in Data Management, Databases

Reflected XSS (Cross-Site Scripting)

A type of XSS attack where the malicious script is reflected off a web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request.

Commonly used in Security, Web Development

Reflection

In computer science, the ability of a program to examine and modify its own structure and behavior at runtime.

Commonly used in Software Development

Reflection API

An API that allows a program to perform operations on itself, such as inspecting classes and invoking methods at runtime.

Commonly used in Software Development

Refresh Rate

The number of times in a second that a display hardware updates its buffer. A higher refresh rate results in a smoother picture.

Commonly used in Hardware, Display Technology

Registry

In computing, a hierarchical database that stores low-level settings for the operating system and for applications that opt to use the registry.

Commonly used in General IT, Operating Systems

Registry Editor

A graphical tool in Windows that allows authorized users to view and edit the registry.

Commonly used in Operating Systems, Windows

Regression Analysis

A statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables, when the focus is on the relationship between a dependent variable and one or more independent variables.

Commonly used in Data Analysis, Machine Learning

Regression Testing

Regression testing is a software testing technique that verifies whether recent code changes have affected the existing functionality of an application, ensuring that previously developed and tested features still perform as intended.

Commonly used in Software Development, Testing

Regular Expression (Regex)

A sequence of characters that define a search pattern, mainly for use in pattern matching with strings.

Commonly used in Software Development, Data Processing

Regulatory Compliance

Adhering to laws, regulations, guidelines, and specifications relevant to business processes.

Commonly used in General IT, Compliance

Relational Algebra

A procedural query language, which takes instances of relations as input and yields instances of relations as output. It uses operators to perform queries.

Commonly used in Database

Relational Database

A database structured to recognize relations among stored items of information according to a relational model of data.

Commonly used in Database, Data Management

Relational Model

A database model based on first-order predicate logic, establishing a relationship among stored items of information.

Commonly used in Database, Data Modeling

Release Management

The process of managing, planning, scheduling, and controlling a software build through different stages and environments; including testing and deploying software releases.

Commonly used in Software Development, Project Management

Release Pipeline

The process and stages a code change goes through from development to deployment.

Commonly used in Software Development, DevOps

Reliability

The probability that a system will perform its intended function without failure under stated conditions for a specified period of time.

Commonly used in General IT, Quality Assurance

Remote Access

The ability to connect to and use a computer or network from a remote location, typically over the internet.

Commonly used in General IT

Remote Authentication Dial-In User Service (RADIUS)

A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.

Commonly used in Networking, Security

Remote Code Execution (RCE)

A security vulnerability that allows an attacker to execute arbitrary code on a victim’s system remotely.

Commonly used in Security, Cybersecurity

Remote Desktop

Remote desktop refers to a technology that allows users to access and control a desktop or application hosted on a remote computer over a network connection, typically using remote desktop software or protocols.

Commonly used in Networking, Remote Work, Software Development

Remote Desktop Protocol (RDP)

A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.

Commonly used in Networking, Security

Remote Monitoring and Management (RMM)

A type of software designed to help managed IT service providers (MSPs) remotely and proactively monitor client endpoints, networks, and computers.

Commonly used in Networking, IT Management

Remote Procedure Call (RPC)

A protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details.

Commonly used in Networking, Distributed Systems

Remote Sensing

Remote sensing is the acquisition of information about an object or phenomenon without physical contact, typically using sensors mounted on satellites, aircraft, or drones to gather data about Earth’s surface or atmosphere.

Commonly used in Environmental Monitoring, Geospatial Analysis

Replicated State Machine

A method of implementing fault-tolerance mechanisms in distributed computing systems by ensuring that multiple copies of data are kept in sync across different servers.

Commonly used in Distributed Systems, Fault Tolerance

Replication

The process of copying and maintaining database objects, like tables, in multiple database servers that are distributed across different physical locations.

Commonly used in Database, General IT

Replication Factor

In distributed computing, the number of copies of data that are kept in a distributed storage system to ensure data availability and durability.

Commonly used in Database, Distributed Systems

Reporting Tools

Software applications that collect data from various sources, process it, and present it in a readable format.

Commonly used in Data Analysis, Business Intelligence

Repository

In version control systems, a repository is a central file storage location. It is used by version control systems to store multiple versions of files.

Commonly used in Software Development

Repository Pattern

A design pattern that mediates between the domain and data mapping layers, acting like an in-memory domain object collection.

Commonly used in Software Development, Design Patterns

Request for Comments (RFC)

A publication from the technology community to describe methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.

Commonly used in Networking, Standards

Request Throttling

Limiting the number of user requests to a service within a certain timeframe to prevent overuse of resources.

Commonly used in Web Development, Security

Requirements Analysis

The process of determining user expectations for a new or modified product.

Commonly used in Software Development, Project Management

Residual Risk

The risk that remains after all efforts to identify and eliminate risk have been made.

Commonly used in Security, Risk Management

Resilience

The ability of a system to handle and recover from faults and failures.

Commonly used in General IT, Security

Resolution

In display technology, the number of distinct pixels that can be displayed in each dimension. In networking, the process of resolving a domain name to its corresponding IP address.

Commonly used in Hardware, Networking

Resource Allocation

The process of assigning and managing assets in a manner that supports an organization’s strategic goals.

Commonly used in General IT, Project Management