IT Glossary - L - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Layered Security

Layered security is an approach to cybersecurity that employs multiple layers of defense mechanisms to protect against various threats.

You will find this term commonly used in Cybersecurity

Lazy Evaluation

A programming technique where evaluation of an expression is delayed until its value is actually needed. It can improve performance by avoiding unnecessary calculations, and it can create potential for infinitely large data structures.

You will find this term commonly used in Programming

Lazy Initialization

A programming technique where the instantiation of an object or the execution of a computation is delayed until its first use. This can optimize performance and resource usage, particularly in scenarios with heavy or rarely used objects.

You will find this term commonly used in Software Development

Lazy Loading

A design pattern commonly used in computer programming and web design that defers initialization of an object until the point at which it is needed. It can contribute to efficiency in the program's operation if properly and appropriately used.

You will find this term commonly used in Software Development, Web Development

LCD (Liquid Crystal Display)

LCD is a type of flat-panel display that uses liquid crystals to produce images.

You will find this term commonly used in Hardware

LCD Monitor

An LCD monitor is a computer monitor that uses liquid crystal displays to produce images.

You will find this term commonly used in Hardware

LDAP (Lightweight Directory Access Protocol)

A protocol used to access and maintain distributed directory information services over an Internet Protocol network.

You will find this term commonly used in Networking, Security

LDAP Authentication

LDAP authentication is a method of validating user credentials against a directory service using the Lightweight Directory Access Protocol (LDAP).

You will find this term commonly used in Security

LDAP Injection

A type of cyber attack used to exploit web-based applications that construct LDAP statements based on user input, potentially allowing attackers to gain unauthorized access to information in the LDAP tree.

You will find this term commonly used in Security, Cybersecurity

LDAP Integration

The process of connecting and synchronizing a system or application with an LDAP directory for user and group management. This allows for centralized authentication, authorization, and user management in enterprise environments.

You will find this term commonly used in Security, Systems Administration

LDAP Server

An LDAP server is a software application that stores and organizes directory information, accessible through the LDAP protocol.

You will find this term commonly used in Networking

LDAP Synchronization

The process of ensuring that data across different LDAP directories or between an LDAP directory and other systems remains consistent and up-to-date. It involves periodic or real-time replication of entries to maintain synchronization.

You will find this term commonly used in Systems Administration, Security

Lead Conversion

In digital marketing, the process of converting a lead into a paying customer. This is a key metric in evaluating the effectiveness of marketing strategies and sales processes.

You will find this term commonly used in Digital Marketing

Lead Scoring

A methodology used to rank prospects against a scale that represents the perceived value each lead represents to the organization.

You will find this term commonly used in Marketing/CRM

Leadership in Energy and Environmental Design (LEED)

An ecology-oriented building certification program run by the non-profit U.S. Green Building Council (USGBC). It includes some IT and systems integration to manage resources efficiently in buildings.

You will find this term commonly used in General IT, Sustainability

Leadership in IT

The act of guiding and influencing the strategic direction and operation of IT organizations. Effective IT leadership involves decision-making on technology investments, policy formulation, and fostering innovation within teams.

You will find this term commonly used in IT Management

Leaf Node

In a tree data structure, a leaf node is a node that does not have child nodes. Leaf nodes represent the "end" points of a tree, often containing the actual data or values in structures like binary search trees or XML documents.

You will find this term commonly used in Data Structures, Programming

Leak Detection in Software

The process of identifying and fixing leaks in software, where resources like memory, database connections, or file handles are not released after use. Detecting and fixing leaks is crucial for preventing performance degradation and application crashes.

You will find this term commonly used in Software Development, Performance Optimization

Lean IT

An extension of lean manufacturing and lean services principles to the development and management of information technology (IT) products and services. Its goal is to continuously improve the value delivered by IT services and products.

You will find this term commonly used in IT Management, Productivity

Lean Software Development

An adaptation of lean manufacturing principles and practices to the software development domain.

You will find this term commonly used in Software Engineering

Lean Software Engineering

Applying lean manufacturing principles to software development to enhance efficiency, reduce waste, and improve product value. It emphasizes continuous improvement, optimizing flow, and delivering quickly in response to customer needs.

You will find this term commonly used in Software Development

Lean Startup

A methodology for developing businesses and products that aims to shorten product development cycles by adopting a combination of business-hypothesis-driven experimentation, iterative product releases, and validated learning.

You will find this term commonly used in Business, Product Management

Learning Analytics

The measurement, collection, analysis, and reporting of data about learners and their contexts, for purposes of understanding and optimizing learning and the environments in which it occurs.

You will find this term commonly used in Education Technology, Data Analysis

Learning Curve

In the context of machine learning and general skill acquisition, the learning curve represents the rate at which performance improves as a function of experience or the amount of learning/training.

You will find this term commonly used in Education, Machine Learning

Learning Management System (LMS)

A software application for the administration, documentation, tracking, reporting, and delivery of educational courses or training programs.

You will find this term commonly used in Education Technology

Learning Rate

In machine learning, a parameter that determines the step size at each iteration while moving toward a minimum of a loss function. It's critical for training models efficiently and effectively.

You will find this term commonly used in Machine Learning

Leased Line

A private bidirectional or symmetric telecommunications circuit between two or more locations provided according to a commercial contract.

You will find this term commonly used in Networking

Leased Line Internet Connection

A private telecommunications circuit leased for exclusive use from a service provider, typically used by businesses to connect geographically distant offices. Unlike broadband, a leased line is not shared and offers symmetric data rates.

You will find this term commonly used in Networking

Least Common Denominator (LCD)

LCD is a term used in networking to describe the lowest level of functionality or compatibility shared among different devices or systems.

You will find this term commonly used in Networking

Least Common Multiple (LCM)

LCM is the smallest positive integer that is divisible by two or more numbers without leaving a remainder, often used in scheduling or resource allocation algorithms.

You will find this term commonly used in Mathematics

Least Connection Scheduling

A load balancing method that assigns new requests to the server with the fewest active connections. It's considered when distributing client requests in various types of networks to ensure even workload distribution.

You will find this term commonly used in Networking, Load Balancing

Least Cost Routing

Least cost routing is a telecommunications strategy that selects the most economical path for transmitting data or voice traffic based on predefined criteria such as cost or quality.

You will find this term commonly used in Networking

Least Privilege

A principle in computer security in which users are given the minimum levels of access – or permissions – needed to perform their duties.

You will find this term commonly used in Security, Cybersecurity

Least Privilege Principle

The least privilege principle is a security concept that advocates granting users only the minimum level of access or permissions required to perform their tasks.

You will find this term commonly used in Security

Least Recently Used (LRU)

LRU is a caching algorithm that evicts the least recently used items from a cache when the cache is full.

You will find this term commonly used in Algorithms

Least Significant Bit (LSB)

LSB is the bit position in a binary number representing the smallest value, often used in digital signal processing or cryptography.

You will find this term commonly used in Hardware/Security

Least Squares Regression

Least squares regression is a statistical method used to find the best-fitting line through a set of data points by minimizing the sum of the squares of the differences between observed and predicted values.

You will find this term commonly used in Data Analysis

LED (Light Emitting Diode)

A semiconductor light source that emits light when current flows through it. LEDs are used in a wide range of applications, including indicator lights, digital displays, and increasingly, general-purpose lighting.

You will find this term commonly used in Hardware, Electronics

LED Display

A display technology that uses light-emitting diodes to create images. LED displays are used in a wide range of applications, from small indicators to large outdoor advertising screens, because of their brightness, energy efficiency, and longevity.

You will find this term commonly used in Hardware, Display Technology

Left-Hand-Side (LHS) Operator

In programming, the left-hand side of an assignment statement, which identifies the memory location or variable that will receive the value of the right-hand side expression. It's fundamental in understanding how values are assigned and stored in programming.

You will find this term commonly used in Programming

Legacy Code

Legacy code refers to outdated or obsolete software code that is still in use but may be difficult to maintain or update.

You will find this term commonly used in Software Development

Legacy Code Refactoring

The process of restructuring existing computer code without changing its external behavior to improve nonfunctional attributes of the software. Refactoring legacy code is often undertaken to reduce complexity, improve readability, or make the code more maintainable.

You will find this term commonly used in Software Development

Legacy System

A legacy system is an outdated or obsolete computer system, software application, or technology that continues to be used.

You will find this term commonly used in General IT

Legal Tech

Technology used to support, enhance, and automate the practice of law. Legal tech includes software and tools for document management, legal research, case management, and more, aimed at law firms, courts, and legal departments.

You will find this term commonly used in Information Technology, Legal Industry

Legend

In the context of data visualization, a legend is a small area on a chart, graph, or map that explains the symbols, colors, or patterns used to represent the data.

You will find this term commonly used in Data Visualization

Legend in Data Visualization

An explanatory component of charts or graphs that helps decode the meanings of symbols, colors, or patterns used to represent data. It's essential for making data visualizations understandable and accessible to a wider audience.

You will find this term commonly used in Data Visualization

Level of Detail (LOD)

In computer graphics, a technique for increasing efficiency by decreasing the complexity of a 3D model representation as it moves away from the viewer or according to other metrics. It helps manage rendering load and improve performance.

You will find this term commonly used in Computer Graphics, Gaming

Leverage

Leverage refers to the strategic use of resources or technologies to gain a competitive advantage.

You will find this term commonly used in General IT

Leveraged Buyout (LBO)

A financial transaction in which a company is purchased with a combination of equity and significant amounts of borrowed money.

You will find this term commonly used in Finance/IT

Lexical Analysis

The process of converting a sequence of characters into a sequence of tokens (strings with an assigned and thus identified meaning).

You will find this term commonly used in Programming

What's Your
Career Path?
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass