IT Glossary - ITU Online IT Training
Ready to start learning?Individual Plans →Team Plans →

IT Glossary

Showing terms starting with V (285 terms)

Virtualization Platform

A Virtualization Platform is a software or hardware infrastructure that enables the creation and management of virtual machines and virtualized environments. It provides the necessary resources and tools to implement virtualization solutions.

Commonly used in Virtualization, Cloud Computing, General IT

Virtualization Security

Measures taken to secure virtualized infrastructure, including virtual machines, hypervisors, and virtual networks.

Commonly used in Cybersecurity

Virtualization Technology

Hardware and software techniques used to create virtualized environments, including virtual machines, virtual networks, and storage.

Commonly used in Virtualization

Virtualization-Based Security (VBS)

A security feature that uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system.

Commonly used in Cybersecurity

Virus

Malicious software that replicates itself and spreads to other computers or devices, often causing damage or disrupting operations.

Commonly used in Cybersecurity

Virus Scan

The process of examining files and system memory for the presence of computer viruses or malware.

Commonly used in Cybersecurity

Virus Signature

Unique patterns or characteristics of known viruses used by antivirus software to detect and remove malicious code.

Commonly used in Cybersecurity

Visibility Graph Analysis

A method used in spatial analysis and urban planning to analyze the visibility and accessibility of different points in a space.

Commonly used in Data Analysis, Urban Planning

Visibility Testing

In computer graphics, determining which objects, or parts of objects, are not visible from a certain viewpoint.

Commonly used in Graphic Design, Software Development

Visibility Zone

In cybersecurity, a defined segment of the network monitored for security threats and anomalies.

Commonly used in Cybersecurity

Visio

A diagramming and vector graphics application part of the Microsoft Office family used to create diagrams.

Commonly used in General IT, Graphic Design

Visitor Pattern

A software design pattern that allows adding new operations to existing object structures without modifying them.

Commonly used in Software Development

Visual Analytics

The science of analytical reasoning supported by interactive visual interfaces.

Commonly used in Data Analysis, Business Intelligence

Visual Basic .NET (VB.NET)

An object-oriented programming language implemented on the .NET Framework, evolved from the classic Visual Basic language.

Commonly used in Software Development

Visual Content Management

The process of organizing, storing, and retrieving digital visual content such as images and videos.

Commonly used in Web Development, Content Management

Visual Debugging

The process of using graphical interfaces in development environments to inspect and manipulate the state of applications during debugging.

Commonly used in Software Development

Visual Programming

A programming paradigm that allows programmers to create software by manipulating program elements graphically rather than by specifying them textually.

Commonly used in Software Development

Visual Programming Language (VPL)

A programming language that allows users to create programs by manipulating elements graphically rather than by specifying them textually.

Commonly used in Software Development, Education

Visual Scripting

A programming technique that allows developers to create software by manipulating program elements graphically rather than by writing code textually.

Commonly used in Software Development

Visual SourceSafe (VSS)

A version control system that allows multiple users to collaborate on a project by managing changes to the project’s files.

Commonly used in Software Development

Visual Studio Code

A free, open-source, and powerful source code editor developed by Microsoft for Windows, Linux, and macOS.

Commonly used in Software Development

Visual Testing

In software testing, a process that involves examining the graphical user interface to ensure it meets its specifications.

Commonly used in Software Development, Testing

Viterbi Algorithm

An algorithm for finding the most likely sequence of hidden states that results in a sequence of observed events, especially in the context of Markov information sources and hidden Markov models.

Commonly used in AI, Machine Learning

Vivado Design Suite

An integrated design environment developed by Xilinx for synthesis and analysis of HDL designs, enabling the development of sophisticated digital circuits.

Commonly used in Hardware Design, FPGA Development

Vivarium Computing

An emerging field that explores the integration of biological systems with computational processes, aiming to create living computers.

Commonly used in Emerging Technologies

VividCortex

A database performance monitoring tool designed to provide deep database performance analytics.

Commonly used in Database Management, Monitoring

VLAN (Virtual Local Area Network)

A network infrastructure segmentation technique that allows multiple virtual networks to coexist on the same physical network.

Commonly used in Networking

VLAN Hopping

A network attack technique that exploits a VLAN configuration weakness, allowing the attacker to gain access to traffic on other VLANs.

Commonly used in Security, Networking

VLAN Switching

Technology that allows network administrators to segment a LAN into smaller VLANs for improved traffic management and security.

Commonly used in Networking

VLAN Tagging

A technique used to identify VLAN membership of frames by adding a VLAN identifier (tag) to Ethernet frames.

Commonly used in Networking

VLAN Trunking

A technique used to carry traffic for multiple VLANs over a single network link.

Commonly used in Networking

VLSI (Very Large Scale Integration)

The process of creating an integrated circuit (IC) by combining thousands or millions of transistors onto a single chip.

Commonly used in General IT

VLSM (Variable Length Subnet Mask)

A subnetting technique that allows for more efficient use of IP address space by using different subnet mask lengths for different subnets within the same network.

Commonly used in Networking

VLSM (Variable Length Subnet Masking)

A technique in IP address allocation that allows for more efficient use of IP addresses.

Commonly used in Networking

VM (Virtual Machine)

An emulation of a computer system that runs on top of a physical hardware platform, allowing multiple virtual machines to run on a single physical machine.

Commonly used in Virtualization

VM Cloning

Creating a copy of a virtual machine that can be used as a template to quickly deploy new VMs.

Commonly used in Virtualization

VM Resilience

The ability of a virtual machine to withstand and recover from failures or disruptions.

Commonly used in Virtualization

VMware

Specializes in certifications for VMware virtualization and cloud computing technologies, including professional, advanced professional, and expert levels.

Commonly used in Virtualization, Cloud Computing

VMware Certified Professional – Data Center Virtualization

Validates the skills required to implement, manage, and troubleshoot a vSphere infrastructure.

Commonly used in Virtualization

VMware ESXi

An enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers.

Commonly used in Virtualization

VMware Fusion

Software that enables Mac users to run Windows and other operating systems alongside macOS without rebooting.

Commonly used in Virtualization

VMware vSphere

A cloud computing virtualization platform that provides a complete infrastructure for virtualizing and managing virtual machines.

Commonly used in Virtualization

VMware Workstation

A hypervisor that runs on x64 versions of Windows and Linux; it enables users to set up multiple virtual machines (VMs) on a single physical machine.

Commonly used in Virtualization

VNC (Virtual Network Computing)

A graphical desktop-sharing system that allows users to remotely control and interact with the desktop environment of another computer.

Commonly used in Networking

Vocabulary Learning

In machine learning and natural language processing, the process of acquiring new words and their meanings to improve understanding and generation of human language.

Commonly used in AI, Natural Language Processing

Vocaloid

A software voice synthesizer program for music production that allows users to synthesize singing by typing in lyrics and melody.

Commonly used in Multimedia, Content Creation

VoD (Video on Demand)

A system that allows users to select and watch/listen to video or audio content when they choose to, rather than having to watch at a specific broadcast time.

Commonly used in Telecommunications, Networking

Voice Activation

Technology that allows devices to be operated through voice commands.

Commonly used in AI, User Interface

Voice Analysis

The study and interpretation of voice patterns for various applications, including security (voice biometrics) and health diagnostics.

Commonly used in AI, Security

Voice Assistant

A software agent that uses speech recognition, natural language processing, and artificial intelligence to perform tasks or services for an individual.

Commonly used in AI