IT Glossary - S - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

SNMP Trap

A message sent by an SNMP-enabled device to a management station, indicating that an event has occurred.

You will find this term commonly used in Networking, Network Management

SOAR (Security Orchestration, Automation, and Response)

Technologies that enable organizations to collect inputs monitored by the security operations team.

You will find this term commonly used in Security, Cybersecurity

Social Engineering

The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.

You will find this term commonly used in Cybersecurity

Social Media

Websites and applications that enable users to create and share content or to participate in social networking.

You will find this term commonly used in General IT, Communication

Social Media Analytics

The practice of gathering data from social media websites and analyzing that data using social media analytics tools to make business decisions.

You will find this term commonly used in General IT, Marketing

Software

Programs and applications that run on a computer system, including operating systems, utilities, and applications.

You will find this term commonly used in General IT, Programming

Software Architect

Makes high-level design choices and dictates technical standards, including software coding standards, tools, and platforms.

You will find this term commonly used in Software Development, Architecture

Software Architecture

The high-level structure of a software system, including its components and their interactions.

You will find this term commonly used in General IT, Development

Software as a Product

Software developed for sale or distribution to end-users as a standalone product, as opposed to software developed for internal use within an organization.

You will find this term commonly used in General IT, Business

Software as a Service (SaaS)

A software delivery model where applications are hosted by a third-party provider and accessed over the internet.

You will find this term commonly used in General IT

Software as a Solution (SaaS)

See "SaaS (Software as a Service)"

You will find this term commonly used in Cloud Computing, General IT

Software Asset Management (SAM)

The process of managing and optimizing the purchase, deployment, maintenance, and disposal of software assets within an organization.

You will find this term commonly used in General IT, Networking

Software Bug

An error or flaw in a computer program that produces unexpected or incorrect results.

You will find this term commonly used in General IT

Software Composition Analysis (SCA)

The process of automatically identifying and assessing the risk of open source software within a codebase or application.

You will find this term commonly used in Software Development, Security

Software Configuration

The process of setting up software options to meet specific requirements, which may involve customizing how the software looks or operates.

You will find this term commonly used in Software Development, IT Management

Software Configuration Management

The process of managing changes to software systems, including version control, build management, and release management.

You will find this term commonly used in Project Management, General IT

Software Defined Networking (SDN)

Software-defined networking (SDN) is a network architecture approach that separates the control plane from the data plane, enabling centralized management and programmability of network infrastructure through software-based controllers.

You will find this term commonly used in Networking, Virtualization, Network Management

Software Defined Storage

Software-defined storage (SDS) is a storage architecture that separates storage hardware from software management and control, enabling centralized and automated management of storage resources across heterogeneous environments.

You will find this term commonly used in Storage, Virtualization, Cloud Computing

Software Defined Storage (SDS)

A storage architecture that separates storage hardware from software management, enabling flexibility, scalability, and automation.

You will find this term commonly used in Storage, General IT

Software Deployment

The process of installing, configuring, and making software available for use.

You will find this term commonly used in General IT, Development

Software Design Pattern

A general, reusable solution to a commonly occurring problem within a given context in software design.

You will find this term commonly used in Software Development, Programming

Software Development

The process of creating software programs or applications.

You will find this term commonly used in General IT

Software Development Kit (SDK)

A software development kit (SDK) is a set of tools, libraries, and documentation provided by software vendors or platforms to facilitate the development of applications for specific operating systems, frameworks, or platforms.

You will find this term commonly used in Software Development, Tools, Platform Integration

Software Development Life Cycle (SDLC)

The Software Development Life Cycle (SDLC) is a process framework used in software development to plan, design, build, test, deploy, and maintain software systems, ensuring quality, efficiency, and adherence to project requirements.

You will find this term commonly used in Software Development, Project Management

Software Development Lifecycle (SDLC)

The process of planning, creating, testing, and deploying software applications or systems.

You will find this term commonly used in General IT

Software Development Methodology

A software development methodology is a framework or process model used in software engineering to structure, plan, and control the development of software systems, defining principles, phases, and practices to guide the development process.

You will find this term commonly used in Software Development, Project Management

Software Engineer

Applies engineering principles to the design, development, maintenance, testing, and evaluation of software and systems.

You will find this term commonly used in Software Development, Engineering

Software Engineering

The application of engineering principles to software development.

You will find this term commonly used in General IT

Software Licensing

The legal agreements and terms that govern the use, distribution, and redistribution of software.

You will find this term commonly used in Legal, General IT

Software Maintenance

Software maintenance is the process of modifying, updating, and enhancing software applications or systems after their initial deployment, typically to fix bugs, improve performance, or add new features and functionalities.

You will find this term commonly used in Software Development, Maintenance

Software Patch

A piece of software designed to update or fix problems with a computer program.

You will find this term commonly used in Security

Software Piracy

The unauthorized copying, distribution, or use of software. It is illegal and considered a breach of copyright law.

You will find this term commonly used in Legal, Software Management

Software Quality Assurance (SQA)

A means of monitoring the software engineering processes and methods used to ensure quality.

You will find this term commonly used in Software Development, Quality Assurance

Software Repository

A storage location from which software packages may be retrieved and installed on a computer.

You will find this term commonly used in Software Development, Software Management

Software Testing

Software testing is the process of evaluating and verifying the functionality, performance, and quality of software applications or systems through systematic execution of test cases, aiming to identify defects and ensure reliability.

You will find this term commonly used in Software Development, Quality Assurance

Solid Programming

A set of principles designed to improve software maintainability and extendibility by promoting a more loosely coupled and modular architecture.

You will find this term commonly used in Software Development, Programming

Solid State Drive (SSD)

A data storage device that uses integrated circuit assemblies to store data persistently, typically faster and more reliable than traditional hard disk drives (HDDs).

You will find this term commonly used in Storage

Solidity

A contract-oriented programming language for writing smart contracts. It is used for implementing smart contracts on various blockchain platforms, most notably, Ethereum.

You will find this term commonly used in Software Development, Blockchain

Source Code

Source code is the human-readable version of a computer program written in programming languages, containing instructions and logic that define the behavior and functionality of software applications.

You will find this term commonly used in Software Development, Programming Languages

Source Code Management (SCM)

The management of changes to documents, programs, and other information stored as computer files.

You will find this term commonly used in Software Development, Version Control

Spam

Unsolicited or unwanted email messages, often sent in bulk, typically for advertising or phishing purposes.

You will find this term commonly used in Cybersecurity

Spam Filter

Software or hardware mechanisms designed to identify and remove unsolicited or unwanted email messages from an inbox.

You will find this term commonly used in Cybersecurity

Spam Filtering

The use of various methods to block email spam, or unsolicited bulk email.

You will find this term commonly used in Security, Email Systems

Spatial Computing

A computing paradigm that integrates digital information with the physical environment, often using technologies such as augmented reality (AR) and virtual reality (VR).

You will find this term commonly used in AR/VR, General IT

Spatial Database

A database that is optimized to store and query data related to objects in space, including points, lines, and polygons.

You will find this term commonly used in Databases, GIS

Spear Phishing

An email or electronic communications scam targeted towards a specific individual, organization, or business.

You will find this term commonly used in Security, Cybersecurity

Spear Phishing Attack

A targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons.

You will find this term commonly used in Cybersecurity

Specification by Example

An approach to software development that defines software requirements using realistic examples instead of abstract statements.

You will find this term commonly used in Software Development, Agile Methodologies

Speech Recognition

The ability of a computer program to identify words and phrases in spoken language and convert them to a machine-readable format.

You will find this term commonly used in AI, Human-Computer Interaction

Speech Synthesis

The artificial production of human speech.

You will find this term commonly used in AI, Human-Computer Interaction

What's Your
Career Path?
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass