IT Glossary - M - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mixed Reality (MR)

The merging of real and virtual worlds to produce new environments and visualizations where physical and digital objects co-exist and interact in real-time.

You will find this term commonly used in Virtual/Augmented Reality

Mobile Ad Hoc Network (MANET)

A continuously self-configuring, infrastructure-less network of mobile devices connected without wires. MANETs are a kind of wireless ad hoc network that usually has a routable networking environment on top of a Link Layer ad hoc network.

You will find this term commonly used in Networking, Mobile Computing

Mobile Application

Software designed to run on mobile devices such as smartphones and tablets, providing specific functionality or services.

You will find this term commonly used in General IT

Mobile Application Developer

Designs and develops applications for mobile devices, focusing on creating engaging and functional user experiences.

You will find this term commonly used in Mobile Development, Software Development

Mobile Application Development

Mobile application development is the process of creating software applications that are designed to run on mobile devices such as smartphones and tablets.

You will find this term commonly used in Mobile Applications, Software Development

Mobile Backend as a Service (MBaaS)

A model for providing web and mobile app developers with a way to link their applications to backend cloud storage and APIs exposed by back end applications while also providing features such as user management, push notifications, and integration with social networking services.

You will find this term commonly used in Mobile Development, Cloud Computing

Mobile Broadband

High-speed internet access provided through mobile phone towers to computers, mobile phones, or other devices.

You will find this term commonly used in Networking, Telecommunications

Mobile Computing

The use of portable computing devices such as smartphones, tablets, and laptops to access and process information.

You will find this term commonly used in General IT

Mobile Device Management

Mobile device management (MDM) is a security software solution that enables organizations to manage and secure mobile devices such as smartphones and tablets used by their employees.

You will find this term commonly used in Security, Mobile Applications, Device Management

Mobile Device Security

Mobile device security refers to measures and technologies implemented to protect mobile devices such as smartphones and tablets from security threats, breaches, and unauthorized access.

You will find this term commonly used in Security, Mobile Applications, Cybersecurity

Mobile Edge Computing

Mobile edge computing (MEC) is a network architecture that brings computing and storage resources closer to the edge of the network, enabling faster processing and lower latency for mobile applications.

You will find this term commonly used in Networking, Mobile Applications, Edge Computing

Mobile First Design

An approach to web design and development that prioritizes the mobile experience over desktop. The practice involves designing an online experience for mobile before designing it for the desktop Web or any other device.

You will find this term commonly used in Web Development, UI/UX Design

Mobile Operating System

A mobile operating system is the software platform that manages hardware and provides core services and functionality for mobile devices such as smartphones and tablets.

You will find this term commonly used in Mobile Applications, Operating Systems

Mobile Payment

Mobile payment, also known as mobile money or mobile wallet, refers to the use of smartphones or other mobile devices to make financial transactions, either online or at physical locations.

You will find this term commonly used in Mobile Applications, E-commerce

Mobile Security

Mobile security encompasses measures and technologies designed to protect mobile devices, data, and networks from security threats, breaches, and unauthorized access.

You will find this term commonly used in Security, Mobile Applications, Cybersecurity

Mobile Virtualization

Mobile virtualization is the process of creating virtualized instances of mobile devices, enabling multiple operating systems or applications to run independently on a single physical device.

You will find this term commonly used in Virtualization, Mobile Applications

Modbus

A serial communication protocol developed for industrial applications, specifically to connect electronic equipment. It allows the communication among many devices connected to the same network, for example, a system that measures temperature and humidity and communicates the results to a computer.

You will find this term commonly used in Industrial IT, Networking

Model

In software development, particularly in model-driven engineering and domain-driven design, a model is a simplified representation of the structure and behavior of a system, used to understand and predict its performance.

You will find this term commonly used in Software Development, Systems Design

Model-Driven Engineering (MDE)

A software development methodology focusing on creating and exploiting domain models, which are conceptual models of all the topics related to a specific problem.

You will find this term commonly used in Software Development, IT Management

Model-View-Controller (MVC)

A software architectural pattern that separates an application into three main logical components: the model, the view, and the controller.

You will find this term commonly used in Software Development

Model-View-ViewModel (MVVM)

An architectural pattern used in software engineering that facilitates the separation of the development of the graphical user interface from the development of the business logic or back-end logic.

You will find this term commonly used in Software Development

Modem

A device that modulates and demodulates digital data for transmission over telephone lines or other communication channels.

You will find this term commonly used in Networking

Modular Design

A design approach that subdivides a system into smaller parts (modules) that can be independently created and then used in different systems to drive multiple functionalities.

You will find this term commonly used in Software Development, General IT

Modular Programming

A software design technique that emphasizes separating the functionality of a program into independent, interchangeable modules.

You will find this term commonly used in Software Development

Modularity in Software Design

A design principle that divides a system into smaller parts called modules, each of which can be developed, tested, and managed independently.

You will find this term commonly used in Software Development, General IT

Modulation

The process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted.

You will find this term commonly used in Telecommunications

Modulation Techniques

Methods used to encode digital information onto an analog carrier signal, including amplitude, frequency, and phase modulation techniques. Crucial in telecommunications.

You will find this term commonly used in Telecommunications, Networking

Module

A self-contained unit of software that encapsulates a specific functionality, which can be used interchangeably with other modules to build complex systems.

You will find this term commonly used in Software Development

Momentary Switch

A type of switch that is only active as long as it's being activated or pressed. Commonly used in various computing and electronic devices.

You will find this term commonly used in Hardware

Monero

A secure, private, and untraceable cryptocurrency that is open-source and accessible to all. It uses a special kind of cryptography to ensure that all its transactions remain 100% unlinkable and untraceable.

You will find this term commonly used in Cryptocurrency

MongoDB

A cross-platform document-oriented database program that uses JSON-like documents with optional schemas.

You will find this term commonly used in Databases

Monolithic Architecture

A software development model where the application is built as a single and indivisible unit, typically suited for small to medium-sized applications.

You will find this term commonly used in Software Development

Monorepo

A development strategy where code for many projects is stored in the same repository. Advocates argue it simplifies management of dependencies and cross-project changes.

You will find this term commonly used in Software Development

Monotonic Function

In mathematics and computer science, a function that preserves the given order when mapped from one space to another, ensuring consistency in algorithms, especially in optimization problems.

You will find this term commonly used in Algorithms, Mathematics

Moore's Law

An observation stating that the number of transistors on integrated circuits doubles approximately every two years, leading to exponential growth in computing power.

You will find this term commonly used in General IT

Moore's Paradox

A situation in computing where the number of transistors on microchips doubles approximately every two years, leading to exponential increases in computing power and efficiency.

You will find this term commonly used in Hardware, Electronics

Moore's Second Law

Also known as Rock's Law, it suggests that the capital cost of a semiconductor fabrication plant doubles approximately every four years. It is a counterpart to Moore's Law, which predicts the increase in transistor density and hence processing power.

You will find this term commonly used in Hardware, Semiconductors

Morphing

In computer graphics, morphing is an animation technique in which one image is gradually transformed into another. This technique can be used in various applications, including film, television, advertising, and video games.

You will find this term commonly used in Computer Graphics, Animation

Morse Code

A method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes.

You will find this term commonly used in Telecommunications

Motion Graphics

Animation or digital footage creating the illusion of motion, often combined with audio for use in multimedia projects.

You will find this term commonly used in General IT, Media

Mouseover

A graphical control element that is activated when the mouse is hovered over it. Used in web design and software applications.

You will find this term commonly used in Software Development, Web Development

MPL (Microsoft Public License)

A free and open source software license released by Microsoft. It allows the software to be freely used, modified, and redistributed.

You will find this term commonly used in Software Development, Security

MPLS (Multiprotocol Label Switching)

A technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses.

You will find this term commonly used in Networking

MQTT (Message Queuing Telemetry Transport)

A lightweight, publish-subscribe network protocol that transports messages between devices.

You will find this term commonly used in IoT, Networking

MUD (Multi-User Dungeon)

A multiplayer real-time virtual world, usually text-based. MUDs combine elements of role-playing games, hack and slash, player versus player, interactive fiction, and online chat.

You will find this term commonly used in Gaming, Online Communities

Multi-cloud

Multi-cloud is a cloud computing strategy that involves using services and resources from multiple cloud providers, aiming to avoid vendor lock-in, increase redundancy, and optimize performance and cost.

You will find this term commonly used in Cloud Computing

Multi-factor Authentication

A security measure that requires users to provide two or more forms of verification before granting access to a system or application.

You will find this term commonly used in Security

Multi-Programming

A method of operating system process management that allows more than one process to be loaded into the executable memory at a time and running part of it.

You will find this term commonly used in Software Development, Operating Systems

Multi-Site Hosting

A web hosting setup that allows multiple websites to be hosted on a single server, often used to efficiently manage resources and reduce costs.

You will find this term commonly used in Web Development, Hosting

Multi-tenancy

Multi-tenancy is a software architecture where a single instance of a software application serves multiple tenants (users or organizations), each with its own isolated data and configuration.

You will find this term commonly used in General IT, Cloud Computing

What's Your
Career Path?
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass