A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
The process of responding to and managing errors in a program. It is a critical part of software development and ensures that programs can deal with unexpected issues gracefully.
You will find this term commonly used in Software Development
The process of identifying, managing, and responding to errors or exceptions that occur during the execution of software tests, aiming to ensure that software behaves gracefully under unexpected conditions.
You will find this term commonly used in Software Development, QA
A record of critical errors encountered by the operating system, applications, or servers, used by IT professionals and developers to diagnose and troubleshoot problems.
You will find this term commonly used in IT Management, Software Development
The process of detecting, collecting, and reporting errors encountered in software or hardware, to help developers or technicians diagnose and fix issues.
You will find this term commonly used in Software Development, IT Support
The process within IT service management that ensures timely and efficient resolution of critical incidents and problems by escalating them to higher levels of expertise, following predefined procedures and policies.
You will find this term commonly used in IT Service Management
A procedural plan in IT service management that defines how to increase the visibility and priority of unresolved tickets or issues. It ensures that critical problems are addressed by higher levels of authority in a timely manner.
You will find this term commonly used in IT Service Management, Security
In IT, a service that holds the source code of software in trust for the software developer and the licensee, ensuring the licensee access to the source code if the developer is unable to support the software.
You will find this term commonly used in Software Development
A service that holds a copy of the source code of software applications on behalf of a licensee and the licensor. In the event the licensor fails to maintain and support the software, the licensee can access the source code.
You will find this term commonly used in Software Development, Legal
A decentralized, open-source blockchain system that features smart contract functionality. It provides a platform for creating and executing blockchain applications, including decentralized finance (DeFi) apps.
You will find this term commonly used in Blockchain, Cryptocurrency
Ethernet is a standard communication protocol embedded in software and hardware devices, used for building local area networks (LANs). It facilitates data exchange by specifying how network devices format and transmit data so other devices on the same network can recognize, receive, and process it.
You will find this term commonly used in Networking
A type of network cable used for wired networks that connects devices such as computers, routers, and switches within a local area network (LAN).
You will find this term commonly used in Networking
A data packet defined by the IEEE Ethernet standard for local area network (LAN) technology. It contains the source and destination address, data, and a frame check sequence for error detection.
You will find this term commonly used in Networking, Data Communication
A feature that allows HDMI cables to carry Ethernet data along with video and audio, enabling connected devices to share an internet connection without the need for separate network cables.
You will find this term commonly used in Networking, Home Entertainment
Ethernet Over Power (EoP) technology allows networks to run through electrical wiring, enabling devices to connect to a network using existing power outlets. It's useful in situations where conventional network cabling is not feasible.
You will find this term commonly used in Networking
A network switch that operates at the data link layer of the OSI model to create a network. It connects devices in a LAN and uses packet switching to receive, process, and forward data to the destination device.
You will find this term commonly used in Networking
A security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Ethical hackers help organizations identify security vulnerabilities to prevent unauthorized access by malicious hackers.
You will find this term commonly used in Cybersecurity
The practice of bypassing system security to identify potential data breaches and threats in a network. The purpose of ethical hacking is to improve the security of the network by fixing vulnerabilities found during testing.
You will find this term commonly used in Cybersecurity
ETL is a process in data warehousing responsible for pulling data out of the source systems and placing it into a data warehouse. ETL involves extracting data, transforming it to fit operational needs, and then loading it into the end target database or data warehouse. It's crucial in data integration strategies, ensuring data accuracy and consistency.
You will find this term commonly used in Data Management
Software tools used in data warehousing that allow for the extraction of data from various sources, its transformation into a format suitable for analysis, and its loading into a final target database.
You will find this term commonly used in Data Management, Software Development
The process of extracting data from various sources, transforming it into a format suitable for analysis, and then loading it into a final destination, such as a data warehouse. ETL stands for Extract, Transform, Load.
You will find this term commonly used in Data Management, Software Development
A programming construct that waits for and dispatches events or messages in a program. It's a core concept in asynchronous and event-driven programming paradigms.
You will find this term commonly used in Software Development
A programming model where operations are executed based on events, typically in non-blocking systems or applications. It allows for handling high volumes of asynchronous actions without the need for multiple threads.
You will find this term commonly used in Software Development, Asynchronous Programming
In ITSM (IT Service Management), event management involves monitoring and managing events that occur through the IT infrastructure to ensure that normal service operation is maintained.
You will find this term commonly used in IT Service Management
The method of tracking and analyzing streams of information (events) about things that happen (also called event streams), and deriving a conclusion from them to process and analyze real-time data.
You will find this term commonly used in Software Development, Data Analysis
A design pattern in which changes to the state of an application are stored as a sequence of events. This allows for complex business processes to be managed, audited, and replayed.
You will find this term commonly used in Software Development, Data Management
The technology that enables the real-time processing of continuous streams of data from multiple sources. ESP is used in various applications, such as monitoring financial transactions, social media streams, and sensor data in IoT devices.
You will find this term commonly used in Data Processing, Real-Time Analysis
A component of Microsoft's Windows OS that lets administrators and users view the event logs on a local or remote machine, providing a way to audit and review events and troubleshoot issues.
You will find this term commonly used in General IT
A method of integrating software applications and systems where communication is triggered by events rather than by direct calls between components. This approach can enhance system scalability and responsiveness.
You will find this term commonly used in Software Development, System Integration
Event-Driven Architecture (EDA) is a software design pattern in which decoupled applications can asynchronously publish and subscribe to events via an event bus. This architecture enables highly scalable, flexible systems that are responsive to real-time data changes and are often used in microservices architectures.
You will find this term commonly used in Software Development, Networking
A software architecture pattern promoting the production, detection, consumption of, and reaction to events. This architecture enables applications to be more responsive and scalable.
You will find this term commonly used in Software Development, IT Management
An IT infrastructure setup that responds to events or changes in the environment or system. This approach allows for more dynamic and automated responses to operational activities, improving efficiency and flexibility.
You will find this term commonly used in IT Management, Software Development
A programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses) or messages from other programs/threads.
You will find this term commonly used in Software Development
An architectural style that promotes the production, detection, consumption of, and reaction to events, allowing services within an architecture to communicate and function based on event triggers rather than linear sequences of processes.
You will find this term commonly used in Software Development, IT Architecture
A consistency model used in distributed computing where updates to a distributed database may not be immediately visible to all nodes, but all nodes will eventually become consistent over time.
You will find this term commonly used in Distributed Systems, Data Management
A subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm. An evolutionary algorithm uses mechanisms inspired by biological evolution, such as reproduction, mutation, recombination, and selection.
You will find this term commonly used in AI, Machine Learning
A subfield of artificial intelligence (AI) involving algorithms inspired by biological evolution, such as reproduction, mutation, selection, and crossover, to solve problems.
You will find this term commonly used in AI, Machine Learning
A method of database design that allows for incremental changes and evolution of the database schema over time, facilitating agile software development practices and continuous integration/deployment cycles.
You will find this term commonly used in Database Design, Agile Development
A method of software development that emphasizes the gradual growth and change of software capabilities over time, rather than attempting to deliver a complete system at once. It aligns with agile methodologies.
You will find this term commonly used in Software Development, Agile Methodologies
An exabyte is a unit of information or computer storage equal to one quintillion bytes (or a billion gigabytes). This term is often used in the context of big data and computing to describe large volumes of data.
You will find this term commonly used in Data Management, General IT
A unit of information or computer storage equal to one quintillion bytes (or, in SI, 1,000^6 or 10181018 bytes). Exabytes are used to measure massive data volumes, such as in large data centers.
You will find this term commonly used in Data Management
Computing or data storage systems capable of handling exabyte volumes of data. An exabyte equals one billion gigabytes (GB), showcasing the scale of big data and the need for advanced data management solutions.
You will find this term commonly used in Big Data, Data Management
A measure of data storage capacity that is equal to one quintillion bytes, or 1,000 petabytes. Exabyte-scale storage is used to describe the massive volume of data generated and stored by large-scale computing applications.
You will find this term commonly used in Data Management, Hardware
Exascale computing refers to computing systems capable of at least one exaFLOPS, or a billion billion (quintillion) calculations per second. This represents a significant milestone in computing capability, enabling the processing of massive datasets and complex simulations in fields like climate research, astrophysics, and materials science.
You will find this term commonly used in General IT, High-performance Computing
Exception handling in software development is the process of responding to the occurrence of exceptions – anomalous or exceptional conditions requiring special processing – during the execution of a program. It is a critical part of robust software design, allowing programs to deal with unexpected issues effectively and safely.
You will find this term commonly used in Software Development
A programming language construct or mechanism designed to handle the occurrence of exceptions, which are anomalous or exceptional conditions requiring special processing during program execution.
You will find this term commonly used in Software Development
The practice of recording exceptions or errors that occur during the execution of software, typically to a file or a monitoring system, to aid in debugging and improving software reliability.
You will find this term commonly used in Software Development, Debugging
A mail server and calendaring server developed by Microsoft that runs exclusively on Windows Server operating systems.
You will find this term commonly used in Networking, General IT
A digital logic gate that outputs true only when the inputs differ (one is true, the other is false). It's used in cryptography and error detection schemes to create a simple and reversible encryption mechanism.
You will find this term commonly used in Electronics, Cryptography
In computing, the execution context is the runtime environment that includes all the information needed for the execution of a program or process. This includes the state of the processor, memory, registers, and variables.
You will find this term commonly used in Software Development
A part of software systems that are responsible for executing instructions. In the context of virtual machines, it's the component that executes the bytecode compiled from the source code.
You will find this term commonly used in Software Development
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.
Get ready for the updated 220-1201 & 220-1202 exams with our brand-new CompTIA A+ training—designed to help you pass with confidence and start your IT career strong. Access this course and over 2,900 hours of expert-led IT training when you sign up for any of our All-Access Passes. Don’t miss out—enroll now and start learning today!