IT Glossary - F - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Free Software

Software that grants users the freedom to run, copy, distribute, study, change, and improve the software. Free software is more about liberty than price, and it must be distributed under terms that allow these freedoms to be preserved.

You will find this term commonly used in General IT, Software Development

Free Software License

A license under which software is freely available for modification, use, and redistribution, subject to certain conditions that preserve the same freedoms for others.

You will find this term commonly used in General IT, Open Source

Free Space Optics (FSO)

A technology that uses light propagated in free space (air, outer space, vacuum) to wirelessly transmit data for telecommunications or computer networking.

You will find this term commonly used in Networking

Free Space Path Loss (FSPL)

The loss of power over a line-of-sight path in free space, typically used in telecommunications to analyze the strength of radio signals over long distances.

You will find this term commonly used in Networking, Telecommunications

Free/Open Source Software (FOSS) Audit

An examination of a software project to identify and evaluate all the open-source components it uses. This can help ensure compliance with open source licenses, identify potential security vulnerabilities, and manage dependencies.

You will find this term commonly used in Software Development, Security

Frequency Bin

In digital signal processing, a range of frequencies defined within a specific window, used for analyzing signals in the frequency domain.

You will find this term commonly used in Networking, Signal Processing

Frequency Division Multiplexing (FDM)

A technique whereby the total bandwidth available in a communication medium is divided into a series of non-overlapping frequency bands, each of which is used to carry a separate signal.

You will find this term commonly used in Networking

Frequency Hopping

A method used in wireless communications to spread signals over rapidly changing frequencies, each allocated for a short duration. This technique reduces interference and improves security, making it harder for eavesdroppers to intercept communications.

You will find this term commonly used in Networking, Security

Frequency Modulation (FM)

A method of transmitting information over a carrier wave by varying its frequency. Commonly used in radio broadcasting.

You will find this term commonly used in Broadcasting, Telecommunications

Frequency Modulation (FM) Synthesis

A method of sound synthesis that is central to digital audio processing and music technology, involving altering a waveform's frequency to produce new sounds.

You will find this term commonly used in Digital Signal Processing, Multimedia

Frequency Scaling

In computing, the technique of adjusting the frequency of the processor's operational clock to manage power consumption and heat generation. Dynamic frequency scaling allows a processor to run at a lower frequency to save power or reduce heat.

You will find this term commonly used in Hardware, Operating Systems

Front-end

The part of a website or application that users interact with directly. It is everything that users experience visually: texts, images, sliders, and interactive elements.

You will find this term commonly used in Software Development

Front-end Developer

Specializes in developing the visual and interactive elements of web applications users interact with directly.

You will find this term commonly used in Web Development

Front-end Development

The development of the graphical user interface of a website, through the use of HTML, CSS, and JavaScript, so that users can view and interact with that website.

You will find this term commonly used in Software Development

Front-End Encryption

Encrypting data on the client-side before it is sent across the network to ensure data privacy and security.

You will find this term commonly used in Security, Web Development

Front-End Engineering Design (FEED)

The process in engineering design projects that comes after conceptual design and before detailed design. It involves the detailed planning and layout of processes and systems.

You will find this term commonly used in Software Development, System Design

Front-End Loader

A development tool or script that prepares and loads the front-end resources of a web application for client-side use.

You will find this term commonly used in Web Development

Front-end Optimization

The process of improving aspects of a website that affect its loading time and user experience on the client-side, such as minifying CSS and JavaScript files, optimizing images, and implementing lazy loading for faster page rendering.

You will find this term commonly used in Web Development

Front-End Processor

A specialized computer that manages communications to and from a mainframe computer, handling all data formatting, transmission, and reception.

You will find this term commonly used in Networking, General IT

Front-End Scripting

The practice of writing scripts in languages like JavaScript that run on the client-side (in the user's web browser) to create interactive and dynamic web pages. This is a key component of web development, enhancing user experience and web application functionality.

You will find this term commonly used in Web Development

Front-End Testing

The testing of the front-end components of a web application or website, focusing on the user interface and user experience aspects. It ensures that the application behaves as expected across different browsers and devices.

You will find this term commonly used in Software Testing, Development

Frontend Framework

A software framework that is designed to support the development of web applications including web services, web resources, and web APIs. Frameworks provide a standard way to build and deploy web applications on the World Wide Web.

You will find this term commonly used in Software Development

Frontend Integration

The process of combining various front-end technologies and services into a cohesive user interface. This can involve integrating different web services, APIs, and third-party tools to create a seamless experience for the user.

You will find this term commonly used in Web Development

FSF (Free Software Foundation)

A nonprofit with a worldwide mission to promote computer user freedom. It advocates for the freedom to study, distribute, create, and modify computer software.

You will find this term commonly used in General IT, Software Development

FTP (File Transfer Protocol)

A standard network protocol used for the transfer of computer files between a client and server on a computer network.

You will find this term commonly used in Networking, General IT

FTP Anonymous Access

A method of accessing an FTP server that allows users to log in without providing a username and password. Anonymous access is often used to distribute files publicly but poses security risks if not carefully managed.

You will find this term commonly used in Networking, Security

FTP Client

A software that enables a user to upload, download, and manage files on a remote FTP server.

You will find this term commonly used in Networking, General IT

FTP Over SSL (FTPS)

An extension of the File Transfer Protocol (FTP) that adds support for the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) cryptographic protocols. FTPS ensures secure transmission of data over the Internet.

You will find this term commonly used in Networking, Security

FTPS (FTP Secure)

An extension of FTP (File Transfer Protocol) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.

You will find this term commonly used in Networking, Security

Full Homomorphic Encryption (FHE)

An encryption method that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. This allows data to be processed securely without exposing it at any point.

You will find this term commonly used in Security, Cryptography

Full Stack Developer

A developer who has the ability to work on all aspects of a web application, including front-end, back-end, database, version controlling, and debugging.

You will find this term commonly used in Software Development

Full Stack Framework

An application framework that provides both backend and frontend development tools and libraries. Full stack frameworks aim to simplify the development process by offering a unified environment for client-side and server-side programming.

You will find this term commonly used in Software Development

Full Stack Network Engineer

An IT professional with expertise across all layers of network infrastructure, from physical cabling and network topologies to network services and applications.

You will find this term commonly used in Networking, General IT

Full Stack Testing

A comprehensive testing strategy that covers all layers of a web application, from the front end (user interface) to the back end (databases and server-side logic), as well as the software's infrastructure and network. Full stack testing ensures the application functions correctly as a whole.

You will find this term commonly used in Software Testing

Full Virtualization

A virtualization technique used to provide a virtual machine environment that is a complete simulation of the underlying hardware. Full virtualization allows an unmodified guest operating system to be run in isolation.

You will find this term commonly used in Cloud Computing, Networking

Full-Disk Encryption (FDE)

A method of data protection that encrypts all the data on a disk drive, including the operating system, application files, and user data. FDE protects the data in case the physical disk is stolen or accessed by an unauthorized party.

You will find this term commonly used in Security, Data Protection

Full-Duplex

A communication system that allows two or more entities to transmit information to each other simultaneously. In networking, full-duplex can increase the efficiency of communication protocols.

You will find this term commonly used in Networking

Full-stack Developer

Works on both the front-end and back-end of web applications, handling project development from start to finish.

You will find this term commonly used in Web Development

Full-stack Networking

An approach in networking that involves understanding and working across all layers of the networking stack, from the physical infrastructure to the application layer. This is important for designing and troubleshooting complex networked systems.

You will find this term commonly used in Networking, Cloud Computing

Full-Text Database

A database that allows for the storage and search of documents or database entries as complete texts.

You will find this term commonly used in Data Management, Database Design

Full-Text Indexing

The process of creating an index of every word in a set of documents or database records to support comprehensive and rapid search queries.

You will find this term commonly used in Data Management

Full-Text Search

A search technique that scans all the words in every stored document as it tries to match search criteria (e.g., text queries). It is widely used in databases and search engines to provide quick, comprehensive searches of text-based content.

You will find this term commonly used in Databases, Web Development

Function (in Programming)

A block of organized, reusable code that is used to perform a single, related action. Functions are fundamental to procedural programming, and many languages have built-in functions that perform specific operations.

You will find this term commonly used in Software Development

Function as a Microservice

A design approach where individual functions or services are deployed as independent microservices, often in a serverless computing environment. This allows for scaling, updating, and managing functions separately for greater flexibility and efficiency.

You will find this term commonly used in Cloud Computing, Software Development

Function as a Proxy (FaaP)

A serverless computing model where functions are deployed to act as proxies for more complex operations or services, often enabling lightweight and flexible integrations between different systems or components. FaaP can simplify architecture by abstracting underlying services.

You will find this term commonly used in Cloud Computing, Software Development

Function Call Overhead

The performance cost associated with invoking a function in programming, particularly relevant in languages and environments where function calls are frequent.

You will find this term commonly used in Software Development, Performance Optimization

Function Currying

A functional programming technique of converting a function that takes multiple arguments into a sequence of functions each with a single argument.

You will find this term commonly used in Software Development

Function Key

A key on a computer or terminal keyboard which can be programmed so as to cause an operating system to perform certain actions. Function keys are typically labeled F1 through F12 or F15 and can perform default actions or custom shortcuts in applications.

You will find this term commonly used in Hardware, User Interface

Function Overloading

A feature in many programming languages that allows the creation of several functions with the same name, which differ from each other in the type or number of their parameters.

You will find this term commonly used in Software Development

Function Point Analysis

A standardized method to measure software development effort and size based on the functionality delivered to the user. Function point analysis considers elements such as inputs, outputs, user interactions, files, and external interfaces.

You will find this term commonly used in Software Development, Management

What's Your
Career Path?
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass