IT Glossary - I - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Internationalization (i18n)

The practice of designing and developing software applications in a way that makes them adaptable to various languages and regions without engineering changes.

You will find this term commonly used in Software Development, Localization

Internet Backbone

The principal data routes between large, strategically interconnected networks and core routers on the Internet. It is a collection of high-speed data transfer lines that connect major nodes or routing centers.

You will find this term commonly used in Networking, Internet Technology

Internet Exchange Point (IXP)

A physical infrastructure through which Internet service providers (ISPs) and Content Delivery Networks (CDNs) exchange Internet traffic between their networks.

You will find this term commonly used in Networking

Internet Governance

The development and application by governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet.

You will find this term commonly used in Internet Technology, Policy

Internet Governance Forum (IGF)

A multi-stakeholder forum for policy dialogue on issues of internet governance, including the sustainability, robustness, security, stability, and development of the internet.

You will find this term commonly used in Networking, Internet Policy

Internet Health Report

An annual report that provides insights into the global condition of the internet, including security, connectivity, and innovation, aiming to improve the internet's ecosystem.

You will find this term commonly used in Networking, Internet Policy

Internet of Things (IoT)

The Internet of Things (IoT) refers to a network of interconnected devices or objects embedded with sensors, software, and connectivity features, enabling them to collect and exchange data, automate tasks, and interact with the environment.

You will find this term commonly used in IoT, Embedded Systems, Smart Devices

Internet Protocol Suite

The conceptual model and set of communications protocols used on the Internet and similar computer networks. Commonly known as TCP/IP.

You will find this term commonly used in Networking

Internet Protocol Television (IPTV) Technologies

Technologies used to deliver television services over the internet or local area networks (LANs), unlike traditional terrestrial, satellite signal, and cable television formats.

You will find this term commonly used in Networking, Telecommunications

Internet Service Manager (ISM)

A management tool provided by Microsoft for managing Internet Information Services (IIS) and other web services, allowing administrators to create and manage web sites, applications, and virtual directories.

You will find this term commonly used in Networking, Web Development

Internet Service Quality

The measurement and assessment of the performance and reliability of internet services, including speed, uptime, and user satisfaction.

You will find this term commonly used in Networking, Service Management

Interoperability

The ability of computer systems or software to exchange and make use of information without special effort from the user or the system.

You will find this term commonly used in Software Development, Networking

Interoperability Standards

Agreed-upon specifications for making systems and products work together. These standards enable different information technology systems and software applications to communicate and exchange data.

You will find this term commonly used in Software Development, Networking

Interoperability Testing

Testing that evaluates the interoperability of a software application or system with others, ensuring they can work together within the same environment.

You will find this term commonly used in Software Development, QA

Interpolation

A method of constructing new data points within the range of a discrete set of known data points.

You will find this term commonly used in Programming, Data Analysis

Interpretive Simulation

A type of simulation that runs models directly from high-level descriptions at runtime rather than compiling them into machine code, allowing for greater flexibility and ease of model changes.

You will find this term commonly used in AI, Development

Interstitial Advertisement

A full-page ad that appears before the actual webpage. In digital marketing, these ads are used to capture the user's attention while navigating between pages.

You will find this term commonly used in Digital Marketing, Web Development

Intraband Transition

In semiconductor physics, a transition of electrons within the same energy band, affecting the properties and behavior of semiconductors, relevant to the development of electronic and photonic devices.

You will find this term commonly used in Hardware, Development

Intranet Portal

A private network accessible only to an organization's staff, often consisting of a wide range of information and services from the organization's internal IT systems.

You will find this term commonly used in Networking, General IT

Intrusion Detection

The process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection Policy

A set of rules and configurations designed to detect and respond to unauthorized access or anomalies in network traffic.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection System (IDS)

A device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.

You will find this term commonly used in Security, Cybersecurity

Intrusion Detection System (IDS) Types

Various forms of IDS, including network-based (NIDS), host-based (HIDS), and application-based (AIDS), each designed to detect and potentially thwart unauthorized access or misuse of systems.

You will find this term commonly used in Security, Cybersecurity

Intrusion Prevention System (IPS)

An IT security device that monitors network and/or system activities for malicious activities, logs information about these activities, attempts to block/stop them, and reports them to management.

You will find this term commonly used in Security, Cybersecurity

Intrusion Simulation

The practice of mimicking cyber attack tactics and techniques in a controlled environment to test the effectiveness of security measures and identify vulnerabilities.

You will find this term commonly used in Security, Cybersecurity

Inventory Management Software

Software solutions designed to help businesses manage their inventory levels, orders, sales, and deliveries. It often includes features for product categorization, stock level tracking, and forecasting.

You will find this term commonly used in Business Management, General IT

Inventory Management System

Software tools or physical practices used to track resources and inventory levels within an organization.

You will find this term commonly used in IT Management, Supply Chain

Inverse Multiplexing

The process of combining multiple signals or data streams into one signal over a shared medium.

You will find this term commonly used in Networking, Telecommunications

Inversion of Control (IoC)

A design principle in software engineering where the control of objects or portions of a program is transferred to a container or framework. It’s often used in the development of applications.

You will find this term commonly used in Software Development

Investigative Data Mining

The process of using data mining techniques to identify patterns or anomalies that could suggest misconduct or criminal activities.

You will find this term commonly used in Data Analysis, Security

Investment Analysis in IT

The process of evaluating and selecting IT projects and assets based on their potential to generate financial returns, considering factors like costs, benefits, risks, and strategic alignment.

You will find this term commonly used in IT Management, Finance

Investment Analysis Software

Tools and platforms used to analyze financial data, assess investment opportunities, and make informed decisions about portfolio management, including features for market analysis, simulation, and reporting.

You will find this term commonly used in Finance, Business Intelligence

Investment in IT Security

The allocation of resources towards protecting information systems and data from cyber threats, including the purchase of security tools, hiring of specialists, and implementation of security measures.

You will find this term commonly used in Security, IT Management

IoC (Inversion of Control) Container

A software design pattern that manages the instantiation and provides the dependencies of classes.

You will find this term commonly used in Software Development

IOPS (Input/Output Operations Per Second)

A performance measurement used to benchmark computer storage devices like hard disk drives (HDD), solid-state drives (SSD), and storage area networks (SAN).

You will find this term commonly used in Hardware, General IT

IoT (Internet of Things)

Refers to the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

You will find this term commonly used in Networking, General IT

IoT Device Management

The process of administering, monitoring, and managing the IoT devices deployed across different environments, including provisioning, firmware updates, and security management.

You will find this term commonly used in IoT, IT Management

IoT Gateway

A device or software application that serves as a connection point between the cloud and controllers, sensors, and intelligent devices in the Internet of Things (IoT). It processes and translates data between different protocols.

You will find this term commonly used in IoT, Networking

IoT Network Protocols

Protocols used in the networking of IoT devices, including MQTT, CoAP, and AMQP, designed for efficient communication in constrained environments or over long distances.

You will find this term commonly used in IoT, Networking

IoT Platform

A suite of components that enable development, deployment, and management of IoT applications and devices, often providing capabilities such as device management, data collection, processing, and analytics.

You will find this term commonly used in IoT, Development

IoT Security

Refers to the safety component tied to the Internet of Things, and involves the safeguarding of connected devices and networks in the IoT.

You will find this term commonly used in Security, Cybersecurity

IoT Security Standards

Guidelines and protocols designed to secure Internet of Things devices and ecosystems from cyber threats, ensuring data privacy and system integrity.

You will find this term commonly used in Security, IoT

IP Address

A unique address that identifies a device on the internet or a local network, allowing for communication between devices.

You will find this term commonly used in Networking

IP Address Assignment

The process of allocating IP addresses to devices on a network, either statically by manual configuration or dynamically using DHCP or similar protocols.

You will find this term commonly used in Networking, IT Management

IP Address Leasing

The dynamic allocation of IP addresses to devices on a network, typically through DHCP.

You will find this term commonly used in Networking, IT Management

IP Address Management (IPAM)

The method by which Internet Protocol (IP) networking addresses (IPv4 and IPv6) are tracked and managed within a network.

You will find this term commonly used in Networking, Security

IP Anycast

A networking technique where a single IP address is assigned to multiple devices on the network, and the network routes the traffic to the nearest device.

You will find this term commonly used in Networking, Internet Technology

IP Canonicalization

The process of redirecting multiple IP addresses to a single primary domain, improving website consistency and preventing duplicate content issues for SEO.

You will find this term commonly used in Networking, Web Development

IP Core

In semiconductor design, a reusable unit of logic or a chip layout design that can be licensed to multiple fabricators or integrators as a building block for different semiconductor products.

You will find this term commonly used in Hardware, Development

IP Fast Reroute (IPFRR)

Mechanisms designed to quickly reroute traffic in the event of a failure within an IP network, minimizing packet loss and downtime.

You will find this term commonly used in Networking, Security

What's Your
Career Path?
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass