IT Glossary - B - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Broadband

A high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously. Broadband is widely used for internet connections and telecommunications.

You will find this term commonly used in Networking, General IT

Broadband Amplification

The process of increasing the bandwidth of a signal by using amplifiers. It's used in telecommunications to enhance the signal strength over long distances or in wireless communication.

You will find this term commonly used in Telecommunications, Networking

Broadband Over Fiber (BoF)

The delivery of broadband internet access via optical fiber directly to the home or business, offering high-speed data transmission and significant bandwidth capacity over long distances.

You will find this term commonly used in Networking, Telecommunications

Broadband over Powerlines (BPL)

A technology that allows Internet data transmission over the electrical power lines. BPL provides an alternative means of accessing Internet services without requiring new infrastructure separate from the existing electrical distribution network.

You will find this term commonly used in Networking, Internet Access

Broadband Wireless Access (BWA)

A technology that provides high-speed internet access over a wireless connection. BWA can be delivered through various wireless technologies, including Wi-Fi, WiMAX, and LTE, offering an alternative to wired broadband solutions, particularly in areas where cable or DSL is not feasible.

You will find this term commonly used in Networking, Internet Technology

Broadcast Address

A network address at which all devices connected to a multiple-access communications network are enabled to receive datagrams. Broadcast addresses are used in broadcasting messages to all network devices.

You will find this term commonly used in Networking, Data Communication

Broadcast Domain

A network segment in which if any device sends a broadcast (a packet destined for all devices), all the devices in the network segment receive it. Broadcast domains are typically bounded by routers since routers do not forward broadcast traffic.

You will find this term commonly used in Networking

Broadcast Encryption

A cryptographic method that allows the secure transmission of data to multiple recipients, ensuring that only authorized users can decrypt the broadcasted content.

You will find this term commonly used in Cryptography, Security

Broken Authentication

A security vulnerability in which an attacker can exploit flaws in the authentication mechanism of a web application or system, allowing unauthorized access to sensitive information or user accounts.

You will find this term commonly used in Cybersecurity, Web Development

Broker Protocol

In networking, a protocol that allows for the intermediary processing of data and transactions between different systems or devices. Broker protocols are often used in messaging systems and IoT applications to facilitate communication and data exchange.

You will find this term commonly used in Networking, IoT

Brouter

A network device that functions as both a bridge and a router, which can forward data between networks (as a router) and within a network (as a bridge). Brouters are used in complex networks to efficiently manage traffic and connect different network segments.

You will find this term commonly used in Networking, Infrastructure

Browser

A browser is software that accesses and displays pages and information on the web. It serves as the user's window to the internet, translating data from web servers into visual and interactive content on the user's device.

You will find this term commonly used in Software, General IT

Browser Compatibility

The ability of a website or web application to function across different web browsers with the same level of performance and visual accuracy. Browser compatibility is crucial for ensuring that all users have a consistent experience, regardless of their choice of browser.

You will find this term commonly used in Web Development, UX/UI Design

Browser Extension

A small software module for customizing a web browser. Extensions can enhance the browser's functionality, add new features, or increase user productivity by modifying the browsing experience.

You will find this term commonly used in Software, Web Development

Browser Extension Development

The creation of software modules that add specific features or functionalities to web browsers, enhancing the user experience by providing customized browsing capabilities, content management, or additional security.

You will find this term commonly used in Software Development, Web Technology

Browser Fingerprinting

A technique used by websites to collect information about a visitor's browser settings and system specifications. This information can uniquely identify visitors, even in the absence of cookies or other tracking methods.

You will find this term commonly used in Web Development, Security

Browser Optimization

Techniques and practices aimed at enhancing the performance and speed of web browsers. This includes managing cache, cookies, and extensions to improve loading times and efficiency.

You will find this term commonly used in Web Development, Performance Optimization

Browser Sandbox

An isolated environment within a web browser designed to run scripts and display content without affecting the rest of the system. This security mechanism helps protect against malicious code and software vulnerabilities.

You will find this term commonly used in Cybersecurity, Web Browsers

Brute Force Attack

A trial-and-error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort rather than employing intellectual strategies. It's a common attack vector in cybersecurity.

You will find this term commonly used in Security, Cybersecurity

Brute Force Method

A trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In cryptography, a brute force attack tries every possible key combination until the correct key is found.

You will find this term commonly used in Cybersecurity, Cryptography

Brute Force Search

An exhaustive search method that systematically enumerates all possible candidates for the solution and checks whether each candidate satisfies the problem's statement.

You will find this term commonly used in Algorithms, Cybersecurity

Buffer

In computer science, a buffer is a region of physical memory storage used to temporarily store data while it is being moved from one place to another, typically in the case of I/O operations. It helps in managing data that comes in at a different rate than it's being processed.

You will find this term commonly used in Software Development, Hardware

Buffer Cache

A memory storage area that temporarily holds data being read from or written to a disk, reducing the number of disk reads and writes. This improves system performance by minimizing the time-consuming disk I/O operations.

You will find this term commonly used in Hardware, Software Development

Buffer Overflow

A programming error occurring when more data is written to a buffer than it can hold. This can lead to crashes, vulnerabilities, and security breaches, as it may allow attackers to overwrite memory locations of a program.

You will find this term commonly used in Cybersecurity, Software Development

Buffer Overflow Attack

An attack that exploits a buffer overflow vulnerability in software. By sending more data to a buffer than it can handle, an attacker can overwrite adjacent memory space, potentially allowing arbitrary code execution or causing a system crash. Buffer overflow attacks are a common target for cybersecurity measures.

You will find this term commonly used in Cybersecurity, Software Development

Buffer Overflow Protection

Security features or techniques that detect and prevent buffer overflow attacks, which can lead to unauthorized access or execution of malicious code.

You will find this term commonly used in Cybersecurity, Software Development

Buffer Underflow

A situation in which a program attempts to read more data from a buffer than it contains. This is the opposite of a buffer overflow and can lead to errors or unexpected behavior in software applications.

You will find this term commonly used in Software Development

Bug

In software development, a bug is an error, flaw, or fault in a program that causes it to produce incorrect or unexpected results, or to behave in unintended ways. The process of identifying and removing bugs is known as debugging.

You will find this term commonly used in Software Development, General IT

Bug Bounty Program

A deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities.

You will find this term commonly used in Cybersecurity, Software Development

Bug Fix

The process of identifying, isolating, and correcting faults in software code that cause it to produce incorrect or unexpected results, or to behave in unintended ways. Bug fixes improve the stability and performance of software.

You will find this term commonly used in Software Development

Bug Reporting Tool

Software that allows users to report software bugs encountered while using an application. These tools often integrate with development and project management tools to streamline the process of tracking and fixing bugs.

You will find this term commonly used in Software Development, Quality Assurance

Bug Tracking System

Software that keeps track of reported software bugs in software development projects. It might be regarded as a type of issue tracking system, allowing developers to efficiently manage and rectify bugs, ensuring the quality and reliability of the software.

You will find this term commonly used in Software Development, General IT

Build

In software development, a build is a process that converts code and other project files into a software product in a runnable state, potentially automatable, involving compilation, testing, and packaging of the software.

You will find this term commonly used in Software Development

Build Automation

The process of automating the creation of a software build and the associated processes including compiling computer source code into binary code, packaging binary code, and running automated tests.

You will find this term commonly used in Software Development

Build Automation Tools

Tools used in software development to automate common tasks such as compilation, package assembly, testing, and deployment, thereby improving efficiency and consistency.

You will find this term commonly used in Software Development, DevOps

Build Pipeline

A set of automated processes used in software development to compile code, run tests, and deploy software in a structured manner. Build pipelines facilitate continuous integration and continuous delivery (CI/CD) practices, enabling faster and more reliable software releases.

You will find this term commonly used in Software Development, DevOps

Build Server

A dedicated computer, server, or service within a network that compiles source code into binary code, runs tests, and produces software packages that are ready for deployment. Build servers are key components of continuous integration and delivery pipelines.

You will find this term commonly used in Software Development

Build System

A collection of tools and scripts used for automating the process of compiling source code into binary code. Build systems simplify the process of building large and complex software projects.

You will find this term commonly used in Software Development, DevOps

Build Tool

Software that automates the creation of executable applications from source code. Build tools compile source code, link libraries, and perform tasks such as testing, packaging, and deployment to streamline the development process.

You will find this term commonly used in Software Development, DevOps

Bulk Data Processing

The handling, analysis, and manipulation of large volumes of data simultaneously, typically used in big data applications, data warehousing, and batch processing scenarios.

You will find this term commonly used in Data Management, Big Data

Bulk Data Transfer

The process of moving large volumes of data from one storage location to another, often used in data warehousing, backup, and recovery operations. Bulk data transfer mechanisms are designed to optimize the speed and efficiency of data movement while minimizing impact on network resources.

You will find this term commonly used in Data Management, Networking

Business Analyst

Works with organizations to analyze business processes, identify IT solutions to improve efficiency, and manage project implementations.

You will find this term commonly used in Business Strategy, IT Solutions

Business Analytics

The practice of iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis. Business analytics is used by companies committed to data-driven decision-making.

You will find this term commonly used in Data Analysis, Business Management

Business Analytics Software

Software tools and applications designed to analyze business data to extract insights and support decision-making. Business analytics software utilizes data mining, statistical analysis, and predictive modeling to help businesses understand performance and plan strategies.

You will find this term commonly used in Data Analysis, Business Management

Business Capability Analysis

A method for identifying and evaluating the key activities that a business performs to achieve its objectives and deliver value. It helps in understanding organizational strengths and areas for improvement.

You will find this term commonly used in Business Management, Strategy Planning

Business Capability Mapping

A technique used in enterprise architecture and business strategy to visualize and assess the alignment of an organization's capabilities with its business goals and objectives.

You will find this term commonly used in Business Management, Strategy

Business Continuity and Disaster Recovery (BCDR)

The processes and procedures that an organization puts in place to ensure that essential functions can continue during and after a disaster has occurred, as well as the methods to recover from it.

You will find this term commonly used in General IT, Security

Business Continuity Management (BCM)

A framework for identifying an organization's risk of exposure to internal and external threats. The goal of BCM is to provide the organization with the ability to effectively respond to threats such as natural disasters or data breaches and protect the business interests of the organization.

You will find this term commonly used in General IT, Security

Business Continuity Planning (BCP)

The process of creating systems of prevention and recovery to deal with potential threats to a company. BCP ensures that personnel and assets are protected and able to function quickly in the event of a disaster.

You will find this term commonly used in General IT, Security

Business Continuity Software

Software designed to assist organizations in planning and executing their business continuity and disaster recovery plans. It ensures operational resilience in the face of disruptions.

You will find this term commonly used in IT Management, Security

What's Your
Career Path?
Python Programming Course

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
9 Hrs 24 Min
icons8-video-camera-58
33 On-demand Videos

$49.00

Add To Cart
Microsoft 70-461: Querying SQL Server

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 22 Min
icons8-video-camera-58
84 On-demand Videos

$49.00

Add To Cart
Adobe InDesign Training Course

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 0 Min
icons8-video-camera-58
48 On-demand Videos

$49.00

Add To Cart
Microsoft 70-462: Administering SQL Server Databases

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
8 Hrs 24 Min
icons8-video-camera-58
62 On-demand Videos

$49.00

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Querying SQL Server With T-SQL – Master The SQL Syntax

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
10 Hrs 6 Min
icons8-video-camera-58
67 On-demand Videos

$49.00

Add To Cart
CompTIA Secure Infrastructure Specialist (CSIS)

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
108 Hrs 20 Min
icons8-video-camera-58
489 On-demand Videos

$59.00

Add To Cart
Cisco CCNP Enterprise – 350-401 ENCOR Training Course

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
8 Hrs 10 Min
icons8-video-camera-58
47 On-demand Videos

$49.00

Add To Cart
Social Media

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
9 Hrs 46 Min
icons8-video-camera-58
139 On-demand Videos

$49.00

Add To Cart
Microsoft 70-487: Developing Microsoft Azure and Web Services

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
15 Hrs 30 Min
icons8-video-camera-58
58 On-demand Videos

$49.00

Add To Cart
Microsoft 70-463: Implementing a Data Warehouse

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
6 Hrs 56 Min
icons8-video-camera-58
69 On-demand Videos

$49.00

Add To Cart
Azure Training Series – 3 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 44 Min
icons8-video-camera-58
152 On-demand Videos

Original price was: $99.00.Current price is: $47.50.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass