A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
The division of a database into distinct, independent parts to improve manageability, performance, or availability.
You will find this term commonly used in General IT, Networking
A set of data processing elements connected in series, where the output of one element is the input of the next one.
You will find this term commonly used in General IT, AI
Guidelines that control access to and the usage of data stored digitally.
You will find this term commonly used in Security, General IT
The practice of aggregating data from different sources in order to build a larger set of data that can be analyzed or used for machine learning models.
You will find this term commonly used in AI, General IT
The ability to move data among different application programs, computing environments, or cloud services.
You will find this term commonly used in General IT, Security
The techniques applied to raw data to clean and prepare it for further analysis and modeling.
You will find this term commonly used in AI, General IT
The aspect of information technology that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
You will find this term commonly used in Security, Cybersecurity
The process of examining the data available from an existing information source and collecting statistics or informative summaries about that data.
You will find this term commonly used in General IT, AI
The rapid increase in the amount of data generated, which can lead to challenges in managing, storing, and analyzing data effectively.
You will find this term commonly used in General IT, AI
The process of distributing or spreading data from one or more sources to one or more destinations.
You will find this term commonly used in Networking, General IT
The documentation of the history of a dataset, including its origins and manipulation over time.
You will find this term commonly used in General IT, Security
The release of data, often in a structured format, to make it accessible for public use or scrutiny.
You will find this term commonly used in General IT, AI
The condition or degree of data integrity and accuracy, completeness, consistency, and reliability that meets the company or users' expectations.
You will find this term commonly used in General IT, AI
The process of controlling the quality of data in an organization to ensure it is accurate, complete, reliable, and relevant for its intended use.
You will find this term commonly used in General IT, AI
A request to access data from a database to extract specific information or make updates.
You will find this term commonly used in General IT
The process of streamlining data processes and resources to improve efficiency and reduce redundancy.
You will find this term commonly used in General IT, Business
The state of data being prepared and primed for use in analytics, operations, or decision-making processes.
You will find this term commonly used in General IT, AI
The process of ensuring that two sets of records or data sources are in agreement and accurate.
You will find this term commonly used in General IT, Finance
The process of salvaging inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media, or files.
You will find this term commonly used in Security, General IT
The process of editing or removing sensitive information from a document or record to protect privacy before it is shared or published.
You will find this term commonly used in Security, Cybersecurity
The strategy of decreasing the amount of data that needs to be stored, processed, or analyzed, either by eliminating redundancy, compressing data, or selecting only the most relevant parts of the data.
You will find this term commonly used in General IT, AI
The repetition of data within a database or a storage system to ensure consistency and reliability of data.
You will find this term commonly used in General IT, Networking
A process and set of tools that convert raw data into actionable insights through cleansing, enriching, and transforming data.
You will find this term commonly used in AI, General IT
A centralized location where metadata about data is stored and managed, often used to enhance discoverability and governance of data assets.
You will find this term commonly used in General IT, Security
Laws and guidelines that govern the collection, sharing, and use of data about individuals.
You will find this term commonly used in Security, Cybersecurity
The degree to which data is pertinent, connected, or applicable to a given context or action.
You will find this term commonly used in General IT, AI
The process of cleaning, organizing, and correcting data in databases to improve data quality and integrity.
You will find this term commonly used in General IT, AI
The process of copying data from one location to another to ensure consistency between redundant resources to improve reliability, fault-tolerance, or accessibility.
You will find this term commonly used in Networking, General IT
A general term used to refer to a destination designated for data storage.
You will find this term commonly used in General IT, Networking
The physical or geographical location of an organization's data or information.
You will find this term commonly used in Security, Cybersecurity
The comprehensive set of practices, processes, and policies used to manage data effectively across an organization.
You will find this term commonly used in General IT, Business
The policies that govern data preservation for compliance or business reasons.
You will find this term commonly used in Security, Cybersecurity
A policy that defines the duration for which an organization's data is to be retained and the process for disposing of data past its retention period.
You will find this term commonly used in Security, General IT
The legal and technical systems used to manage digital rights and permissions for digital media and data.
You will find this term commonly used in Security, Cybersecurity
The process of identifying, assessing, and mitigating risks associated with the storage, processing, and use of data.
You will find this term commonly used in Security, General IT
The process of aggregating detailed data into summary-level data for reporting and analysis purposes.
You will find this term commonly used in General IT, AI
The process of determining the best path for data to travel across a network from its source to its destination.
You will find this term commonly used in Networking, General IT
The process of permanently and irreversibly removing or destroying the data stored on a memory device to ensure that it is completely unrecoverable.
You will find this term commonly used in Security, Cybersecurity
The structure of a database described in a formal language supported by the database management system (DBMS), including how data is organized and how the relations among them are associated.
You will find this term commonly used in General IT
An interdisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data.
You will find this term commonly used in AI, General IT
Uses statistical analysis, machine learning, and data processing techniques to extract insights from data.
You will find this term commonly used in Data Science, AI
The process of amending or removing data in a database that is incorrect, incomplete, improperly formatted, or duplicated.
You will find this term commonly used in General IT, AI
Protecting data from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
You will find this term commonly used in Security, Cybersecurity
The process of dividing a database into distinct subsets of data for the purpose of analysis or operational use.
You will find this term commonly used in General IT, AI
The process of converting a data structure into a format that can be easily stored and retrieved.
You will find this term commonly used in General IT, AI
An architectural layer that provides centralized data access, manipulation, and business logic functions to applications and systems.
You will find this term commonly used in General IT, Networking
The practice of making data available to others, either within an organization or publicly, to support decision-making, research, and innovation.
You will find this term commonly used in General IT, AI
A repository of fixed data that remains under the control of one department and is isolated from the rest of the organization.
You will find this term commonly used in General IT, Networking
A technique used in data analysis to divide data into smaller, manageable segments for detailed analysis.
You will find this term commonly used in AI, General IT
The process of using an algorithm to remove noise from a data set, allowing important patterns to stand out.
You will find this term commonly used in AI, General IT
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.
Get ready for the updated 220-1201 & 220-1202 exams with our brand-new CompTIA A+ training—designed to help you pass with confidence and start your IT career strong. Access this course and over 2,900 hours of expert-led IT training when you sign up for any of our All-Access Passes. Don’t miss out—enroll now and start learning today!