IT Glossary - R - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Root of Trust

A set of functions in the trusted computing module that is always trusted by the operating system.

You will find this term commonly used in Security, Hardware

Rootkit

Malicious software that provides unauthorized access to a computer system while concealing its presence from users and security tools.

You will find this term commonly used in Cybersecurity

Round Robin

A scheduling algorithm that is most commonly used in networking and operating systems to distribute tasks among resources.

You will find this term commonly used in Networking, Operating Systems

Round Robin Scheduling

A scheduling algorithm in computing that assigns work in equal portions, in order, to each resource, in a circular manner.

You will find this term commonly used in Operating Systems, Scheduling

Round-Trip Time (RTT)

The time it takes for a signal to go from the source to the destination plus the time it takes for an acknowledgment of that signal to be received back at the source.

You will find this term commonly used in Networking, Internet

Route Aggregation

The process of combining several routes into a single advertisement to reduce the size of routing tables.

You will find this term commonly used in Networking, Internet

Route Optimization

The process of determining the most cost-efficient route. It's not just about finding the shortest path between points, but also optimizing for other factors such as cost, time, and resource availability.

You will find this term commonly used in Networking, Logistics

Router

A networking device that forwards data packets between computer networks, typically using IP addresses.

You will find this term commonly used in Networking

Routing Protocol

A protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network.

You will find this term commonly used in Networking

Routing Table

A data table stored in a router or a networked computer that lists the routes to particular network destinations.

You will find this term commonly used in Networking, Internet

Row-Level Security

A feature of many modern databases that allows database administrators to control access to rows in a database table based on the characteristics of the user executing a query.

You will find this term commonly used in Database, Security

RPC (Remote Procedure Call)

A protocol that one program can use to request a service from a program located on another computer in a network.

You will find this term commonly used in Networking, Distributed Systems

RSA (Rivest-Shamir-Adleman)

A public-key cryptosystem that is widely used for secure data transmission.

You will find this term commonly used in Security, Cryptography

RSA Algorithm

A public-key cryptosystem that is widely used for secure data transmission. It's based on the difficulty of factoring the product of two large prime numbers.

You will find this term commonly used in Security, Cryptography

RSA Encryption

A public-key cryptosystem that is widely used for secure data transmission. Named after its inventors Rivest, Shamir, and Adleman.

You will find this term commonly used in Security, Cryptography

RSS (Really Simple Syndication)

A web feed format used to publish frequently updated content, such as blog posts or news articles, in a standardized format.

You will find this term commonly used in General IT, Web

Rubber Duck Debugging

A method of debugging code by explaining it, line by line, to an inanimate object, like a rubber duck, to understand the problem more clearly.

You will find this term commonly used in Software Development, Debugging

Ruby

A dynamic, object-oriented programming language known for its simplicity and productivity.

You will find this term commonly used in General IT, Programming

Ruby on Rails

A popular open-source web application framework written in Ruby, known for its simplicity and productivity.

You will find this term commonly used in General IT, Web

Ruby on Rails (Rails)

A server-side web application framework written in Ruby under the MIT License. It is a model–view–controller (MVC) framework, providing default structures for a database, a web service, and web pages.

You will find this term commonly used in Software Development, Web Development

RubyGems

A package manager for the Ruby programming language that provides a standard format for distributing Ruby programs and libraries.

You will find this term commonly used in Software Development, Web Development

Rule-Based System

A system that uses rules as the knowledge representation basis to solve problems.

You will find this term commonly used in AI, Expert Systems

Runtime

The period during which a program is running. It begins when a program is opened (or executed) and ends when the program is closed.

You will find this term commonly used in Software Development, General IT

Runtime Configuration

The process of setting and adjusting options and parameters of software applications during runtime without requiring a restart or redeployment.

You will find this term commonly used in Software Development, Configuration Management

Runtime Environment

A system for executing computer programs. Often, it is used synonymously with runtime system and runtime library.

You will find this term commonly used in Software Development, General IT

Runtime Error

An error that occurs during the execution of a program, as opposed to compilation errors.

You will find this term commonly used in Software Development, Debugging

Runtime Library

A collection of software programs used at program runtime to provide one or more native program functions or services.

You will find this term commonly used in Software Development, General IT

Runtime Optimization

Techniques and processes applied during the execution of a program to enhance performance and efficiency dynamically.

You will find this term commonly used in Software Development, Performance

Runtime Polymorphism

A process in object-oriented programming that allows a function to use variables of different types at runtime.

You will find this term commonly used in Software Development, Programming Concepts

Rust

A multi-paradigm programming language designed for performance and safety, especially safe concurrency.

You will find this term commonly used in Software Development

Rust Libraries

Collections of pre-compiled routines or functions that a program can use to optimize tasks.

You will find this term commonly used in Software Development

Rust Programming Language

A language focused on speed, memory safety, and parallelism, emphasizing safe concurrency and memory management without a garbage collector.

You will find this term commonly used in Software Development

RWD (Responsive Web Design)

An approach to web design that makes web pages render well on a variety of devices and window or screen sizes.

You will find this term commonly used in Web Development, Design

What's Your
Career Path?
Google DevOps Engineer Career Path
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Information Security Specialist
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Career Path
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Career Path
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Just Released

CompTIA Authorized Partner

All New 2025 CompTIA A+ Training

Get ready for the updated 220-1201 & 220-1202 exams with our brand-new CompTIA A+ training—designed to help you pass with confidence and start your IT career strong. Access this course and over 2,900 hours of expert-led IT training when you sign up for any of our All-Access Passes. Don’t miss out—enroll now and start learning today!

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass