IT Glossary - T - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

T-SQL (Transact-SQL)

A proprietary extension by Microsoft to SQL (Structured Query Language). T-SQL expands on the SQL standard to include procedural programming, local variables, and support for error handling.

You will find this term commonly used in Databases

Tableau

A visual analytics engine that makes it easier to create interactive and shareable dashboards.

You will find this term commonly used in Data Visualization, Business Intelligence

TACACS (Terminal Access Controller Access-Control System)

A protocol developed for the authentication, authorization, and accounting (AAA) services in network equipment. It allows a remote access server to communicate with an authentication server to determine if the user has access to the network.

You will find this term commonly used in Networking, Security

Tag Management System

A tool used in web development and digital marketing for managing the deployment of tags on a website without having to modify the code. Tags can include analytics, tracking, and marketing optimization scripts.

You will find this term commonly used in Web Development, Digital Marketing

Tailgating

An unauthorized person following an authorized person into a secured area, often by closely following them through a door intended for single-person access. It's a security breach that physical security measures aim to prevent.

You will find this term commonly used in Security, Physical Security

Taint Analysis

A form of static code analysis that checks if data from an untrusted source could flow into a security-sensitive location, without being sanitized. This technique is used to prevent vulnerabilities like SQL injection and cross-site scripting (XSS) in web applications.

You will find this term commonly used in Security, Software Development

Taint Checking

In programming, taint checking refers to the process of tracking the "taintedness" of inputs to a program or system, which helps in the detection and prevention of injection vulnerabilities.

You will find this term commonly used in Software Development, Security

Task Automation

The use of software to reduce the need for human intervention in the execution of tasks. Task automation is widely used in IT to streamline processes, reduce errors, and improve efficiency.

You will find this term commonly used in General IT, Productivity

TCO (Total Cost of Ownership)

An estimation of the expenses associated with purchasing, deploying, using, and retiring a product or piece of equipment. TCO is important in the IT industry for budgeting and decision-making processes.

You will find this term commonly used in General IT, Business Analysis

TCP Wrappers

A host-based networking ACL system, used to filter network access to Internet protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows the host to deny or allow access based on the service and originating IP address.

You will find this term commonly used in Networking, Security

TCP/IP

Transmission Control Protocol/Internet Protocol is the suite of communications protocols used to connect hosts on the Internet. It specifies how data is exchanged over the network.

You will find this term commonly used in Networking

TDD (Test-Driven Development)

A software development process that relies on the repetition of a very short development cycle: requirements are turned into very specific test cases, then the software is improved to pass the new tests, only.

You will find this term commonly used in Software Development

Teardown

In technology, a teardown is the process of disassembling a device to understand its internal components, build quality, and for educational purposes. It's also used in reverse engineering to analyze how a product works.

You will find this term commonly used in Hardware, Research & Development

Tech Stack

The set of technologies an organization uses to build a web or mobile application. It includes everything from programming languages and frameworks to servers, databases, and software development tools.

You will find this term commonly used in Software Development, Technology

Technical Debt

A concept in software development that reflects the implied cost of additional rework caused by choosing an easy solution now instead of using a better approach that would take longer.

You will find this term commonly used in Software Development

Technical Support Engineer

Offers support to customers experiencing technical problems with hardware or software, providing solutions and troubleshooting tips.

You will find this term commonly used in Customer Support, IT Services

Technical Writer

Produces documentation that helps users understand and effectively use product or system capabilities.

You will find this term commonly used in Documentation, Communication

Technology Stack

The set of technologies an organization uses to build a web or mobile application. It includes the programming languages, frameworks, database management systems, and tools that developers use to create the application.

You will find this term commonly used in Software Development, Web Development

Telematics

The branch of information technology that deals with the long-distance transmission of computerized information. It is often used in the context of automotive technologies like GPS navigation and automated driving systems.

You will find this term commonly used in Networking, Automotive Technology

Telemetry

An automated communications process by which measurements and other data are collected at remote or inaccessible points and transmitted to receiving equipment for monitoring.

You will find this term commonly used in Networking, General IT

Telemetry Data

Data that is collected remotely and automatically sent back to receiving equipment for monitoring. Telemetry data is widely used in IT for monitoring network performance, application performance, and system health.

You will find this term commonly used in Networking, Performance Monitoring

Telnet

A network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

You will find this term commonly used in Networking

Template

In software development, a template is a generic class or other unit of source code that can be used as the basis for unique units of code. It supports the reuse of software architecture.

You will find this term commonly used in Software Development

Temporal Database

A database that manages time-sensitive data. It records not only the current state of data like conventional databases but also historical data, allowing for queries over time.

You will find this term commonly used in Databases

TensorFlow

An open-source software library for dataflow and differentiable programming across a range of tasks. It is a symbolic math library, and is also used for machine learning applications such as neural networks.

You will find this term commonly used in AI, Machine Learning

TensorFlow Lite

A lightweight version of Google's TensorFlow open-source library for machine learning, designed for mobile and edge devices. It enables on-device machine learning inference with low latency and a small binary size.

You will find this term commonly used in AI, Machine Learning

Terabyte (TB)

A unit of digital information storage equal to approximately one trillion bytes or 2^40 bytes. Terabytes are commonly used to measure storage capacity in devices like hard drives and solid-state drives.

You will find this term commonly used in General IT

Teraflops

A unit of computing speed equal to one trillion floating point operations per second. It's often used to measure the computational power of supercomputers and high-performance computing systems.

You will find this term commonly used in General IT, High-Performance Computing

Ternary Operator

A conditional operator in programming that takes three arguments. The first argument is a comparison argument; the second and third arguments are the outcomes, depending on the result of the comparison.

You will find this term commonly used in Software Development

Ternary Search

An algorithm that divides the search space into three parts and finds the desired index or position of a key value.

You will find this term commonly used in Algorithms

Ternary Search Tree

A type of trie (prefix tree) where nodes are arranged in a manner that allows for efficient searches, insertions, and deletions of strings.

You will find this term commonly used in Data Structures

Terraform

An open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files.

You will find this term commonly used in Cloud Computing

Terraform Cloud

A cloud service by HashiCorp that provides teams with a shared space to collaboratively manage Terraform configurations, workspaces, variables, and state files.

You will find this term commonly used in Cloud Computing

Terraform Enterprise

An on-premises distribution of Terraform, designed for use by large enterprises. It adds collaboration and governance features to the open-source Terraform tool, enabling teams to safely and efficiently manage their infrastructure as code.

You will find this term commonly used in Cloud Computing, Infrastructure as Code

Terraform Provider

In Terraform, a provider is a plugin that allows Terraform to interact with cloud providers, SaaS providers, and other APIs to manage external resources as part of its infrastructure as code approach.

You will find this term commonly used in Cloud Computing

Test Automation

The use of software to control the execution of tests, the comparison of actual outcomes to predicted outcomes, the setting up of test preconditions, and other test control and test reporting functions.

You will find this term commonly used in Software Development, QA

Test Fixture

A fixed state of a set of objects used as a baseline for running tests in software development. The purpose of a test fixture is to ensure that there is a well-known and fixed environment in which tests are run so that results are repeatable.

You will find this term commonly used in Software Development, QA

Tethering

The practice of using a mobile device as a mobile hotspot. When tethering is enabled, the device shares its internet connection with other devices connected to it via Wi-Fi, Bluetooth, or USB.

You will find this term commonly used in Networking, Mobile Computing

Text Encoding

The process of converting text into a sequence of bytes. Encoding schemes such as ASCII, UTF-8, and UTF-16 are used to represent character sets in computers.

You will find this term commonly used in Software Development, General IT

Text Mining

The process of deriving high-quality information from text. It involves the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources.

You will find this term commonly used in AI, Machine Learning

Text-to-Speech (TTS)

A form of speech synthesis that converts text into spoken voice output. TTS systems are used in various applications, including assistive technologies for the visually impaired, navigation systems, and more.

You will find this term commonly used in AI, Accessibility

TFTP (Trivial File Transfer Protocol)

A simple, lockstep, File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network.

You will find this term commonly used in Networking

Thermal Design Power (TDP)

The maximum amount of heat generated by a computer chip or component (such as a CPU, GPU, or system on a chip) that the cooling system in a computer is designed to dissipate under any workload.

You will find this term commonly used in Hardware, Computing

Thin Client

A lightweight computer that is purpose-built for remote access to a server (typically cloud or desktop virtualization environments). It depends heavily on another computer to fulfill its computational roles.

You will find this term commonly used in Networking, Cloud Computing

Thin Film Transistor (TFT)

A type of technology used in displays, including LCDs, where each pixel is controlled by one to four transistors. It's known for high image quality and is used in a wide range of devices, from monitors and TVs to mobile phones and tablets.

You will find this term commonly used in Hardware, Displays

Thin Provisioning

A method of optimizing the efficiency of available space in storage area networks and virtual environments by allocating disk storage space in a flexible manner among multiple users.

You will find this term commonly used in Storage, Virtualization

Thread

The smallest sequence of programmed instructions that can be managed independently by a scheduler. In the context of programming, it refers to the execution of concurrent operations within a single process.

You will find this term commonly used in Software Development

Thread (in IoT)

A low-power, wireless networking protocol designed specifically for home automation. It is based on IPv6 and enables devices to connect directly to the internet, facilitating device-to-device and device-to-cloud communication in the Internet of Things.

You will find this term commonly used in Networking, IoT

Thread Pool

A pool of threads that can be reused for executing tasks, which is more efficient than creating and destroying threads for each task.

You will find this term commonly used in Software Development

Threading

The process of allowing a program to run multiple operations concurrently in the same process space.

You will find this term commonly used in Programming/Software Development

What's Your
Career Path?
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass