IT Glossary - ITU Online IT Training
Ready to start learning?Individual Plans →Team Plans →

IT Glossary

Showing terms starting with S (212 terms)

Speech to Text

The process of converting spoken words into written texts. This technology is often used in voice recognition systems.

Commonly used in AI, Human-Computer Interaction

Spline

A mathematical function used for creating smooth curves in computer graphics and other fields.

Commonly used in Computer Graphics, Modeling

Splunk

A software platform to search, analyze and visualize the machine-generated data gathered from the websites, applications, sensors, devices, etc.

Commonly used in Big Data, Security

Spoofing

The act of masquerading as a valid entity through falsification of data (such as an IP address or username), to gain an illegitimate advantage.

Commonly used in Cybersecurity

Spyware

Malicious software that secretly gathers information about a user.

Commonly used in Security

SQL

Structured Query Language, used for managing and manipulating relational databases.

Commonly used in Database Management

SQL (Structured Query Language)

A domain-specific language used for managing and manipulating relational databases.

Commonly used in General IT

SQL Database

A database that uses SQL (Structured Query Language) for defining and manipulating data.

Commonly used in Databases, Data Management

SSD (Solid State Drive)

A type of nonvolatile storage media that stores persistent data on solid-state flash memory.

Commonly used in Hardware, Storage

SSD Overprovisioning

The inclusion of extra capacity in a solid-state drive (SSD), which is not accessible to the end-user, to manage write operations and improve the drive’s lifespan.

Commonly used in Hardware, Storage

SSL

Secure Sockets Layer, a protocol for securing communication over the internet.

Commonly used in Security

SSL (Secure Sockets Layer)

A cryptographic protocol used to secure communication over a computer network, commonly used for securing web traffic.

Commonly used in Security, Networking, Cybersecurity

SSL Acceleration

The use of a device that offloads the SSL encryption and decryption work from the web server to improve performance.

Commonly used in Networking, Web Security

SSL Certificate

A digital certificate that provides authentication for a website and enables an encrypted connection.

Commonly used in Security, Web Security

SSL/TLS

Protocols used to provide secure communication over a computer network by encrypting data transmitted between clients and servers.

Commonly used in Security, Cybersecurity

Stack Overflow

A popular Q&A website for programmers and developers to learn, share their knowledge, and build their careers.

Commonly used in Software Development, Community

Stateless

A communication protocol in which each transaction is independent of any previous transaction, unlike stateful protocols which require keeping of the internal state on the server.

Commonly used in Networking, Web Development

Stateless Application

An application that does not save client data generated in one session for use in the next session with that client.

Commonly used in Software Development, Web Development

Stateless Protocol

A communication protocol in which each message contains all the information needed to understand the message, independent of any previous messages.

Commonly used in Networking, Web Development

Static Code Analysis

The analysis of computer software that is performed without actually executing programs, in contrast with dynamic analysis, which is analysis performed on programs while they are executing.

Commonly used in Software Development, Quality Assurance

Static IP Address

An IP address that doesn’t change. Contrast with a dynamic IP address which can change every time the device connects to the internet or the network.

Commonly used in Networking, Internet Technology

Static Typing

A programming language feature in which variable types are explicitly declared and thus are determined at compile time.

Commonly used in Software Development, Programming Languages

Steganography

The practice of concealing messages or information within other non-secret text or data.

Commonly used in Security, Cryptography

Stepper Motor

A type of DC motor that moves in discrete steps. It is used in a variety of applications requiring precise position control.

Commonly used in Hardware, Robotics

Sticky Session

A method used in web servers to achieve server-side load balancing; once a session is started on one server, all the requests from that user are sent to the same server.

Commonly used in Networking, Web Development

Storage

The process of retaining data in a digital format for future use.

Commonly used in General IT

Storage Area Network (SAN)

A specialized high-speed network that provides access to consolidated, block-level data storage.

Commonly used in Networking

Storage Virtualization

The process of abstracting logical storage from physical storage.

Commonly used in Storage

Stream Cipher

A method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time.

Commonly used in Security, Cryptography

Stream Processing

Real-time processing of data streams to extract insights or trigger actions as the data is generated.

Commonly used in Big Data, Analytics, General IT

Streaming

Transmitting data continuously in real-time over a network.

Commonly used in Networking

Structured Data

Data that is organized into a predefined format, such as a database.

Commonly used in Database Management

Structured Query Language (SQL) Injection

A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

Commonly used in Security, Web Development

Subnet

A logical subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.

Commonly used in Networking, Network Management

Subnet Mask

A 32-bit number that masks an IP address, and divides the IP address into network address and host address.

Commonly used in Networking, Network Management

Supervised Learning

A type of machine learning where a model is trained on a labeled dataset, meaning each training example is paired with an output label.

Commonly used in AI, Machine Learning

Supervisory Control and Data Acquisition (SCADA) Systems

Large-scale, industrial control systems used to monitor and control industrial, infrastructure, or facility-based processes.

Commonly used in Networking, Industrial Control Systems

Supply Chain Management

Supply chain management (SCM) is the process of planning, coordinating, and optimizing the flow of goods, services, information, and finances across the entire supply chain, from raw material sourcing to production, distribution, and delivery.

Commonly used in Logistics, Operations, Business Process Management

Swagger

A set of tools for designing, building, documenting, and consuming RESTful web services. It includes automated documentation, code generation, and test-case generation.

Commonly used in Software Development, API Development

Swarm Intelligence

The collective behavior of decentralized, self-organized systems, natural or artificial. The concept is employed in work on artificial intelligence.

Commonly used in AI, Robotics

Swift

A powerful and intuitive programming language for macOS, iOS, watchOS, and tvOS.

Commonly used in Software Development, Programming Languages

Switch

A network device that connects multiple devices within a local area network (LAN) and forwards data packets between them.

Commonly used in Networking, General IT

Switching

The process of directing data packets between devices on the same network or between networks.

Commonly used in Networking, Data Communication

Symmetric Encryption

A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.

Commonly used in Security, Cryptography

Syntax Highlighting

A feature of text editors that displays text—especially source code—in different colors and fonts according to the category of terms.

Commonly used in Software Development, Programming

Synthetic Data

Artificial data generated programmatically to mimic real data for testing, training, or research purposes.

Commonly used in Data Science, General IT

Synthetic Intelligence

An alternative term often used to describe artificial intelligence that emphasizes the creation of intelligence through synthetic (or artificial) means.

Commonly used in AI, General IT

Synthetic Monitoring

Monitoring the performance and availability of applications and systems using simulated transactions.

Commonly used in General IT, Monitoring

Syslog

A standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them.

Commonly used in Software Development, System Administration

System

A collection of hardware, software, and firmware components that work together to perform a specific function or task.

Commonly used in General IT