IT Glossary - E - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Embedded Analytics

The integration of analytical capabilities and data visualizations within a software application, providing users with relevant insights and analytics directly within their usual applications.

You will find this term commonly used in Data Analysis, Software Development

Embedded Database

A database system that is tightly integrated with an application software, providing full database functionality without the need for separate database servers.

You will find this term commonly used in Software Development, Data Management

Embedded Firmware

Software that provides low-level control for the device's specific hardware. Embedded firmware exists on devices such as routers, embedded systems, or IoT devices, and can be updated to fix bugs or add new features.

You will find this term commonly used in Embedded Systems, Hardware

Embedded Font

A font file that is embedded into a digital document or webpage, ensuring that the text is displayed in the intended font regardless of whether the font is installed on the local machine.

You will find this term commonly used in Web Development, Digital Publishing

Embedded Java

A subset of Java programming designed for embedded systems—devices with a dedicated function within a larger mechanical or electrical system. It allows these devices to run Java applications.

You will find this term commonly used in Software Development, Hardware

Embedded Linux

A version of the Linux operating system designed to be used in embedded systems such as smartphones, tablets, personal digital assistants, and more. It provides a free and open-source alternative for embedded systems development.

You will find this term commonly used in Software Development, Embedded Systems

Embedded Operating System

A specialized OS designed to manage computer hardware resources and provide minimal user interface typically for devices not considered traditionally as computers, like appliances and vehicles.

You will find this term commonly used in Software Development, Hardware

Embedded Operating System (OS)

A specialized OS designed to operate on embedded systems, devices designed to perform a dedicated function or functions. Embedded OSes are optimized for performance, resource usage, and reliability within constrained environments.

You will find this term commonly used in Embedded Systems, Software Development

Embedded Scripting Language

A programming language that is used within a larger application to provide flexible scripting or automation capabilities. Examples include Lua in game development or VBA in Microsoft Office applications.

You will find this term commonly used in Software Development, Application Development

Embedded Software

Software written to control machines or devices that are not typically thought of as computers, integrating software and hardware in special-purpose systems.

You will find this term commonly used in Software Development

Embedded SQL

SQL code that is inserted into a code written in another programming language, such as C or Java. This allows for the execution of SQL queries and commands from within the programming language.

You will find this term commonly used in Software Development, Data Management

Embedded System

An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electrical system. It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts.

You will find this term commonly used in General IT, Hardware

Embedded System Security

The protection of embedded systems, which are computing systems with a dedicated function within a larger mechanical or electrical system, against unauthorized access and malicious attacks.

You will find this term commonly used in Security, Cybersecurity, Hardware

Embedded Systems

Special-purpose computer systems designed to perform dedicated functions within a larger system. Embedded systems are everywhere, from household appliances to medical devices and industrial machinery.

You will find this term commonly used in Hardware, Software Engineering

Emoji Domain

A domain name that contains emoji characters. These domains are part of an effort to increase the amount of available web addresses and provide a more visually engaging user experience.

You will find this term commonly used in Web Development, Digital Media

Emotet

A type of malware originally designed as a banking Trojan aimed at stealing financial data. It has evolved to become a major threat, acting as a delivery mechanism for other malware.

You will find this term commonly used in Security, Cybersecurity

Emoticon

A textual expression used to represent the writer's mood or facial expressions. Emoticons are precursors to emojis and are created using keyboard characters, such as 🙂 for a smile.

You will find this term commonly used in Digital Communication, Social Media

Emulation

The technique of mimicking the behavior of one computer/system on a different system by duplicating its functions. Emulation allows running software applications on non-native platforms.

You will find this term commonly used in General IT, Software Development

Emulation Software

Software that allows one computer system (the host) to behave like another computer system (the guest). It is primarily used for running software applications on platforms for which they were not originally intended.

You will find this term commonly used in Software Development, General IT

Emulator

An emulator is a hardware or software that enables one computer system (called the host) to behave like another computer system (called the guest). Emulators are used to run software specifically designed for the guest system on a different platform than originally intended.

You will find this term commonly used in Software Development, General IT

Encapsulation

In object-oriented programming, the bundling of data with the methods that operate on that data, or the restriction of direct access to some of an object's components.

You will find this term commonly used in Software Development

Encapsulation in Networking

A networking technique in which a protocol message packet is wrapped or enclosed in another message packet by a different protocol. This enables diverse network protocols to communicate and data to travel across incompatible networks.

You will find this term commonly used in Networking

Encoded Archival Description (EAD)

A standard for the encoding of finding aids for use in archives, libraries, and museums. EAD is a XML standard that enables the sharing of detailed descriptions of archival collections.

You will find this term commonly used in Digital Libraries, Data Management

Encrypted Messaging

The use of encryption in messaging apps to ensure that only the sender and the recipient can read the messages sent, protecting them from interception and eavesdropping.

You will find this term commonly used in Security, Cybersecurity

Encryption

Encryption is a security measure that involves encoding data so that it can only be accessed by authorized parties. It's widely used to protect sensitive information across various communication channels and storage devices, ensuring data privacy and security.

You will find this term commonly used in Security, Cybersecurity

Encryption Algorithm

A method used to transform data into a secure format that cannot be easily interpreted by unauthorized users, making it a crucial aspect of data security and privacy.

You will find this term commonly used in Security, Cybersecurity

Encryption Algorithm Efficiency

A measure of how effectively an encryption algorithm can secure data against unauthorized access while optimizing performance, including factors like computational requirements and speed of encryption/decryption processes.

You will find this term commonly used in Cybersecurity, Data Security

Encryption Key

A piece of information that controls the cryptographic process and permits an algorithm to transform plaintext into ciphertext or vice versa for decryption.

You will find this term commonly used in Security, Cybersecurity

Encryption Key Management

The administration of tasks involved with protecting, storing, backing up, and organizing encryption keys. Effective key management is critical to the security of a cryptosystem.

You will find this term commonly used in Cybersecurity, Data Security

Encryption Protocol

A set of cryptographic protocols for securing data communication over computer networks. Encryption protocols are essential for ensuring data privacy and security in various types of digital communications and transactions.

You will find this term commonly used in Cybersecurity

Encryption Standard

A set of guidelines and specifications for encrypting electronic information. Popular standards include AES (Advanced Encryption Standard) and RSA, ensuring secure data transmission and storage.

You will find this term commonly used in Cybersecurity

Encryption Standards

Established algorithms and protocols that specify encryption techniques and are accepted and implemented across various platforms and systems to ensure secure communication and data protection.

You will find this term commonly used in Security, Cybersecurity

End-of-Life (EOL) Software

Software that has reached the end of its useful life from the vendor's point of view, meaning it will no longer receive updates, patches, or technical support. End-of-life software can pose security risks if continued in use.

You will find this term commonly used in IT Management, Cybersecurity

End-to-End Encryption

End-to-end encryption is a method of secure communication that prevents third-parties from accessing data while it's transferred from one end system to another. In this setup, only the communicating users can read the messages. It is widely used in secure messaging apps.

You will find this term commonly used in Security, Cybersecurity

End-to-End Encryption (E2EE)

A method of secure communication that prevents third-parties from accessing data while it's transferred from one end system or device to another.

You will find this term commonly used in Security, Cybersecurity

End-to-End Testing

A testing methodology that verifies the complete flow of an application from start to finish. It aims to replicate real user scenarios to ensure the system works as intended in a production-like environment.

You will find this term commonly used in Software Testing, Quality Assurance

End-User Development

A methodology that allows people who are not professional developers to create or modify software applications and systems. It aims to empower users to develop software solutions tailored to their own needs.

You will find this term commonly used in Software Development

Endpoint Configuration Management

The process of maintaining consistent settings and software states for endpoints, such as desktops, laptops, and mobile devices, within an organization. It's crucial for security, compliance, and functionality.

You will find this term commonly used in IT Management, Cybersecurity

Endpoint Detection and Response (EDR)

A cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats. It plays a crucial role in detecting, investigating, and mitigating suspicious activities on endpoints.

You will find this term commonly used in Security, Cybersecurity

Endpoint Detection and Response (EDR) Solutions

Cybersecurity solutions focused on detecting, investigating, and mitigating suspicious activities on hosts and endpoints. EDR is an emerging technology that helps organizations to proactively manage cyber threats.

You will find this term commonly used in Cybersecurity

Endpoint Encryption

The process of encrypting data on endpoint devices such as laptops, mobile phones, and tablets. This ensures that data remains secure even if the device is lost or stolen, protecting sensitive information from unauthorized access.

You will find this term commonly used in Cybersecurity

Endpoint Management

The process of managing and securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns.

You will find this term commonly used in IT Management, Security

Endpoint Protection Platform (EPP)

A solution in cybersecurity that provides a collection of security capabilities to protect computers, smartphones, and tablets against malware, phishing, and other threats typically using a single management console.

You will find this term commonly used in Cybersecurity

Endpoint Security

Security measures that protect endpoints, such as desktops, laptops, and mobile devices, from malicious activity and threats.

You will find this term commonly used in Security, Cybersecurity

Endpoint Security Management

A policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.

You will find this term commonly used in Cybersecurity, IT Management

Energy Harvesting

The process of collecting energy from external sources (e.g., solar power, thermal energy, wind energy, salinity gradients, and kinetic energy) and converting it into electrical energy for small, wireless autonomous devices.

You will find this term commonly used in Hardware, Sustainability

Energy Informatics

The study of computational methods and devices used to enhance energy efficiency and manage energy resources. Energy informatics covers technologies that monitor, analyze, and optimize energy consumption.

You will find this term commonly used in Sustainability, Information Systems

Energy Star

A program and certification created by the U.S. Environmental Protection Agency (EPA) that helps businesses and individuals save money and protect the climate through superior energy efficiency in electronic devices.

You will find this term commonly used in General IT, Sustainability

Energy Storage Management System

A technology used to manage the storage and distribution of energy, often in the context of renewable energy sources. It can involve the use of batteries, capacitors, and other methods to store energy for later use.

You will find this term commonly used in Green Technology, Sustainability

Energy-efficient Computing

Refers to the practice of using computing resources in a way that reduces energy consumption and environmental impact.

You will find this term commonly used in General IT, Hardware

What's Your
Career Path?
Information Security Specialist
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
CEH Career Path
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Career Path
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT User Support Specialist Career Path
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Career Path
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Just Released

CompTIA Authorized Partner

All New 2025 CompTIA A+ Training

Get ready for the updated 220-1201 & 220-1202 exams with our brand-new CompTIA A+ training—designed to help you pass with confidence and start your IT career strong. Access this course and over 2,900 hours of expert-led IT training when you sign up for any of our All-Access Passes. Don’t miss out—enroll now and start learning today!

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass