IT Glossary - M - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Message Signature

A digital code (generated and authenticated by public key cryptography) attached to an electronically transmitted message to verify its contents and the sender's identity.

You will find this term commonly used in Cybersecurity, Networking

Message-Oriented Middleware (MOM)

Software or hardware infrastructure supporting sending and receiving messages between distributed systems.

You will find this term commonly used in Networking, Software Development

Metadata

Data that provides information about other data, such as file size, creation date, or author.

You will find this term commonly used in General IT

Metadata Catalog

A repository of data descriptions and dataset information, making it easier for analysts and data scientists to find, understand, and manage data.

You will find this term commonly used in Data Management

Metadata Discovery

The process of identifying and extracting metadata from various data sources, which is essential for data management and integration projects.

You will find this term commonly used in Data Management

Metadata Extraction

The process of identifying and extracting key information from various types of data, such as file properties or database records.

You will find this term commonly used in Data Management

Metadata Harvesting

The process of collecting metadata from various sources to provide a consolidated view of information across systems.

You will find this term commonly used in Data Management, Web Development

Metadata Management

The process of organizing, storing, and managing metadata to ensure its accuracy, consistency, and usability.

You will find this term commonly used in General IT

Metadata Repository

A metadata repository is a centralized database or system that stores and manages metadata, providing a unified view and access to metadata across an organization's IT systems and applications.

You will find this term commonly used in Data Management

Metadata Synchronization

The process of ensuring that metadata (data about data) remains consistent and up to date across different systems, databases, or storage locations.

You will find this term commonly used in Data Management, Networking

Method Chaining

A programming technique that allows multiple methods to be called on the same object in a single line of code.

You will find this term commonly used in Software Development

Method Overloading

A feature that allows a class to have more than one method having the same name, if their parameter lists are different.

You will find this term commonly used in Software Development, Programming

MIB (Management Information Base)

A database used for managing the entities in a communication network. It is used in Simple Network Management Protocol (SNMP) for network monitoring.

You will find this term commonly used in Networking

Micro-Optimization

The process of making very small changes in a system's code or configuration to improve performance, often at a very detailed or low level.

You will find this term commonly used in Software Development, Performance Optimization

Micro-SIM

A smaller version of a SIM (Subscriber Identity Module) card used in mobile devices for storing data identifying the mobile subscriber.

You will find this term commonly used in Telecommunications

Micro-Virtualization

A security technology that isolates individual tasks on a computer in their own virtual environments, preventing malware from affecting other tasks or the system at large.

You will find this term commonly used in Cybersecurity, Virtualization

Microblog

A form of blogging that allows users to write brief text updates (usually less than 200 characters) and publish them, either to be viewed by anyone or by a restricted group.

You will find this term commonly used in Social Media

Microblogging

A form of blogging that allows users to write brief text updates (usually less than 200 characters) and publish them, either to be viewed by anyone or by a restricted group.

You will find this term commonly used in Social Media, Web Development

Microblogging Platform

An online platform that allows users to post short messages or updates. Examples include Twitter and Tumblr.

You will find this term commonly used in Social Media, Communication

Microcode

A layer of hardware-level instructions or data structures involved in the implementation of higher-level machine code instructions in complex instruction set computers, typically for the purpose of improving performance, security, or both.

You will find this term commonly used in Hardware, Programming

Microcontroller

A compact integrated circuit designed to govern a specific operation in an embedded system.

You will find this term commonly used in Hardware, Embedded Systems

Microdata

A specification used to nest metadata within existing content on web pages.

You will find this term commonly used in Web Development, SEO

Microkernel

A minimalistic computer operating system kernel designed to provide the most basic services to all other parts of the operating system and run in the privileged CPU mode. Unlike monolithic kernels, which include a wide variety of services within the kernel itself, a microkernel tries to run most services in user space to improve maintainability and security.

You will find this term commonly used in Operating Systems, Software Architecture

Microprocessor

An integrated circuit that contains the functions of a central processing unit (CPU) on a single chip.

You will find this term commonly used in General IT

Microsegmentation

Microsegmentation is a security technique that divides a network into smaller, isolated zones to enhance security by controlling and restricting lateral movement of threats within the network.

You will find this term commonly used in Security, Networking, Cybersecurity

Microservices

A software development approach where applications are divided into small, independently deployable services that communicate via APIs.

You will find this term commonly used in General IT

Microservices Architecture

Microservices architecture is an architectural style that structures software applications as a collection of loosely coupled, independently deployable services, each responsible for specific business functions, enabling scalability and agility.

You will find this term commonly used in Software Architecture, Cloud Computing, Scalability

Microsoft

Offers certifications for its products and technologies, including Azure, Office 365, and Windows Server, catering to various roles like administrators, developers, and solutions architects.

You will find this term commonly used in Cloud Computing, Product-specific Technologies

Microsoft Azure

A cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers.

You will find this term commonly used in Cloud Computing, Web Services

Microsoft Certified: Azure Administrator Associate

Validates skills in implementing, managing, and monitoring an organization’s Microsoft Azure environment.

You will find this term commonly used in Cloud Computing

Microsoft Certified: Azure Data Scientist Associate

Demonstrates the ability to apply data science and machine learning to implement and run machine learning workloads on Azure.

You will find this term commonly used in Data Science, Cloud Computing

Microsoft Certified: Azure Solutions Architect Expert

Demonstrates expertise in computing, networking, storage, and security for designing solutions that run on Azure.

You will find this term commonly used in Cloud Computing

Microsoft Certified: Data Analyst Associate

Validates the ability to transform, visualize, and analyze data using Microsoft Power BI.

You will find this term commonly used in Data Analysis

Microsoft Certified: Dynamics 365 Fundamentals

Demonstrates understanding of Microsoft Dynamics 365; its business applications, cloud solutions, and benefits.

You will find this term commonly used in CRM, ERP

Microsoft Certified: Security, Compliance, and Identity Fundamentals

Covers the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

You will find this term commonly used in Security, Compliance

Microsoft Office

A suite of office productivity applications that includes Word, Excel, PowerPoint, and more.

You will find this term commonly used in General IT, Productivity

Microsoft SQL Server

A relational database management system developed by Microsoft.

You will find this term commonly used in Databases

Middleware

Software that acts as an intermediary between different applications, enabling communication and data management.

You will find this term commonly used in General IT

Middleware Framework

Software that provides common services and capabilities to applications outside of what's offered by the operating system.

You will find this term commonly used in Software Development

Middleware Integration

Middleware integration involves the integration of various middleware components and systems to facilitate seamless communication and data exchange between different applications and platforms.

You will find this term commonly used in Integration, General IT, Software Development

Middleware Management

The process of managing the software that provides common services and capabilities to applications outside of what's offered by the operating system, facilitating communication and data management.

You will find this term commonly used in Software Development, IT Management

Middleware Services

Software that provides common services and capabilities to applications beyond those offered by the operating system. This software mediates interaction between application components or between applications and the network.

You will find this term commonly used in Software Development, Networking

Migration

The process of moving data, applications, or other business elements from one environment to another.

You will find this term commonly used in General IT, Cloud Computing

Migration Path

A detailed plan that describes the process of moving from one system to another, covering data, applications, and hardware.

You will find this term commonly used in Cloud Computing, IT Infrastructure

MIME (Multipurpose Internet Mail Extensions)

A standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs.

You will find this term commonly used in Email Systems, Networking

MIME Type

A standard that indicates the nature and format of a document, file, or assortment of bytes. It stands for Multipurpose Internet Mail Extensions Type.

You will find this term commonly used in General IT, Web Development

Minification

The process of removing all unnecessary characters from source code without changing its functionality, used to reduce file size and improve load times in web development.

You will find this term commonly used in Web Development

Miracast

A standard for wireless connections from devices (such as laptops, tablets, or smartphones) to displays (such as TVs, monitors, or projectors). It allows for screen mirroring.

You will find this term commonly used in Networking, General IT

Mirror Site

An exact replica of a website or set of files hosted on a server at a different location to reduce network traffic, improve access speed, or improve availability.

You will find this term commonly used in Networking, Web Development

Mirroring

A redundancy solution that involves maintaining copies of a database, disk, or server to ensure continuous availability and minimize downtime in the event of hardware failure or maintenance.

You will find this term commonly used in Data Storage, Disaster Recovery

What's Your
Career Path?
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass