IT Glossary - R - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Red Hat Certified Engineer (RHCE)

An advanced level certification that validates the skills, knowledge, and abilities required to be a senior system administrator responsible for Red Hat Enterprise Linux systems.

You will find this term commonly used in System Administration, Linux

Red Hat Enterprise Linux (RHEL)

An open source, enterprise-level Linux operating system developed by Red Hat.

You will find this term commonly used in General IT, Operating Systems

Red Team

In cybersecurity, a group that plays the role of an adversary to test or evaluate the security of a system.

You will find this term commonly used in Security, Cybersecurity

Red Team Exercises

Simulated cyber attacks against an organization's security posture to test its defenses.

You will find this term commonly used in Security, Cybersecurity

Red-Black Tree

A type of self-balancing binary search tree, used in computer science to implement associative arrays, and multi-dimensional indexes.

You will find this term commonly used in Algorithms, Data Structures

Redaction

The process of editing text for publication or removing sensitive information from a document before publication.

You will find this term commonly used in Security, Data Privacy

Redundancy

The duplication of critical components or functions of a system with the intention of increasing reliability of the system.

You will find this term commonly used in General IT, Networking

Redundant Power Supply

A power supply system designed to ensure that a system continues to operate in the event of one power supply failing.

You will find this term commonly used in Hardware, Reliability

Redux

An open-source JavaScript library for managing application state, commonly used with React for building user interfaces.

You will find this term commonly used in Software Development, Web Development

Redux Toolkit

A toolset for efficient Redux development, providing simplified APIs and utilities to reduce boilerplate code in projects using Redux.

You will find this term commonly used in Software Development, Web Development

Refactoring

The process of restructuring existing computer code without changing its external behavior, intended to improve nonfunctional attributes of the software.

You will find this term commonly used in Software Development, Quality Assurance

Reference Architecture

An authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions.

You will find this term commonly used in Software Development, System Architecture

Reference Data

Data used to categorize or classify other data within a system or application.

You will find this term commonly used in Data Management, Databases

Reflected XSS (Cross-Site Scripting)

A type of XSS attack where the malicious script is reflected off a web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request.

You will find this term commonly used in Security, Web Development

Reflection

In computer science, the ability of a program to examine and modify its own structure and behavior at runtime.

You will find this term commonly used in Software Development

Reflection API

An API that allows a program to perform operations on itself, such as inspecting classes and invoking methods at runtime.

You will find this term commonly used in Software Development

Refresh Rate

The number of times in a second that a display hardware updates its buffer. A higher refresh rate results in a smoother picture.

You will find this term commonly used in Hardware, Display Technology

Registry

In computing, a hierarchical database that stores low-level settings for the operating system and for applications that opt to use the registry.

You will find this term commonly used in General IT, Operating Systems

Registry Editor

A graphical tool in Windows that allows authorized users to view and edit the registry.

You will find this term commonly used in Operating Systems, Windows

Regression Analysis

A statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables, when the focus is on the relationship between a dependent variable and one or more independent variables.

You will find this term commonly used in Data Analysis, Machine Learning

Regression Testing

Regression testing is a software testing technique that verifies whether recent code changes have affected the existing functionality of an application, ensuring that previously developed and tested features still perform as intended.

You will find this term commonly used in Software Development, Testing

Regular Expression (Regex)

A sequence of characters that define a search pattern, mainly for use in pattern matching with strings.

You will find this term commonly used in Software Development, Data Processing

Regulatory Compliance

Adhering to laws, regulations, guidelines, and specifications relevant to business processes.

You will find this term commonly used in General IT, Compliance

Relational Algebra

A procedural query language, which takes instances of relations as input and yields instances of relations as output. It uses operators to perform queries.

You will find this term commonly used in Database

Relational Database

A database structured to recognize relations among stored items of information according to a relational model of data.

You will find this term commonly used in Database, Data Management

Relational Model

A database model based on first-order predicate logic, establishing a relationship among stored items of information.

You will find this term commonly used in Database, Data Modeling

Release Management

The process of managing, planning, scheduling, and controlling a software build through different stages and environments; including testing and deploying software releases.

You will find this term commonly used in Software Development, Project Management

Release Pipeline

The process and stages a code change goes through from development to deployment.

You will find this term commonly used in Software Development, DevOps

Reliability

The probability that a system will perform its intended function without failure under stated conditions for a specified period of time.

You will find this term commonly used in General IT, Quality Assurance

Remote Access

The ability to connect to and use a computer or network from a remote location, typically over the internet.

You will find this term commonly used in General IT

Remote Authentication Dial-In User Service (RADIUS)

A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.

You will find this term commonly used in Networking, Security

Remote Code Execution (RCE)

A security vulnerability that allows an attacker to execute arbitrary code on a victim's system remotely.

You will find this term commonly used in Security, Cybersecurity

Remote Desktop

Remote desktop refers to a technology that allows users to access and control a desktop or application hosted on a remote computer over a network connection, typically using remote desktop software or protocols.

You will find this term commonly used in Networking, Remote Work, Software Development

Remote Desktop Protocol (RDP)

A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.

You will find this term commonly used in Networking, Security

Remote Monitoring and Management (RMM)

A type of software designed to help managed IT service providers (MSPs) remotely and proactively monitor client endpoints, networks, and computers.

You will find this term commonly used in Networking, IT Management

Remote Procedure Call (RPC)

A protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details.

You will find this term commonly used in Networking, Distributed Systems

Remote Sensing

Remote sensing is the acquisition of information about an object or phenomenon without physical contact, typically using sensors mounted on satellites, aircraft, or drones to gather data about Earth's surface or atmosphere.

You will find this term commonly used in Environmental Monitoring, Geospatial Analysis

Replicated State Machine

A method of implementing fault-tolerance mechanisms in distributed computing systems by ensuring that multiple copies of data are kept in sync across different servers.

You will find this term commonly used in Distributed Systems, Fault Tolerance

Replication

The process of copying and maintaining database objects, like tables, in multiple database servers that are distributed across different physical locations.

You will find this term commonly used in Database, General IT

Replication Factor

In distributed computing, the number of copies of data that are kept in a distributed storage system to ensure data availability and durability.

You will find this term commonly used in Database, Distributed Systems

Reporting Tools

Software applications that collect data from various sources, process it, and present it in a readable format.

You will find this term commonly used in Data Analysis, Business Intelligence

Repository

In version control systems, a repository is a central file storage location. It is used by version control systems to store multiple versions of files.

You will find this term commonly used in Software Development

Repository Pattern

A design pattern that mediates between the domain and data mapping layers, acting like an in-memory domain object collection.

You will find this term commonly used in Software Development, Design Patterns

Request for Comments (RFC)

A publication from the technology community to describe methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.

You will find this term commonly used in Networking, Standards

Request Throttling

Limiting the number of user requests to a service within a certain timeframe to prevent overuse of resources.

You will find this term commonly used in Web Development, Security

Requirements Analysis

The process of determining user expectations for a new or modified product.

You will find this term commonly used in Software Development, Project Management

Residual Risk

The risk that remains after all efforts to identify and eliminate risk have been made.

You will find this term commonly used in Security, Risk Management

Resilience

The ability of a system to handle and recover from faults and failures.

You will find this term commonly used in General IT, Security

Resolution

In display technology, the number of distinct pixels that can be displayed in each dimension. In networking, the process of resolving a domain name to its corresponding IP address.

You will find this term commonly used in Hardware, Networking

Resource Allocation

The process of assigning and managing assets in a manner that supports an organization's strategic goals.

You will find this term commonly used in General IT, Project Management

What's Your
Career Path?
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass