IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.
[th-aps]

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

NNTP (Network News Transfer Protocol)

A protocol used for the distribution, inquiry, retrieval, and posting of news articles using a reliable stream-based mechanism, typically used for Usenet newsgroups.

You will find this term commonly used in Networking, Applications

No-Code Development Platform

A platform that allows for the development of software applications without the need to write code, enabling non-programmers to create applications using graphical interfaces and configuration.

You will find this term commonly used in Software Development, Innovation

Node

A device or data point in a network, such as a computer, printer, or router.

You will find this term commonly used in Networking

Node Balancing

The process of distributing load evenly across nodes in a network or system to ensure no single node is overwhelmed, thereby enhancing performance and reliability.

You will find this term commonly used in Networking, Performance Management

Node.js

An open-source, server-side platform built on Chrome's V8 JavaScript engine for building fast and scalable network applications.

You will find this term commonly used in General IT, Networking

Noise

In the context of information technology, noise refers to unwanted or irrelevant signals or data that interfere with the transmission or processing of useful information. It can degrade the quality of communication or introduce errors in data processing.

You will find this term commonly used in Networking, General IT

Non-repudiation

A security measure that ensures the integrity and origin of transmitted data, preventing the sender from denying responsibility for the message.

You will find this term commonly used in Security, Cybersecurity

Non-Uniform Memory Access (NUMA)

A computer memory design used in multiprocessor systems, where the access time depends on the memory location relative to the processor.

You will find this term commonly used in Hardware, Architecture

Non-Volatile Memory

Computer memory that retains its stored data even when powered off, such as flash memory and ROM.

You will find this term commonly used in General IT

Non-Volatile Random Access Memory (NVRAM)

A type of memory that retains its data even when power is turned off, commonly used for storing configuration settings.

You will find this term commonly used in Hardware, Data Storage

Non-Volatile Storage

A type of computer memory that can retain the stored information even when not powered.

You will find this term commonly used in Data Storage, Hardware

Normal Form

In database theory, a property of a relational database schema, a measure of the database's freedom from certain kinds of anomalies and redundancies.

You will find this term commonly used in Databases, Design Principles

Normalization

The process of organizing data in a database to reduce redundancy and improve data integrity.

You will find this term commonly used in Data Management, Databases

North-South Traffic

Network traffic that flows to and from the data center (or cloud) and the wider internet or other remote networks, in contrast to East-West traffic, which flows within a data center.

You will find this term commonly used in Networking, Data Center

Norton Antivirus

An antivirus or anti-malware software product developed by NortonLifeLock.

You will find this term commonly used in Cybersecurity

NoSQL

NoSQL, or "Not Only SQL," refers to a type of database management system that provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.

You will find this term commonly used in General IT

NoSQL Database

A non-relational database that allows for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.

You will find this term commonly used in Databases, Data Management

Not Only SQL (NoSQL)

An approach to database design that provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.

You will find this term commonly used in Databases, Data Management

Notification Service

A service that provides notifications to users or applications, typically through email, SMS, or webhooks, to alert them of events or changes in a system.

You will find this term commonly used in Software Development, Applications

Novell NetWare

A discontinued network operating system developed by Novell, widely used in the 1990s.

You will find this term commonly used in Networking

NP-Complete (Non-deterministic Polynomial-time Complete)

A classification of problems in computational complexity theory that are as hard as the hardest problems in NP (Non-deterministic Polynomial-time), and for which a solution can be verified in polynomial time.

You will find this term commonly used in Computer Science, Theory

NTP Server

A server that uses the Network Time Protocol to provide time synchronization to clients and devices on the network, ensuring accurate and consistent time across an organization.

You will find this term commonly used in Networking, IT Management

Null Pointer

In programming, a pointer that does not point to any object or function, often used to signify the absence of a value or to terminate a linked list.

You will find this term commonly used in Programming, Software Development

Numeric Keypad

A keypad that is dedicated to the input of numbers, commonly found as a part of a computer keyboard or as a standalone device.

You will find this term commonly used in Hardware, User Interface

NVMe (Non-Volatile Memory Express)

A specification for accessing solid-state drives (SSDs) attached through the PCI Express (PCIe) bus, offering high throughput and low latency.

You will find this term commonly used in Hardware, Data Storage

NX bit (No eXecute bit)

A technology used in computers to segregate areas of memory for use by either storage of processor instructions (code) or for storage of data, a means of preventing certain types of malicious software from executing.

You will find this term commonly used in Security, Hardware

OAuth

An open-standard authorization protocol used for secure API authentication.

You will find this term commonly used in Security, Web Development, General IT

OAuth 2.0

An authorization framework that enables applications to obtain limited access to user accounts on an HTTP service, such as Facebook, GitHub, and Google.

You will find this term commonly used in Security, Cybersecurity

OAuth 2.0 Flows

Different authorization processes within the OAuth 2.0 framework, designed for various application scenarios, including authorization code flow, implicit flow, and client credentials flow.

You will find this term commonly used in Security, Web Development

OAuth2 Proxy

A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group.

You will find this term commonly used in Security, Web Development

Obfuscation

The deliberate act of creating source or machine code that is difficult for humans to understand, used to protect intellectual property or sensitive data within software.

You will find this term commonly used in Security, Software Development

Object Code

The output of a compiler after it processes source code. Object code can be directly executed by a computer's hardware or can serve as input to a linker.

You will find this term commonly used in Software Development, Programming

Object Detection

The process of locating and classifying objects within images or video streams.

You will find this term commonly used in Computer Vision, AI, General IT

Object Lifecycle Management

The process of managing the lifecycle of an object from its creation to its deletion, including phases such as creation, use, and disposal, often within the context of cloud storage.

You will find this term commonly used in Cloud Computing, Storage

Object Lifetime

The time during which an object exists in memory, from creation (instantiation) to destruction (garbage collection or deallocation).

You will find this term commonly used in Programming, Memory Management

Object Lifetime Management

The aspect of software development concerned with the creation, use, and cleanup of objects to manage memory and resources efficiently in programming languages, especially those with manual memory management.

You will find this term commonly used in Software Development, Memory Management

Object Linking and Embedding (OLE)

A technology developed by Microsoft that allows embedding and linking to documents and other objects. For developers, it brought OLE Control Extension (OCX), a way to develop and use custom user interface elements.

You will find this term commonly used in Programming, Windows Development

Object Management Group (OMG)

An international, open membership, not-for-profit technology standards consortium that produces and maintains computer industry specifications for interoperable enterprise applications.

You will find this term commonly used in Standards, Enterprise IT

Object Model

A collection of objects or classes through which a program can examine and manipulate some specific parts of its world. In essence, it is a map of objects and their relationships and how they can be manipulated.

You will find this term commonly used in Software Development

Object Pooling

A software design pattern that involves creating a pool of objects that can be reused instead of creating and destroying them on demand.

You will find this term commonly used in Software Development, Performance Optimization

Object Query Language (OQL)

A query language standard for object-oriented databases, analogous to SQL for relational databases.

You will find this term commonly used in Database Management

Object Recognition

A computer vision technique for identifying objects in images or videos. While closely related to object detection, it goes further by not only detecting objects within an image but also identifying them.

You will find this term commonly used in AI, Computer Vision

Object Recognition Technology

Advanced computer vision technology used to identify and detect objects within images or videos, pivotal in fields like autonomous driving, security surveillance, and augmented reality applications.

You will find this term commonly used in AI, Computer Vision

Object Relational Mapping (ORM)

A programming technique for converting data between incompatible type systems in object-oriented programming languages and relational databases.

You will find this term commonly used in Software Development, Database Management, General IT

Object Repository

A centralized storage location for objects used in software testing and development, facilitating reuse of objects across different projects or parts of a project.

You will find this term commonly used in Software Development, Testing

Object Request Broker (ORB)

Middleware that allows programs to send objects and request services from programs located on other computers in a network.

You will find this term commonly used in Networking, Software Development

Object Serialization

The process of converting an object's state into a format that can be stored or transmitted and reconstructed later.

You will find this term commonly used in General IT, Programming

Object Storage

A method of storing data as objects, typically in a distributed system, where each object contains the data, metadata, and a unique identifier.

You will find this term commonly used in Data Storage, Cloud Computing, General IT

Object Storage Device (OSD)

A storage device designed to manage digital data as objects, unlike traditional file or block storage, allowing for scalable, efficient storage solutions.

You will find this term commonly used in Data Storage, Cloud Computing

Object-Based Storage (OBS)

A storage architecture that manages data as objects, as opposed to block storage or file storage, which manage data as blocks within sectors or as a hierarchical file system.

You will find this term commonly used in Data Storage

What's Your
Career Path?
IT Project Manager
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
50 Hrs 41 Min
icons8-video-camera-58
273 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT User Support Specialist Career Path
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
CEH Career Path
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager's Survival Bundle
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
azure-administrator-career-path
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Specialist
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $59.99.

Add To Cart
Video Editor Career Path
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass