IT Glossary
Key Terms To Know In The IT Industry
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Gyroscope
A device used for measuring or maintaining orientation and angular velocity. In IT, it‘s commonly found in smartphones, tablets, and other electronic devices to support motion–based commands and orientation features.
You will find this term commonly used in Hardware
Gyroscope Integration
The incorporation of gyroscopic sensors into devices to detect and respond to orientation changes, used in mobile and gaming devices.
You will find this term commonly used in Hardware, Mobile Development
Gyroscope Sensor Data
Information collected by gyroscope sensors in mobile devices and other technologies, used to detect orientation, rotation, and motion for various applications including gaming and navigation.
You will find this term commonly used in Hardware / Mobile Development
Gyroscopic Navigation
The use of gyroscopes in devices to help determine orientation and direction, commonly used in navigation and control systems.
You will find this term commonly used in Navigation, Sensor Technology
Gyroscopic Sensor
A device that measures or maintains the orientation and angular velocity of a vehicle, apparatus, or other object using the principles of angular momentum.
You will find this term commonly used in Hardware / Mobile Devices
Gyroscopic Sensors
Sensors that measure or maintain the orientation and angular velocity of an object. Widely used in mobile devices, drones, and other technologies to detect orientation, rotation, and motion gestures.
You will find this term commonly used in Hardware / Mobile Development
Gyroscopic Stabilization
The use of gyroscopes in devices to stabilize orientation, often used in drones, smartphones, and VR headsets.
You will find this term commonly used in Hardware, Mobile Devices
Gzip Compression
A method of compressing files for faster network transfer. It is widely used in web servers and browsers to reduce the amount of data sent over the network.
You will find this term commonly used in Web Development
GZip Compression Algorithm
A file format and software application used for file compression and decompression, widely used on the web to reduce data transfer sizes.
You will find this term commonly used in Web Development, Data Management
GZIP Compression Technique
A software application used for file compression and decompression. GZIP is recognized for its effectiveness in compressing web content for faster transmission over the internet.
You will find this term commonly used in Web Development
GZIP File Compression
A software application and file format for file compression and decompression, widely used on Unix and Unix–like systems for file transfer optimization.
You will find this term commonly used in Data Management, Web Development
Gzip File Format
A file format and a software application used for file compression and decompression. GZIP is often used to compress web content for faster loading times.
You will find this term commonly used in Web Development
Gzip Streaming
A process of compressing files in a streaming fashion, which is particularly useful for compressing data on–the–fly as it is being transmitted over a network or between processes.
You will find this term commonly used in Web Development / Networking
Hackathon
An event, typically lasting several days, in which a large number of people meet to engage in collaborative computer programming.
You will find this term commonly used in General IT, Software Development
Hadoop
An open–source framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models.
You will find this term commonly used in Big Data, Distributed Computing
Handover
In mobile communications, the process by which a phone call or data session transfers from one cell coverage area to another without interruption.
You will find this term commonly used in Networking, Mobile Technology
Handover Protocol
In mobile telecommunications, the process by which a mobile device transfers from one network cell to another without losing connection.
You will find this term commonly used in Networking, Mobile Technology
Handshaking
In networking, a process by which two devices initiate communication. Handshaking often involves exchanging certain messages to establish parameters of the communication.
You will find this term commonly used in Networking
Haptic Feedback
The use of touch feedback to the user of an electronic device.
You will find this term commonly used in User Interface, Mobile Technology
Haptic Interface
A system that allows users to interact with a computer through bodily sensations and movements, typically providing force feedback to simulate the touch and feel of virtual objects.
You will find this term commonly used in User Interface, Design
Haptic Technology
The use of technology that stimulates the senses of touch and motion, which is particularly useful in virtual environments.
You will find this term commonly used in User Interface, Virtual Reality
Hard Fork
A change to the protocol of a blockchain network that makes previously invalid blocks/transactions valid (or vice–versa), requiring all nodes or users to upgrade to the latest version of the protocol software.
You will find this term commonly used in Cryptocurrency
Hardware
The collection of physical parts of a computer system. This includes the computer case, monitor, keyboard, and mouse, as well as the internal components such as the motherboard, hard disk drive, graphics card, and RAM modules.
You will find this term commonly used in General IT, Hardware
Hardware Abstraction Layer (HAL)
A layer of programming that allows a computer operating system to interact with a hardware device at a general or abstract level rather than at a detailed hardware level.
You will find this term commonly used in Hardware, Operating Systems
Hardware Acceleration
The use of computer hardware to perform some functions more efficiently than is possible in software running on a general–purpose CPU.
You will find this term commonly used in Hardware, Computing
Hardware Accelerator
A hardware device or a system software that improves the overall performance of the computer by offloading processing tasks that would be otherwise processed by the CPU.
You will find this term commonly used in Hardware, Computing
Hardware Compatibility List (HCL)
A list maintained by software or hardware vendors that details the components that have been tested and are known to work with their system.
You will find this term commonly used in Hardware, Computing
Hardware Debugging
The process of identifying and fixing hardware issues in a computer or electronic system.
You will find this term commonly used in Hardware, Software Development
Hardware Description Language
Languages used to describe the structure and behavior of electronic circuits, and most commonly, digital logic circuits. VHDL and Verilog are two prominent HDLs.
You will find this term commonly used in Electronics, Digital Design
Hardware Description Language (HDL)
A specialized computer language used to describe the structure, design, and operation of electronic circuits, particularly digital logic circuits.
You will find this term commonly used in Hardware, Programming
Hardware Diagnostic Test
Tests run to check the physical components of a computer or server for functionality and performance issues. They help in identifying hardware failures or potential failures.
You will find this term commonly used in Hardware, Maintenance
Hardware Emulation
The technique of imitating the functionality of one hardware device in another hardware device, commonly used in software development and testing.
You will find this term commonly used in Hardware, Software Development
Hardware Engineer
Designs, develops, and tests physical components of computers and related devices.
You will find this term commonly used in Hardware Development, Engineering
Hardware Firewall
A physical device that filters traffic between a computer (or local network) and the Internet to block malicious traffic.
You will find this term commonly used in Security, Networking
Hardware Keylogger
A physical device designed to record keystrokes on a computer or mobile device, often used for malicious purposes to capture passwords and other sensitive information.
You will find this term commonly used in Security, Hardware
Hardware Optimization
The process of adjusting hardware components and systems to perform more efficiently or to meet specific performance requirements.
You will find this term commonly used in Hardware, Computing
Hardware Performance Counter
A set of special–purpose registers that are used to store the counts of hardware–related activities, useful for software optimization.
You will find this term commonly used in Hardware, Computing
Hardware Profiling
The process of systematically analyzing the hardware components of a computer to ensure compatibility and performance efficiency.
You will find this term commonly used in Hardware, Computing
Hardware RAID
A way to store data on multiple hard disks for redundancy and/or performance, managed by a dedicated piece of hardware.
You will find this term commonly used in Hardware, Data Storage
Hardware Security
The protection of physical devices from threats that could compromise their performance or integrity, including tampering, unauthorized access, and physical damage.
You will find this term commonly used in Security, Hardware
Hardware Token
A physical device that an authorized user of computer services is given to ease the authentication process.
You will find this term commonly used in Security
Hardware–Assisted Virtualization
Virtualization that is supported and accelerated by the physical hardware, typically by the CPU. It allows for better performance of virtual machines.
You will find this term commonly used in Virtualization, Hardware
Hash Chain
A method of producing many one–time keys from a single key or password.
You will find this term commonly used in Security, Cryptography
Hash Collision
Occurs when a hash function returns the same output for two different inputs. Hash collisions are a concern in the field of cryptography.
You will find this term commonly used in Cryptography
Hash Distribution
The method of distributing database partitions across a cluster using a hash function to decide which node in the cluster receives a given piece of data.
You will find this term commonly used in Databases, Big Data
Hash DoS Attack
A denial–of–service attack technique that exploits the worst–case scenarios of hash table implementations, causing a large number of hash collisions and severely degrading application performance.
You will find this term commonly used in Security, Software Development
Hash Function
A function that converts an input (or ‘message‘) into a fixed–size string of bytes. The output, typically a ‘digest‘, is designed to be unique to each unique input. It is a one–way function, meaning a function which is practically infeasible to invert.
You will find this term commonly used in Cryptography
Hash Function Cryptanalysis
The study of the weaknesses and vulnerabilities in hash functions to understand how they can be broken or compromised.
You will find this term commonly used in Security, Cryptography
Hash Function Security
The property of a hash function that makes it suitable for use in cryptography, including resistance to collisions and preimage attacks.
You will find this term commonly used in Security, Cryptography
Hash Map
A data structure that implements an associative array abstract data type, a structure that can map keys to values.
You will find this term commonly used in Programming, Data Structures
Career Path?