IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.
[th-aps]

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Multispectral Imaging

A technology used to capture image data at specific frequencies across the electromagnetic spectrum. Used in satellite imaging, medical imaging, and quality control in various industries.

You will find this term commonly used in AI, General IT

Multispectral Sensors

Devices that capture image data within specific wavelength ranges across the electromagnetic spectrum. Used in various applications, including remote sensing and environmental monitoring.

You will find this term commonly used in AI, General IT

Multitasking

The ability of an operating system to execute multiple tasks simultaneously on a single processor.

You will find this term commonly used in General IT

Multithreaded Programming

A programming approach that allows multiple threads to exist within the context of a single process, enabling parallel execution of tasks.

You will find this term commonly used in Software Development

Multithreading

Multithreading is a programming technique that allows multiple threads of execution to run concurrently within a single process, enabling efficient utilization of CPU resources and improved performance.

You will find this term commonly used in Software Development

Multithreading in Databases

The ability of a database management system to execute multiple threads concurrently, improving performance and efficiency in handling database operations.

You will find this term commonly used in Databases, Software Development

Multithreading Synchronization

A process in programming that ensures that two or more concurrent threads do not simultaneously execute some particular program segment known as critical section.

You will find this term commonly used in Software Development

Multitier Architecture

Also known as n-tier architecture, a client-server architecture in which presentation, application processing, and data management functions are physically separated.

You will find this term commonly used in Software Development, Web Development

Multivariate Testing

A technique for testing a hypothesis in which multiple variables are modified. The goal is to determine which combination of variations performs the best out of all possible combinations.

You will find this term commonly used in Web Development, Marketing

Multivendor Integration

The process of combining hardware or software products from multiple vendors into a single system to achieve a specific functionality or workflow.

You will find this term commonly used in General IT, Networking

Mutation Testing

A method of software testing which involves modifying software's source code in small ways to test whether the existing test cases can detect these modifications.

You will find this term commonly used in Software Testing

Mutual Authentication

A security process in which both the client and the server verify each other's identity.

You will find this term commonly used in Security, Cybersecurity

Mutual Exclusion (Mutex)

A property of concurrency control, which is instituted for the purpose of preventing race conditions; it is the requirement that one thread of execution never enter its critical section at the same time that another concurrent thread of execution enters its own critical section.

You will find this term commonly used in Software Development, Operating Systems

Mutual Exclusion Algorithm

An algorithm used in computer science to avoid race conditions by ensuring that multiple program threads do not simultaneously execute some particular program segment known as critical sections.

You will find this term commonly used in Software Development, Security

Mutual Inductance

A phenomenon where a change in the electric current in one conductor induces a voltage in another conductor through electromagnetic induction. Relevant in wireless charging and power transfer.

You will find this term commonly used in Electronics

Mutual Link Exchange

An agreement between two webmasters to provide a hyperlink within their own website to each other's web site. Generally done to provide readers with quick access to related sites, and to increase search engine rankings through reciprocal links.

You will find this term commonly used in Web Development, SEO

Mutual SSL/TLS

A mode of Secure Sockets Layer/Transport Layer Security where both the client and the server authenticate each other using digital certificates to ensure both parties are trusted entities in a secure communication.

You will find this term commonly used in Security, Networking

Mutual TLS/SSL

A security protocol that requires both the client and server in a communication to authenticate each other's identities via TLS/SSL certificates, ensuring a secure connection.

You will find this term commonly used in Cybersecurity, Networking

MVCC (Multi-Version Concurrency Control)

A concurrency control method commonly used in database management systems to provide concurrent access to the database and in programming languages to implement transactional memory.

You will find this term commonly used in Databases, Software Development

MVP (Minimum Viable Product)

A development technique in which a new product is developed with sufficient features to satisfy early adopters.

You will find this term commonly used in Software Development, Business Strategy

MVVM (Model-View-ViewModel)

A software architectural pattern that facilitates the separation of the development of the graphical user interface (the view) from the development of the business logic or back-end logic (the model) so that the view is not dependent on any specific model platform.

You will find this term commonly used in Software Development

Myelin

In the context of neural networks and artificial intelligence, myelin is often used metaphorically to describe the insulation or enhancement of neural connections. The term originates from the biological myelin sheath that insulates nerve fibers and increases signal transmission speed.

You will find this term commonly used in AI, Neural Networks

MyISAM

A storage engine for MySQL. MyISAM was the default storage engine for the MySQL relational database management system versions prior to 5.5.

You will find this term commonly used in Databases

Mylar

Often referred to in the context of Mylar diagrams used in software architecture to represent relationships between different components or systems.

You will find this term commonly used in Software Development

Myoelectric

Pertaining to electric phenomena produced by muscle action or to the electric potentials associated with muscles. Relevant in the development of prosthetic devices and medical research.

You will find this term commonly used in Health IT, General IT

MySpace

An early social networking website launched in 2003 that allows users to create personal profiles, share photos, music, and videos, and interact with friends.

You will find this term commonly used in Social Media

MySQL

An open-source relational database management system.

You will find this term commonly used in General IT, Database

MySQL Workbench

An integrated development environment for MySQL, providing data modeling, SQL development, and comprehensive administration tools for server configuration, user administration, and much more.

You will find this term commonly used in Databases, Software Development

Mystery Shopping

A method used externally by market research companies, watchdog organizations, or internally by companies themselves to measure quality of service, compliance with regulation, or to gather specific information about products and services. While not an IT term per se, it's increasingly used in evaluating IT retail and service sectors.

You will find this term commonly used in Business Intelligence, Customer Service

N-tier Architecture

A multi-tier architecture that separates the presentation, application, and data management functions for better scalability and management.

You will find this term commonly used in Software Development, Architecture

Nagios

A powerful monitoring system that enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes.

You will find this term commonly used in Networking, Monitoring

Nagle's Algorithm

A means to improve the efficiency of TCP/IP networks by reducing the number of packets that need to be sent over the network.

You will find this term commonly used in Networking, Algorithms

Namespace

A container that holds a set of identifiers, symbols, or names, allowing for the organization and control of these elements within various parts of a program or system.

You will find this term commonly used in General IT, Programming

Namespace Isolation

A technology used in virtualization and containerization to isolate system resources between different processes or containers.

You will find this term commonly used in Virtualization, Security

NaN (Not a Number)

A value or symbol that represents an undefined or unrepresentable value, especially in floating-point calculations.

You will find this term commonly used in Programming, Data Science

NAND Flash Memory

Non-volatile storage technology used in solid-state drives (SSDs) and USB flash drives.

You will find this term commonly used in General IT, Storage

NAND Gate

A basic logic gate in digital electronics that produces an output only when all its inputs are off. It is the combination of a NOT gate followed by an AND gate.

You will find this term commonly used in General IT

Nanotechnology

The manipulation of matter on an atomic or molecular scale, often used in IT for developing smaller and more powerful electronic components.

You will find this term commonly used in General IT

NAP (Network Access Protection)

A Microsoft technology for controlling network access of a computer, based on its health compliance with the defined policy.

You will find this term commonly used in Networking, Security

Narrowband

A type of data transmission over a network where the bandwidth range is narrow. Often used in telecommunications to refer to channels that are narrower than a voice channel.

You will find this term commonly used in Networking, Telecommunications

NAS (Network-Attached Storage)

A file-level storage architecture that makes stored data more accessible to networked devices.

You will find this term commonly used in Networking, Data Storage

NAT (Network Address Translation)

A technique used to modify network address information in packet headers while in transit, often used to conserve IP addresses or enhance security.

You will find this term commonly used in Networking, Security

NAT (Network Address Translation) Traversal

Techniques that establish and maintain Internet protocol connections traversing NAT gateways, used in applications like VoIP.

You will find this term commonly used in Networking, Cybersecurity

NAT64

A mechanism for translating IPv6 addresses to IPv4 addresses and vice versa, facilitating communication between IPv4 and IPv6 networks.

You will find this term commonly used in Networking, IPv6/IPv4 Integration

Natural Language Generation

Natural language generation (NLG) is a branch of artificial intelligence that generates human-like text or speech based on structured data or predefined rules, enabling automated content creation, summarization, or report generation.

You will find this term commonly used in AI, Natural Language Processing, Content Generation

Natural Language Processing

Natural language processing (NLP) is a branch of artificial intelligence that focuses on the interaction between computers and humans through natural language, enabling computers to understand, interpret, and generate human language.

You will find this term commonly used in AI, Data Processing, Linguistics

Natural Language Processing (NLP)

A branch of artificial intelligence that enables computers to understand, interpret, and generate human language.

You will find this term commonly used in AI

Near Field Communication (NFC)

NFC is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other.

You will find this term commonly used in General IT

Negative Acknowledgment (NAK)

A signal used in communications to indicate that data has been received incorrectly or that an error has occurred during transmission.

You will find this term commonly used in Networking, Data Communication

Net Neutrality

The principle that all Internet traffic should be treated equally by Internet Service Providers, without discrimination.

You will find this term commonly used in Networking, Policy

What's Your
Career Path?
CEH Career Path
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Career Path
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT User Support Specialist Career Path
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager's Survival Bundle
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Information Security Career Path
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
50 Hrs 41 Min
icons8-video-camera-58
273 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass