IT Glossary - F - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Function Pointer

A type of pointer used in programming languages, such as C or C++, which points to a function, allowing the function to be called through the pointer.

You will find this term commonly used in Software Development

Function Signature

The unique identification of a function in programming that includes its name, the number and types of its parameters, and its return type. Function signatures are essential for function overloading and for the compiler to differentiate between different functions.

You will find this term commonly used in Software Development

Function-as-a-Service (FaaS)

A category of cloud computing services that provides a platform allowing customers to execute code in response to events without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

You will find this term commonly used in Cloud Computing

Functional Decomposition

The process of breaking down complex processes or systems into simpler, more manageable components. In software engineering, it involves breaking down the functionality of a system into smaller parts or functions that are easier to understand, manage, and code.

You will find this term commonly used in Software Development

Functional Decomposition Diagram

A tool used in systems design to break down the functionality of a system into smaller parts, making it easier to understand, develop, and maintain.

You will find this term commonly used in Software Development, Systems Design

Functional Dependency

A relationship that exists when one attribute uniquely determines another attribute in a database schema, crucial for normalization.

You will find this term commonly used in Database Design

Functional Design

An approach to software design where the architecture is structured around functions and their interactions, often emphasizing modularity and reusability.

You will find this term commonly used in Software Development

Functional Interface

In programming, particularly in Java, a functional interface is an interface that contains exactly one abstract method. This concept supports lambda expressions and method references, enabling cleaner and more concise code for representing single-method interfaces.

You will find this term commonly used in Software Development

Functional Programming

A programming paradigm that treats computation as the evaluation of mathematical functions and avoids changing-state and mutable data.

You will find this term commonly used in Software Development, AI

Functional Requirement

A requirement that defines a specific behaviour or function of a system. For example, in software engineering, it refers to what the system should do, such as calculations, technical details, data manipulation and processing, and other specific functionality.

You will find this term commonly used in Software Development

Functional Specification

A document that outlines the expected behavior of a system or software application, including features, operations, and functionality. It serves as a guide for developers and testers to understand what to build and how the system should perform.

You will find this term commonly used in Software Development

Functional Testing

A type of software testing that validates the software system against the functional requirements/specifications. The purpose of functional tests is to test each function of the software application, by providing appropriate input and verifying the output against the Functional requirements.

You will find this term commonly used in Software Development, Testing

Fundamental Networking

The basic principles and practices that form the foundation of computer networking. This includes understanding network topologies, protocols, IP addressing, routing, and switching, which are essential for designing, implementing, and managing networks.

You will find this term commonly used in Networking

Fuzz Testing

A software testing technique that involves providing invalid, unexpected, or random data inputs to a computer program. The purpose is to find security loopholes or bugs that might crash the program.

You will find this term commonly used in Security, Software Testing

Fuzz Testing (Fuzzing)

An automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for crashes, failing code assertions, or potential memory leaks.

You will find this term commonly used in Security, Software Testing

Fuzz Testing Tool

Software designed to implement fuzz testing by automatically generating and sending a large number of random data inputs to a target program. The goal is to trigger an error, crash, or uncover vulnerabilities that can then be fixed.

You will find this term commonly used in Security, Software Testing

Fuzzification

The process of converting precise input values into fuzzy values based on predefined linguistic variables, commonly used in fuzzy logic systems.

You will find this term commonly used in AI, Control Systems

Fuzzing

An automated software testing technique that involves providing invalid, unexpected, or random data as input to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks.

You will find this term commonly used in Security, Software Testing

Fuzzing as a Service (FaaS)

A cloud-based service that provides automated fuzz testing to identify vulnerabilities and bugs in software applications. By leveraging cloud resources, FaaS allows for scalable and extensive testing across various environments and configurations.

You will find this term commonly used in Security, Cloud Computing

Fuzzing Framework

A software library or set of tools designed to assist in the fuzz testing of applications and systems by generating random or semi-random data that is used as input to the systems being tested, in order to find bugs or security vulnerabilities.

You will find this term commonly used in Security, Software Testing

Fuzzing Seed

An initial value or set of values used by a fuzzing tool to generate test cases. A good fuzzing seed can increase the effectiveness of fuzz testing by ensuring a wide coverage of the input space, potentially uncovering more vulnerabilities or bugs.

You will find this term commonly used in Security, Software Testing

Fuzzing Suite

A collection of software tools and libraries designed for conducting fuzzing tests on applications, systems, or networks to discover vulnerabilities or bugs. Fuzzing suites automate the generation and injection of malformed or unexpected data.

You will find this term commonly used in Security, Software Testing

Fuzzing Techniques

Techniques used in software testing, especially for discovering coding errors and security loopholes by inputting massive amounts of random data, or "fuzz," to the system.

You will find this term commonly used in Cybersecurity, Software Development

Fuzzing Tool

Software used in security testing to automatically generate random data (fuzz) to input into a program. The goal is to trigger an error, crash, or security vulnerability in the software being tested, identifying weaknesses that need to be addressed.

You will find this term commonly used in Security, Software Testing

Fuzzy Hashing

A technique in cybersecurity used to create a representation of a file that can identify similar files or fragments, useful for detecting variants of malware or digital forensic analysis.

You will find this term commonly used in Cybersecurity, Digital Forensics

Fuzzy Logic

A form of many-valued logic or probabilistic logic used in artificial intelligence and other fields to deal with reasoning that is approximate rather than fixed and exact. Unlike binary logic, fuzzy logic variables may have a truth value that ranges between 0 and 1.

You will find this term commonly used in AI, Machine Learning

Fuzzy Logic System

A computing approach based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.

You will find this term commonly used in AI, Software Development

Fuzzy Matching

A technique used in computer-assisted translation and other fields to identify non-exact matches of a string of text. It is useful in data deduplication, data integration, and information retrieval applications where exact matches are not necessary or possible.

You will find this term commonly used in Databases, Software Development

Fuzzy Search

A type of search that finds matches even when the search terms are only partially accurate or slightly misspelled. Fuzzy search algorithms can provide suggestions or corrections for queries, improving user experience in search applications.

You will find this term commonly used in Software Development, AI

Fuzzy Search Algorithm

An algorithm that finds matches that are approximately equal to a given search pattern, useful in applications where input may be imprecise or misspelled.

You will find this term commonly used in AI, Data Management

Fuzzy System

A system that uses fuzzy logic to reason about data, useful in scenarios where information is imprecise, uncertain, or incomplete.

You will find this term commonly used in AI, Control Systems

What's Your
Career Path?
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass