IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.
[th-aps]

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

OpenCL (Open Computing Language)

An open standard for parallel programming of heterogeneous systems that include CPUs, GPUs, and other processors.

You will find this term commonly used in Programming, High-Performance Computing

OpenFlow

A communications protocol that gives access to the forwarding plane of a network switch or router over the network.

You will find this term commonly used in Networking, Security

OpenID

An open-standard authentication protocol that allows users to be authenticated by co-operating sites using a third-party service.

You will find this term commonly used in Security, Web Development, General IT

OpenID Authentication

A decentralized authentication protocol that allows users to authenticate using a third-party service provider, simplifying login processes across multiple websites.

You will find this term commonly used in Cybersecurity, Web Development

OpenID Connect

An authentication protocol that extends OAuth 2.0 to provide identity verification services for web and mobile applications.

You will find this term commonly used in Security, Web Development, General IT

OpenID Provider (OP)

A service that specializes in registering OpenID URLs or XRIs. OpenID allows users to be authenticated using a third-party service following the OpenID standards.

You will find this term commonly used in Security, Web Development

OpenMP (Open Multi-Processing)

An application programming interface (API) that supports multi-platform shared-memory multiprocessing programming in C, C++, and Fortran, on most processor architectures and operating systems.

You will find this term commonly used in Programming, High-Performance Computing

OpenPGP

An open standard for encrypting and decrypting email over the internet using public key cryptography to provide increased confidentiality and authenticity.

You will find this term commonly used in Security, Communications

OpenSSH (Open Secure Shell)

A suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an unsecured network in a client-server architecture.

You will find this term commonly used in Networking, Security

OpenStack

An open-source cloud computing platform for building and managing public and private clouds.

You will find this term commonly used in Cloud Computing, Virtualization, General IT

OpenStack Swift

An open source object storage system that is scalable and redundant, part of the OpenStack suite of software, used for storing and retrieving lots of data with a simple API.

You will find this term commonly used in Cloud Computing, Storage

OpenType

A format for scalable computer fonts that was built on its predecessor TrueType, retaining TrueType's basic structure and adding many intricate data structures for prescribing typographic behavior.

You will find this term commonly used in Software Development, Typography

OpenVMS

An operating system from the Digital Equipment Corporation (DEC) that runs in its VAX and Alpha lines of computers. OpenVMS is known for its high-level of reliability, availability, scalability, and security.

You will find this term commonly used in Operating Systems

OpenVPN

An open-source software application that implements virtual private network (VPN) techniques to create secure point-to-point connections.

You will find this term commonly used in Security, Networking, General IT

Operating Environment

The environment in which a computer program or software runs. It is a term that can refer to a software environment in which applications or programs run or the hardware/software environment of a computer system.

You will find this term commonly used in General IT, Software Development

Operating Model

A framework that defines how an organization's IT infrastructure and resources are organized and managed to support its business objectives.

You will find this term commonly used in Business Strategy, IT Management, General IT

Operating System

Software that manages computer hardware and provides common services for computer programs.

You will find this term commonly used in General IT

Operating System (OS)

Software that manages hardware resources and provides a user interface for interacting with a computer system.

You will find this term commonly used in General IT

Operating System Security

The process of ensuring OS integrity, confidentiality, and availability. OS security encompasses the protection of resources and data from unauthorized access and their secure use.

You will find this term commonly used in Security, Operating Systems

Operating System Virtualization

Operating system virtualization is the process of running multiple operating systems on a single physical machine concurrently, using virtualization technology to partition resources and isolate operating environments.

You will find this term commonly used in Virtualization, Operating Systems

Operational Business Intelligence

Real-time, dynamic business intelligence that delivers reporting and analysis to business operations, integrating operational activities with analytical tools to increase efficiency and improve decision-making.

You will find this term commonly used in Business Intelligence, Data Analysis

Operational Data Store (ODS)

A database designed to integrate data from multiple sources for additional operations on the data, unlike a master data store, the data is not passed back to operational systems. It may be passed for further operations and to the data warehouse for reporting.

You will find this term commonly used in Data Management, Business Intelligence

Operational Database

Databases designed for managing dynamic data in real-time, supporting day-to-day operations of an organization with transactions, updates, and queries.

You will find this term commonly used in Database Management, Real-time Processing

Operational Efficiency

A measure of the efficiency of any operation, particularly in business, to convert input resources (such as labor and materials) into outputs like goods and services.

You will find this term commonly used in General IT, Business Management

Operational Excellence

A philosophy in the workplace where problem-solving, teamwork, and leadership results in ongoing improvement in an organization. In IT, it involves improving processes through technology and aligning IT services with business needs.

You will find this term commonly used in Business Management, General IT

Operational Risk Management (ORM)

The process of identifying, assessing, and controlling risks to an organization's earnings and capital arising from operational failures. In IT, this includes risks related to IT systems, data breaches, and cybersecurity threats.

You will find this term commonly used in Risk Management, IT Management

Operational Support Systems (OSS)

Computer systems used by telecommunications service providers to manage their networks (such as telephone networks). They support management functions such as network inventory, service provisioning, network configuration, and fault management.

You will find this term commonly used in Networking, Telecommunications

Operational Technology (OT)

Hardware and software that detects or causes a change through the direct monitoring and/or control of industrial equipment, assets, processes, and events.

You will find this term commonly used in Networking, Security

Operational Technology (OT) Security

The practice of securing industrial control systems (ICS), including systems in critical infrastructure, manufacturing, and other facilities, from physical and cyber threats.

You will find this term commonly used in Cybersecurity, Industrial Control

Operator

In programming, a symbol that represents a specific operation or process, such as addition (+), subtraction (-), or comparison (==).

You will find this term commonly used in Programming, Software Development

Operator Overloading

The process of making an operator to exhibit different behaviors in different instances, especially with respect to different data types.

You will find this term commonly used in Programming

Opt-in Email

Email that is sent to individuals who have specifically requested to receive it, a common practice in email marketing to ensure compliance with anti-spam laws.

You will find this term commonly used in Online Marketing, Compliance

Optical Character Reader (OCR)

Technology that recognizes text within a digital image. It is commonly used to recognize text in scanned documents and images.

You will find this term commonly used in AI, Document Management

Optical Character Recognition

Optical character recognition (OCR) is the process of converting images of text into machine-encoded text, allowing computers to recognize and extract text data from scanned documents, images, or other sources.

You will find this term commonly used in AI, Data Processing, Document Management

Optical Character Recognition (OCR)

The technology that enables computers to interpret and convert images of text into machine-readable text.

You will find this term commonly used in General IT

Optical Character Recognition (OCR) Technology

The mechanical or electronic conversion of images of typed, handwritten, or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo, or from subtitle text superimposed on an image.

You will find this term commonly used in AI, Document Management

Optical Character Verification (OCV)

The process of verifying that printed characters are legible and correctly formed by comparing them to a standard or template, often used in quality control processes.

You will find this term commonly used in AI, Quality Assurance

Optical Disc

A storage medium that uses a laser to read and write data on a reflective surface, such as CDs, DVDs, and Blu-ray discs.

You will find this term commonly used in Data Storage, Media, General IT

Optical Fiber

A type of high-speed transmission medium consisting of thin strands of glass or plastic that carry data using light signals.

You will find this term commonly used in Networking, Telecommunications, General IT

Optical Mark Recognition (OMR)

The process of capturing human-marked data from document forms such as surveys and tests. It is a method used to read questionnaires, multiple choice examination paper in the form of lines or shaded areas.

You will find this term commonly used in Data Processing, Education Technology

Optical Mouse

A computer pointing device that uses a light-emitting diode (LED) and optical sensor to detect movement on a surface.

You will find this term commonly used in Input Devices, Computer Peripherals, General IT

Optical Network

A type of data communication network built primarily on optical fiber technology, capable of delivering high-bandwidth connections over long distances.

You will find this term commonly used in Networking, Telecommunications

Optical Network Terminal (ONT)

A device that connects to the termination point of a provider's fiber optic network, serving as a modem to provide Internet service to a home or business.

You will find this term commonly used in Networking

Optical Networking

A communications network based on optical fibers for transmitting data using light signals.

You will find this term commonly used in Networking, Telecommunications, General IT

Optical Switching

The process of routing optical data signals without the need for converting them to electrical signals.

You will find this term commonly used in Networking, Telecommunications

Optical Turnstile

A physical security device that uses infrared beams, cameras, or other optical sensors to detect and manage pedestrian traffic flow in and out of a space without the need for a physical barrier.

You will find this term commonly used in Security, Physical Security Systems

Optical Zoom

In digital photography, the actual zoom achieved by physically adjusting the camera lens to change the focal length, thereby producing a magnified image without losing quality.

You will find this term commonly used in Hardware, Photography

Optimal Page Replacement Algorithm

An algorithm in computer science for page replacement in virtual memory systems, theoretically producing the lowest possible page fault rate. The algorithm replaces the page that will not be used for the longest period of time.

You will find this term commonly used in Operating Systems, Algorithms

Optimal Routing

The process of finding the most efficient route between nodes in a network, often used in the context of network traffic to minimize latency and maximize throughput.

You will find this term commonly used in Networking, Traffic Management

Optimization Algorithms

Algorithms designed to find the optimal solution or a near-optimal solution to computational problems within a reasonable time frame.

You will find this term commonly used in AI, Programming

What's Your
Career Path?
Network Security Analyst
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $59.99.

Add To Cart
AWS Cloud Practitioner
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
azure-administrator-career-path
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Specialist
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Career Path
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
CEH Career Path
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass