IT Glossary - M - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

M-Commerce

Short for mobile commerce, it refers to the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.

You will find this term commonly used in E-commerce, Mobile Computing

M-learning (Mobile Learning)

The delivery of learning, education, or learning support on mobile phones, PDAs or tablets. It's an extension of e-learning.

You will find this term commonly used in General IT, Education

M2M Communications

Refers to the technologies that enable machines to communicate with each other without human intervention.

You will find this term commonly used in IoT, Networking

MaaS (Monitoring as a Service)

A delivery model that allows the monitoring of various cloud services by a third party or an internal IT department, providing a unified view of service performance and operational health.

You will find this term commonly used in Cloud Computing, Services

MAC Address

A unique identifier assigned to network interfaces for communications on a network.

You will find this term commonly used in Networking

MAC Filtering

A security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.

You will find this term commonly used in Networking, Security

Machine Code

Low-level instructions that are directly executed by a computer's CPU, typically represented in binary form.

You will find this term commonly used in General IT

Machine Identity Management

The practice of managing digital identities used by machines and applications (such as certificates, API keys, and service accounts) to enable secure communication and interactions in IT systems.

You will find this term commonly used in Security, Cybersecurity

Machine Learning

A subset of artificial intelligence that enables systems to learn and improve from experience without being explicitly programmed.

You will find this term commonly used in AI

Machine Learning Engineer

Designs and develops machine learning and deep learning systems and algorithms.

You will find this term commonly used in AI, Machine Learning

Machine Translation

Machine translation is the use of computer algorithms to translate text or speech from one language to another automatically, often leveraging techniques from natural language processing.

You will find this term commonly used in AI, Natural Language Processing

Machine Type

Refers to the classification of computers based on their architecture, operating systems, and processing capabilities.

You will find this term commonly used in General IT, Hardware

Machine Type Communication (MTC)

Refers to communication that occurs between machines without human intervention, often used in IoT contexts.

You will find this term commonly used in IoT, Networking

Machine Vision

Machine vision involves the use of cameras, sensors, and image processing algorithms to enable computers to interpret and understand visual information, similar to how humans perceive and interpret images.

You will find this term commonly used in AI, Robotics

Machine-to-Machine (M2M)

Refers to direct communication between devices using any communications channel, including wired and wireless.

You will find this term commonly used in Networking, IoT

macOS

An operating system developed by Apple Inc. for its Mac line of computers, known for its user-friendly interface.

You will find this term commonly used in General IT

Macro

A rule or pattern that specifies how a certain input sequence should be mapped to a replacement output sequence according to a defined procedure. Often used in software for automation.

You will find this term commonly used in Software Development, Productivity

Magnetic Disk

A storage device that uses magnetic storage to record and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

You will find this term commonly used in Hardware, Storage

Magnetic Storage

Storage technology that uses magnetized material to store data, such as hard disk drives (HDDs) and magnetic tape.

You will find this term commonly used in General IT

Mail Relay

An email server that transfers email messages from one server to another. Often used to route emails from a client to a mail server or between mail servers.

You will find this term commonly used in Networking, Email

Mail Transfer Agent (MTA)

Software that transfers electronic mail messages from one computer to another using a client-server application architecture.

You will find this term commonly used in Networking, Email Systems

Main Memory

The primary storage in a computer that holds the operating system, application programs, and data in current use for quick access by the computer's processor.

You will find this term commonly used in General IT, Hardware

Mainboard

Also known as a motherboard, it's the main printed circuit board (PCB) in general-purpose computers and other expandable systems which holds many of the crucial electronic components.

You will find this term commonly used in Hardware

Mainframe

A powerful computer used primarily by large organizations for critical applications, such as processing transactions and managing databases.

You will find this term commonly used in General IT

Mainframe Virtualization

The process of dividing a mainframe's resources into multiple virtual machines, allowing for the efficient utilization and management of these powerful systems.

You will find this term commonly used in Virtualization

Maintenance Programming

The modification of a software product after delivery to correct faults, to improve performance or other attributes, or to adapt the product to a changed environment.

You will find this term commonly used in Software Development

Maintenance Release

A software update released to fix bugs, vulnerabilities, and minor performance issues without adding new features to the system.

You will find this term commonly used in Software Development, Maintenance

Makefile

A file containing a set of directives used by a make build automation tool to generate a target/goal.

You will find this term commonly used in Software Development, Automation

Malicious Software

Software that is intentionally designed to cause damage to a computer, server, client, or computer network.

You will find this term commonly used in Cybersecurity

Malicious Software (Malware)

Any software intentionally designed to cause damage to a computer, server, client, or computer network.

You will find this term commonly used in Security, Cybersecurity

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

You will find this term commonly used in Cybersecurity

Malware Analysis

The process of examining malware samples to understand their behavior, purpose, and potential impact.

You will find this term commonly used in Cybersecurity

Man-in-the-Middle (MITM) Attack

A cyber attack where a malicious actor intercepts and possibly alters communication between two parties without their knowledge.

You will find this term commonly used in Cybersecurity

Managed Code

Code that is executed by a virtual machine instead of directly by the CPU, providing features like garbage collection and type safety.

You will find this term commonly used in Software Development

Managed Hosting

A service model in which a hosting provider leases dedicated servers and associated hardware to a single client, with the provider managing those systems on the client's behalf.

You will find this term commonly used in Web Hosting, Cloud Computing

Managed Object

In network management, a physical or virtual component of the network that can be managed or monitored.

You will find this term commonly used in Networking, Network Management

Managed Print Services (MPS)

A service offered by external providers to optimize or manage a company’s document output to certain objectives.

You will find this term commonly used in IT Management

Managed Security Service Provider (MSSP)

An IT service provider that specializes in providing security services such as cyber security monitoring and management.

You will find this term commonly used in Security, Cybersecurity

Managed Services

Managed services refer to the practice of outsourcing the responsibility for maintaining and managing certain IT functions and systems to a third-party service provider.

You will find this term commonly used in General IT, Outsourcing

Management Console

A graphical user interface or command-line tool that provides administrators and users with the ability to manage and monitor applications, services, or infrastructure.

You will find this term commonly used in General IT, Networking

Management Information System (MIS)

An organized collection of hardware, software, infrastructure, data, and policies designed to generate and disseminate useful information to managers and other personnel in an organization.

You will find this term commonly used in General IT, Data Management

Manifest File

A file in software development that contains metadata for a group of accompanying files that are part of a set or project.

You will find this term commonly used in Software Development

Manual Penetration Testing

A method of evaluating the security of a computer system or network by simulating an attack from a malicious source, conducted manually by security experts.

You will find this term commonly used in Cybersecurity

Manual Testing

The process of manually testing software for defects by a tester who plays the role of an end user to ensure that all the features of an application are working correctly.

You will find this term commonly used in Software Development, Testing

Manufacturing Execution System (MES)

A control system for managing and monitoring work-in-process on a factory floor to ensure the effective execution of manufacturing operations.

You will find this term commonly used in Industrial IT, Manufacturing

MapKit

A programming interface provided by Apple that allows developers to integrate mapping data and services into their applications.

You will find this term commonly used in Software Development, Mobile Apps

Mapping

Relates to various computing disciplines including data structures, data storage and retrieval, computer graphics, and networking, referring to the process of linking two or more disparate elements or datasets.

You will find this term commonly used in General IT, Data Management

MapReduce

A programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.

You will find this term commonly used in Big Data, Cloud Computing

Markdown

A lightweight markup language with plain-text-formatting syntax, designed so that it can be converted to HTML and many other formats.

You will find this term commonly used in Software Development, Documentation

Markdown Processing

The process of converting Markdown text (a lightweight markup language) into HTML or other formats, used to create formatted text using a plain-text editor.

You will find this term commonly used in Web Development, Documentation

What's Your
Career Path?
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass