IT Glossary - E - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

E-commerce

E-commerce refers to the buying and selling of goods or services using the internet. It encompasses a range of online business activities for products and services and also includes the electronic transfer of funds. E-commerce has transformed retail, enabling digital transactions, and is integral to business strategy in the digital age.

You will find this term commonly used in General IT, Business

E-Government

The use of digital tools and systems by governmental bodies to provide public services, improve efficiency, and facilitate communication between government and citizens, businesses, and other branches of government.

You will find this term commonly used in Government Technology, Digital Transformation

Eavesdropping Attack

A network attack where unauthorized persons intercept private communications between two parties without their consent. Eavesdropping is commonly used to gather information that can be used for malicious purposes.

You will find this term commonly used in Cybersecurity

EC-Council (International Council of Electronic Commerce Consultants)

Offers certifications in areas of ethical hacking, penetration testing, and cybersecurity, including the Certified Ethical Hacker (CEH).

You will find this term commonly used in Cybersecurity, Ethical Hacking

EC-Council Certified Security Analyst (ECSA)

Goes beyond hacking techniques and into the analytical phase of ethical hacking, focusing on penetration testing methodology.

You will find this term commonly used in Cybersecurity, Ethical Hacking

ECC (Error Correction Code)

A method of detecting and correcting errors in data memory or transmission. It is used in various forms of digital communication and storage to ensure data integrity.

You will find this term commonly used in Security, Networking

ECC Memory (Error-Correcting Code Memory)

A type of computer data storage that can detect and correct the most common kinds of internal data corruption.

You will find this term commonly used in Hardware

Edge AI

The use of artificial intelligence algorithms processed locally on a hardware device at the edge of the network without requiring connection to a cloud or central system. It enables real-time operations including data creation, decision making, and actions.

You will find this term commonly used in AI, IoT

Edge Computing

Edge computing refers to the practice of processing data near the edge of your network, where the data is being generated, instead of in a centralized data-processing warehouse. This decentralization reduces latency and bandwidth use, making it ideal for IoT, autonomous vehicles, and other real-time applications.

You will find this term commonly used in Networking, IoT

Edge Data Management

The process of managing data that is generated and processed at the edge of the network, close to the source of data generation, to improve response times and reduce bandwidth consumption on the network.

You will find this term commonly used in Data Management, IoT

Edge Device

A device that provides an entry point into enterprise or service provider core networks. Examples include routers, routing switches, integrated access devices (IADs), and multiplexers.

You will find this term commonly used in Networking

Edge Router

An edge router is a router that interfaces with an autonomous system or network at the edge or boundary of another network. In a home network, for example, the edge router connects the internal network with the internet. In enterprise networks, these routers serve as the gateway to the wider internet or other WANs.

You will find this term commonly used in Networking

Edge Security

Security measures designed to protect the edge of the network, where an enterprise or organization connects to the outside world. This includes devices and technologies at the boundary of networks that manage data flow and protect against external threats.

You will find this term commonly used in Security, Networking

Edge Service Gateway

A network device that provides an entry point into a service provider's core network from an external network, typically offering security, routing, and translation services between different network types.

You will find this term commonly used in Networking, Security

EDI Standards (Electronic Data Interchange Standards)

Rules that define the structure and format of business documents for electronic transmission between organizations. Common standards include EDIFACT, X12, and XML.

You will find this term commonly used in Data Management, E-commerce

EF Core (Entity Framework Core)

A lightweight, extensible, open-source, and cross-platform version of Entity Framework, a popular data access technology in .NET applications.

You will find this term commonly used in Software Development

Egress Filtering

A security measure that monitors and restricts outbound traffic from one network to another to prevent unauthorized data exfiltration and ensure that outgoing traffic is legitimate.

You will find this term commonly used in Security, Networking

EIGRP (Enhanced Interior Gateway Routing Protocol)

A network protocol that lets routers exchange information more efficiently than with earlier network protocols. It is used on a router to share routes with other routers within the same autonomous system.

You will find this term commonly used in Networking

Elastic Computing

Refers to the ability of computing resources to be scaled up or down easily, usually in a cloud computing environment. It allows for the efficient management of variable workloads.

You will find this term commonly used in Cloud Computing

Elastic IP

In cloud computing, an Elastic IP address (EIP) is a static IPv4 address offered by cloud providers for dynamic cloud computing. An Elastic IP can be associated with any instance in a user's account and moved from one instance to another.

You will find this term commonly used in Cloud Computing, Networking

Elastic Load Balancing

Elastic Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. It can handle the varying load of your application traffic in a single Availability Zone or across multiple Availability Zones.

You will find this term commonly used in Cloud Computing, Networking

Elastic Search

A distributed, RESTful search and analytics engine capable of solving a growing number of use cases. It allows for efficient data indexing and search capabilities across diverse types of documents.

You will find this term commonly used in Data Management, Search Technologies

Elasticity (in Cloud Computing)

In cloud computing, elasticity refers to the ability of a system to automatically provision and deprovision computing resources to match the required workload. This concept is fundamental in cloud services, enabling them to offer on-demand resources and scalable services.

You will find this term commonly used in Cloud Computing

Elasticsearch

Elasticsearch is a search engine based on the Lucene library, providing a distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents. It is designed to handle large volumes of data and complex search requirements, widely used in log and event data analysis, real-time application monitoring, and full-text search functionalities.

You will find this term commonly used in Data Management, Analytics

Elasticsearch Query DSL

Elasticsearch Query DSL is a powerful and flexible query language used in Elasticsearch to define complex search queries. It allows for fine-tuned searches and aggregations, providing ways to query for detailed, precise patterns in data.

You will find this term commonly used in Data Management, Analytics

Electromagnetic Interference (EMI)

Disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction. It can degrade the performance of the circuit or even stop it from functioning.

You will find this term commonly used in Hardware, Electronics

Electronic Bill Presentment and Payment (EBPP)

An online system that allows customers to receive and pay bills electronically, eliminating the need for paper bills and checks.

You will find this term commonly used in E-commerce, Financial Technology

Electronic Component

A basic discrete device or physical entity in an electronic system used to affect electrons or their associated fields. Common examples include transistors, diodes, and integrated circuits.

You will find this term commonly used in Hardware, Electronics

Electronic Data Interchange (EDI)

Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper. It is used to transmit documents like invoices and purchase orders between companies.

You will find this term commonly used in Business, Data Management

Electronic Data Processing (EDP)

The use of automated methods to process digital data. This includes the collection, storage, processing, distribution, and analysis of electronic data. EDP systems are used in various sectors for efficient data handling.

You will find this term commonly used in Data Management

Electronic Design Automation (EDA)

Software tools used for designing electronic systems such as printed circuit boards and integrated circuits. EDA tools are essential for modern electronics development.

You will find this term commonly used in Software Development, Electronics

Electronic Discovery (eDiscovery)

The process by which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. eDiscovery can be carried out offline on a particular computer or in an active network environment.

You will find this term commonly used in Legal, IT Management

Electronic Funds Transfer (EFT)

The electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, through computer-based systems.

You will find this term commonly used in General IT, E-commerce

Electronic Health Records (EHR)

Digital versions of patients' paper charts. EHRs are real-time, patient-centered records that make information available instantly and securely to authorized users.

You will find this term commonly used in Healthcare IT, Data Management

Electronic Key Management System (EKMS)

A system designed to manage electronic keys that encrypt and decrypt information, ensuring that sensitive data remains secure from unauthorized access during transmission and storage.

You will find this term commonly used in Cybersecurity, Data Security

Electronic Paper Display (EPD)

A display technology designed to mimic the appearance of ordinary ink on paper. Unlike traditional displays, EPDs reflect light like paper, making them more comfortable to read over long periods and visible under direct light.

You will find this term commonly used in Hardware, Mobile Devices

Electronic Signature

A digital form of a signature that can be used to consent or approve documents and transactions electronically, carrying the same legal standing as a handwritten signature.

You will find this term commonly used in Security, General IT

Electronic Signature (E-Signature)

A digital form of a signature that can legally substitute a handwritten signature in virtually all personal or business processes, enabling the electronic signing of documents over the internet.

You will find this term commonly used in Digital Transactions, Cybersecurity

Electronic Voting System

A system that uses electronic means to aid in casting and counting votes, aiming to increase the efficiency of election processes and reduce the likelihood of errors or fraud. Often involves the use of dedicated voting machines or online voting platforms.

You will find this term commonly used in Government Technology, Security

Element

In web development, an element is an individual component of the HTML or XML document. Elements form the building blocks of both documents and applications.

You will find this term commonly used in Web Development

Element Query

In web development, a method or process of selecting specific elements from a webpage or document object model (DOM) using selectors, typically used in conjunction with JavaScript or other scripting languages.

You will find this term commonly used in Web Development

Elliptic Curve Cryptography (ECC)

A type of public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows for smaller keys compared to non-ECC cryptography (like RSA) to provide equivalent security.

You will find this term commonly used in Cryptography, Cybersecurity

Email

A method of exchanging digital messages over the Internet. It is one of the earliest and most widely used forms of digital communication.

You will find this term commonly used in General IT

Email Archiving

The process of preserving and making searchable all emails sent and received by an individual or organization. Email archiving solutions help in data management, legal compliance, and storage management.

You will find this term commonly used in IT Management, Compliance

Email Bounce Handling

The process of managing email messages that have been returned as undeliverable to the sender. Bounce handling is essential for maintaining the health and deliverability of email marketing campaigns.

You will find this term commonly used in Digital Marketing, IT Management

Email Encryption

The process of encoding email messages to protect the content from being read by unintended recipients. Email encryption often involves encrypting both the message itself and any attachments.

You will find this term commonly used in Security, Cybersecurity

Email Filtering

The process of organizing email according to specified criteria. It can involve managing incoming emails to sort out spam, phishing attempts, or to prioritize messages based on sender, subject, or other headers.

You will find this term commonly used in Cybersecurity, Productivity

Email Gateway

A device or software used to monitor and manage the emails going in and out of an organization, often used for security purposes to filter out spam, phishing emails, and to enforce company policies regarding email content.

You will find this term commonly used in Cybersecurity, IT Management

Email Phishing

A cyber-attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need and then clicking a link or downloading an attachment.

You will find this term commonly used in Security, Cybersecurity

Email Spoofing

Email spoofing involves the creation of email messages with a forged sender address, often used in phishing and spam campaigns. This technique is used to trick recipients into thinking the message is from someone they trust, inducing them to divulge confidential information or click on malicious links.

You will find this term commonly used in Security, Cybersecurity

What's Your
Career Path?
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass