IT Glossary - H - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

HTTP Flood Attack

A type of Distributed Denial of Service (DDoS) attack where the attacker exploits seemingly legitimate HTTP GET or POST requests to attack a web server or application.

You will find this term commonly used in Security, Networking

HTTP Header

Part of the header section of request and response messages in the HTTP protocol that defines the operating parameters of an HTTP transaction.

You will find this term commonly used in Web Development, Networking

HTTP Interceptors

Functions that are used to intercept and possibly modify HTTP requests and responses in a web application, often used for logging, authentication, or other purposes.

You will find this term commonly used in Web Development

HTTP Method

A request method used in HTTP to indicate the desired action to be performed for a given resource. Common methods include GET, POST, PUT, DELETE, and PATCH.

You will find this term commonly used in Web Development

HTTP Monitoring

The process of checking and logging HTTP traffic between a client and server for analysis or troubleshooting.

You will find this term commonly used in Networking, Web Development

HTTP Pipeline

A feature that allows multiple HTTP requests to be sent on a single TCP connection without waiting for the corresponding responses.

You will find this term commonly used in Networking, Web Development

HTTP Pipelining

A technique in which multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses.

You will find this term commonly used in Web Development, Networking

HTTP Proxy

A server that acts as an intermediary for requests from clients seeking resources from other servers.

You will find this term commonly used in Networking, Security

HTTP Redirect

A way to redirect web browsers and search engines from one URL to another.

You will find this term commonly used in Web Development, SEO

HTTP Response Splitting

A web application vulnerability that occurs when unvalidated user input is included in HTTP headers, potentially allowing an attacker to inject additional HTTP headers or even arbitrary content into the responses.

You will find this term commonly used in Security, Web Development

HTTP Status Code 404

A standard response code in HTTP indicating that the client was able to communicate with the server, but the server could not find the requested information.

You will find this term commonly used in Web Development

HTTP Status Codes

Codes that are issued by a server in response to a client's request made to the server. It includes codes from various categories like informational responses, successful responses, redirects, client errors, and server errors.

You will find this term commonly used in Web Development

HTTP Strict Transport Security (HSTS)

A web security policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking.

You will find this term commonly used in Web Development, Security

HTTP Tunneling

A technique used to encapsulate non-HTTP traffic over HTTP protocols, enabling communication through networks or firewalls that block non-HTTP traffic.

You will find this term commonly used in Networking, Security

HTTP/2

The second major version of the HTTP network protocol, used by the World Wide Web. It focuses on performance improvements over HTTP/1.x.

You will find this term commonly used in Networking

HTTP/2 Multiplexing

A feature of HTTP/2 that allows multiple request and response messages to be in flight at the same time over a single TCP connection, improving web performance.

You will find this term commonly used in Web Development, Networking

HTTP/2 Push

A feature of the HTTP/2 protocol that allows a server to send resources to a web browser before the browser requests them.

You will find this term commonly used in Web Development, Networking

HTTP/2 Server Push

A feature of HTTP/2 where a server can send resources to a client before the client requests them, effectively pushing data to the client and potentially improving load times.

You will find this term commonly used in Networking, Web Development

HTTP/3

The upcoming third major version of the HTTP protocol, featuring improved performance and security enhancements over HTTP/2.

You will find this term commonly used in Networking

HTTPS (HTTP Secure)

An extension of HTTP used for secure communication over a computer network, widely used on the Internet.

You will find this term commonly used in Networking, Security

HTTPS (HyperText Transfer Protocol Secure)

An extension of HTTP that is used for secure communication over a computer network, and is widely used on the Internet.

You will find this term commonly used in Networking, Security

HTTPS Everywhere

A browser extension that encrypts your communications with many major websites, making your browsing more secure.

You will find this term commonly used in Web Development, Security

HTTPS Inspection

The process of decrypting and examining HTTPS traffic with the goal of identifying malicious traffic or enforcing policies.

You will find this term commonly used in Security, Networking

Hub

A common connection point for devices in a network. Hubs are used to connect segments of a LAN.

You will find this term commonly used in Networking

Hue

In digital arts and computer graphics, a color property that defines a specific color on the color wheel.

You will find this term commonly used in Multimedia, Design

Human-Centered Design

An approach to systems design and development that makes human perspectives and needs the focal point of the entire process.

You will find this term commonly used in User Experience, Design

Human-Readable Format

A representation of data or information that can be naturally read by humans. In contrast, machine-readable data is in a format that can be easily processed by a computer.

You will find this term commonly used in General IT, Data Representation

Hybrid App

A mobile app that combines elements of both native apps and web applications. Hybrid apps are essentially web apps that have been put in a native app shell.

You will find this term commonly used in Mobile Development

Hybrid App Development

The creation of mobile apps that run on multiple platforms, such as iOS and Android, from a single codebase, typically using web technologies.

You will find this term commonly used in Mobile Development

Hybrid Application Framework

A framework used in mobile development that allows for the development of applications that can run on multiple platforms using the same codebase.

You will find this term commonly used in Mobile Development

Hybrid Cloud

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party, public cloud services with orchestration between the two platforms.

You will find this term commonly used in Cloud Computing

Hybrid Cloud Computing

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party, public cloud services with orchestration between the two platforms. It allows for greater flexibility and more deployment options.

You will find this term commonly used in Cloud Computing, General IT

Hybrid Cloud Management

The process of managing the integration and operation of a hybrid cloud, which combines public and private cloud infrastructures to allow data and applications to be shared between them.

You will find this term commonly used in Cloud Computing, IT Management

Hybrid Cloud Storage

A storage solution that combines public cloud storage and private cloud storage with data mobility between the two environments.

You will find this term commonly used in Cloud Computing, Storage

Hybrid Cryptography

A cryptosystem that combines two or more encryption schemes, including both symmetric and asymmetric algorithms, to secure data transmission.

You will find this term commonly used in Cryptography, Security

Hybrid Cryptosystem

A cryptographic system that combines the best features of both symmetric and asymmetric encryption to secure data transmission.

You will find this term commonly used in Security, Cryptography

Hybrid Disk

Also known as a solid-state hybrid drive (SSHD), it combines the features of an HDD (hard disk drive) and an SSD (solid-state drive) in one unit, aiming to offer a balance between high speed and large storage capacity.

You will find this term commonly used in Hardware, Data Storage

Hybrid Encryption

A form of encryption that combines the convenience of a public-key encryption scheme with the efficiency of a symmetric key encryption scheme.

You will find this term commonly used in Security, Cryptography

Hybrid Encryption System

A cryptographic system that combines the convenience of a public-key encryption system with the efficiency of a symmetric key encryption system.

You will find this term commonly used in Security, Cryptography

Hybrid Fiber-Coaxial (HFC)

A telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network.

You will find this term commonly used in Networking

Hybrid Integration Platform

A platform that combines cloud-based systems and on-premises, the traditional method of integration.

You will find this term commonly used in Cloud Computing, Integration

Hybrid IT

A computing environment that uses a mix of on-premise, private cloud, and public cloud services with orchestration between the two platforms.

You will find this term commonly used in Cloud Computing

Hybrid Logical Clock (HLC)

A type of logical clock used in distributed systems to ensure a partial ordering of events with improved accuracy over traditional logical clocks while maintaining causality.

You will find this term commonly used in Distributed Systems

Hybrid Network Topology

A network structure that combines two or more different network topologies, such as star, ring, bus, or mesh, to form a single network.

You will find this term commonly used in Networking

Hybrid Networking

A type of computer network that uses different types of transmission technologies, protocols, or architectures.

You will find this term commonly used in Networking

Hybrid Routing

A routing method that combines characteristics of both static routing and dynamic routing, often used in large, complex networks.

You will find this term commonly used in Networking

Hybrid SIM Slot

A smartphone feature that allows a user to insert either two SIM cards or one SIM card and one microSD card, but not both types of cards simultaneously.

You will find this term commonly used in Mobile Technology

Hybrid Virtualization

Combines hardware-assisted virtualization and software emulation to offer a balanced approach for virtualizing complex computing environments. It offers flexibility and improved performance for specific applications.

You will find this term commonly used in Virtualization

Hyper-converged Infrastructure (HCI)

A software-defined IT infrastructure that virtualizes all of the elements of conventional "hardware-defined" systems. HCI includes, at a minimum, virtualized computing (a hypervisor), virtualized SAN (storage area network) and virtualized networking.

You will find this term commonly used in Networking, Virtualization

Hyper-Threading

Intel’s proprietary technology that allows a single microprocessor to act like two separate processors to the operating system and the application programs that use it.

You will find this term commonly used in Hardware, Computing

What's Your
Career Path?
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass