IT Glossary - A - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Asynchronous Learning Networks

Online learning environments that allow participants to engage with educational content and activities at their own pace, without the need for real-time interaction.

You will find this term commonly used in E-Learning, Education Technology

Asynchronous Messaging

Asynchronous Messaging refers to a communication method where messages are sent between parties without requiring the sender and receiver to be simultaneously active, facilitating decoupled communication processes in distributed systems.

You will find this term commonly used in Networking, Software Development

Asynchronous Replication

A data replication method where changes at the primary site are replicated to the secondary site without waiting for confirmation that each change has been received, suitable for disaster recovery over long distances.

You will find this term commonly used in Data Management, Disaster Recovery

Asynchronous System

A system in which operations are executed without requiring synchronization in time, allowing processes to operate independently and proceed at their own pace.

You will find this term commonly used in Computer Science, Networking

Asynchronous Transfer Mode (ATM)

ATM is a networking technology that organizes digital data into small, fixed-sized packets called cells and transmits them over a physical medium using digital signal technology, designed for high-speed broadband networks.

You will find this term commonly used in Networking, Telecommunicati

Asynchronous Video Interview

A recruiting tool that allows job candidates to record answers to interview questions at their convenience, without the need for real-time interaction with the interviewer, enabling flexible and scalable candidate screening.

You will find this term commonly used in Human Resources Technology, Recruitment

ATA (Advanced Technology Attachment)

ATA is an interface standard for connecting storage devices like hard drives and optical drives to a motherboard, known for its simplicity and reliability in data transfer.

You will find this term commonly used in Hardware, IT Infrastructure

ATM (Asynchronous Transfer Mode)

ATM is a networking technology that uses short, fixed-length packets called cells to transport data across networks, designed for high-performance multimedia networking.

You will find this term commonly used in Networking

Atomicity

In computing, atomicity refers to operations that are completed as a single unit of work, such that they are indivisible. This concept is crucial in database transactions and multi-threaded programming to ensure data integrity.

You will find this term commonly used in Database, Software Engineering

Attack Detection Algorithms

Attack Detection Algorithms are computational techniques used to identify patterns of malicious activity within networks or systems, aiming to promptly detect and mitigate potential security threats.

You will find this term commonly used in Security, Cybersecurity

Attack Pattern Recognition

The use of algorithms and machine learning to detect patterns in data that may indicate a cybersecurity threat or attack.

You will find this term commonly used in Cybersecurity, Data Analysis

Attack Signature

An Attack Signature is a pattern that identifies malicious or harmful behavior, such as a sequence of bytes in network traffic, or a series of commands known to be used by malware. It is used in intrusion detection systems to detect threats.

You will find this term commonly used in Security, Cybersecurity

Attack Surface Analysis

Attack Surface Analysis is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system or network that are accessible to attackers, used to strengthen cybersecurity measures.

You will find this term commonly used in Security, Cybersecurity

Attack Surface Reduction

Strategies and techniques used to minimize the ways an attacker can exploit a system or network, often involving the removal of unnecessary services, restricting access, and segmenting networks.

You will find this term commonly used in Cybersecurity, IT Infrastructure

Attack Vector

An Attack Vector is a method or pathway used by a hacker to access or penetrate the defense of a computer or network system to deliver a payload or malicious outcome.

You will find this term commonly used in Security, Cybersecurity

Attribute-Based Access Control (ABAC)

ABAC is a method of access control that decides access rights based on attributes associated with users, resources, and the environment, allowing for more flexible and fine-grained access control policies compared to role-based access control (RBAC).

You will find this term commonly used in Security, Cybersecurity

Audio Codec

An Audio Codec is a device or software that encodes or decodes audio data from one format to another, facilitating the compression and decompression of digital audio data for storage, transmission, and playback.

You will find this term commonly used in Multimedia, IT Infrastructure

Audio Streaming Technology

Audio Streaming Technology enables the real-time transmission and playback of audio content over the internet, allowing users to listen to music, podcasts, and other audio programs without the need for downloading files beforehand.

You will find this term commonly used in Multimedia, Web Development

Audio-Visual Speech Recognition

A technology that combines audio and visual data processing to improve the accuracy of speech recognition systems, particularly in noisy environments.

You will find this term commonly used in AI, Machine Learning

Augmented Analytics

Augmented Analytics uses machine learning and artificial intelligence to automate data analysis processes, making it easier for end-users to gain insights without deep expertise in data science.

You will find this term commonly used in AI, Data Analysis

Augmented Coding

Augmented Coding uses AI and machine learning to assist developers in writing code, suggesting improvements and automating repetitive tasks, thereby increasing efficiency and reducing errors in the software development process.

You will find this term commonly used in Software Development, AI

Augmented Coding Tools

Software tools that leverage AI and machine learning to assist developers in writing code, suggesting improvements, and automating repetitive tasks, thereby enhancing productivity and reducing the potential for errors.

You will find this term commonly used in Software Development, AI

Augmented Data Discovery

Augmented Data Discovery uses machine learning and natural language processing to enhance data analysis processes, making it easier for end users to discover significant patterns and insights in their data without deep technical expertise.

You will find this term commonly used in AI, Data Analysis

Augmented Data Management

The use of AI and machine learning technologies to enhance data quality, metadata management, and data integration processes in an organization.

You will find this term commonly used in Data Management, AI

Augmented Intelligence

The enhancement of human decision-making through AI technologies, emphasizing the assistive role of AI, rather than replacing human intelligence with artificial intelligence.

You will find this term commonly used in AI, Human-Computer Interaction

Augmented Query Processing

Enhancements in database management systems that use AI and machine learning to optimize query execution, improve performance, and provide insights, by dynamically adapting to changing data patterns and workloads.

You will find this term commonly used in Data Management, AI

Augmented Reality (AR)

AR is a technology that overlays digital information, such as images, videos, or sounds, onto the physical world, enhancing real-world environments and offering interactive experiences.

You will find this term commonly used in AI, General IT

Augmented Virtuality

Augmented Virtuality (AV) is the integration of real-world objects into virtual environments, creating a more immersive experience by blending physical elements with digital simulation, often seen in mixed reality scenarios.

You will find this term commonly used in Virtual Reality, Mixed Reality

Authentication

Authentication is the process of verifying the identity of a user or device, typically involving credentials like passwords, biometric data, or security tokens, crucial for ensuring secure access to systems and data.

You will find this term commonly used in Security, Cybersecurity

Authentication Factor

An Authentication Factor is a piece of information used to verify a user's identity before granting access to a system, which can include something the user knows (password), something the user has (token), or something the user is (biometric verification).

You will find this term commonly used in Security, Cybersecurity

Authentication Mechanism

An Authentication Mechanism is a method or system used to verify the identity of a user, device, or entity in a computer system, often involving passwords, biometric verification, or security tokens.

You will find this term commonly used in Security, Cybersecurity

Authentication Protocol

An Authentication Protocol is a system that defines how devices or systems prove their identity to each other across a network, ensuring secure communication.

You will find this term commonly used in Security, Cybersecurity

Authentication, Authorization, and Accounting (AAA)

A framework for mediating network access, enforcing policies, auditing usage, and providing the information necessary to bill for services, commonly used in telecommunications and computer networking.

You will find this term commonly used in Network Security, IT Infrastructure

Authorization

Authorization is the process of granting or denying rights to use specific resources or execute particular operations within a system, based on authenticated user or service identities.

You will find this term commonly used in Security, Cybersecurity

Autoencoder

An autoencoder is a type of artificial neural network used to learn efficient codings of unlabeled data, typically for the purpose of dimensionality reduction or feature learning.

You will find this term commonly used in AI, Machine Learning

Automated Business Process

The use of technology to perform complex business processes automatically, without human intervention, improving efficiency and accuracy.

You will find this term commonly used in Business Process Management, Automation

Automated Code Review

The use of software tools to automatically review and analyze code for potential errors, security vulnerabilities, or deviations from coding standards and best practices.

You will find this term commonly used in Software Development, QA

Automated Compliance Monitoring

The use of software tools to automatically track and report on compliance with regulations, standards, and policies, helping organizations ensure they meet legal and operational requirements.

You will find this term commonly used in Regulatory Compliance, IT Management

Automated Configuration Management

The use of software tools to automate the setup, deployment, and management of hardware and software configurations across an IT environment, ensuring consistency and compliance with defined standards and policies.

You will find this term commonly used in DevOps, IT Management

Automated Data Capture

The use of technologies such as OCR, barcodes, and RFID to automatically collect data from documents or items, reducing the need for manual entry and increasing data accuracy and efficiency.

You will find this term commonly used in Data Management, Automation

Automated Deployment

Automated Deployment refers to the process of automatically deploying software to a staging or production environment, reducing the need for human intervention and increasing the speed and reliability of software releases.

You will find this term commonly used in DevOps, Software Development

Automated Incident Response

The use of software to automatically detect, investigate, and respond to cybersecurity incidents with minimal human intervention.

You will find this term commonly used in Cybersecurity, IT Management

Automated Logic Verification

The use of automated tools to verify the correctness of logic circuits and designs in the field of electronics and computer engineering, ensuring that they meet specified requirements before fabrication.

You will find this term commonly used in Electronics, Computer Engineering

Automated Penetration Testing

The use of software tools and scripts to automatically identify and exploit vulnerabilities in networks and systems as a means of assessing the security posture of an IT infrastructure.

You will find this term commonly used in Cybersecurity, Testing

Automated Reasoning

Automated Reasoning is the area of computer science that is concerned with applying reasoning in the form of logic and mathematics by computers, enabling the solving of complex problems and proving theorems automatically.

You will find this term commonly used in AI, Computer Science

Automated Software Testing

Automated Software Testing involves using software tools to run tests on the software being developed automatically, without manual intervention, to improve efficiency and coverage of the test process.

You will find this term commonly used in Software Development, QA

Automated Software Testing Framework

A set of guidelines, tools, and practices for automating the process of software testing, aiming to reduce manual testing efforts, improve accuracy and consistency, and speed up the testing process.

You will find this term commonly used in Software Testing, DevOps

Automated System Recovery

A feature or process that automatically restores a system to a previous state or configuration after a failure or crash, minimizing downtime and data loss.

You will find this term commonly used in IT Operations, Disaster Recovery

Automated Threat Intelligence

The use of software tools and algorithms to collect, analyze, and manage data about potential security threats, helping organizations to proactively defend against cyber attacks.

You will find this term commonly used in Cybersecurity, Threat Intelligence

Autonomous Control Systems

Systems capable of operating independently of human control, often using AI and machine learning to make decisions and perform tasks based on environmental inputs.

You will find this term commonly used in Robotics, AI

What's Your
Career Path?
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass