IT Glossary - T - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Traffic Engineering

The process of optimizing the performance of a telecommunications network by dynamically analyzing, predicting, and regulating the behavior of data transmitted over that network, often using sophisticated modeling and simulation techniques.

You will find this term commonly used in Networking, Telecommunications

Traffic Management

The practice of managing data transfer on networks through the prioritization of certain data streams, controlling bandwidth allocation, and managing network congestion to ensure efficient and reliable data transmission.

You will find this term commonly used in Networking, IT Management

Traffic Shaping

The practice of regulating network traffic to optimize or guarantee performance, improve latency, or increase usable bandwidth for some applications over others.

You will find this term commonly used in Networking

Transaction

A sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity.

You will find this term commonly used in Databases

Transaction Log

A log that records all transactions that have been executed by a system to ensure data integrity.

You will find this term commonly used in Databases

Transaction Processing

The collection, storage, modification, and retrieval of transactions of an enterprise. Transaction processing ensures that data integrity is maintained in multi-access environments and in the event of system failure.

You will find this term commonly used in Databases, General IT

Transactional Database

A type of database that prioritizes correct and complete transactions. It uses a series of operations that are treated as a single unit, ensuring that either all operations within the transaction are completed or none are.

You will find this term commonly used in Databases

Transactional Email

Email sent to facilitate an agreed-upon transaction between the sender and the recipient. Transactional emails are typically automated and triggered by a user's actions, such as order confirmations, receipts, and password resets.

You will find this term commonly used in Communications, E-commerce

Transactional Memory

A concurrency control mechanism that simplifies the development of concurrent programs by allowing blocks of instructions to execute in an atomic manner.

You will find this term commonly used in Software Development

Transceiver

A device that can both transmit and receive communications, in particular a combined radio transmitter and receiver. Transceivers are used in networking to connect nodes and facilitate communication.

You will find this term commonly used in Networking

Transclusion

Including part of a document within another document by reference.

You will find this term commonly used in Web Development

Transcoding

The direct digital-to-digital conversion of one encoding to another. This is often done to incompatible or obsolete data in order to convert it into a more suitable format.

You will find this term commonly used in Digital Media

Transcoding in Streaming Media

The process of converting a media file or stream from one format to another, typically to ensure compatibility across different platforms and devices. It is crucial in digital media distribution to accommodate various bandwidths and device capabilities.

You will find this term commonly used in Digital Media, Networking

Transfer Protocol

A set of rules that define how data is transferred over a network.

You will find this term commonly used in Networking

Transformer (in AI)

A deep learning model architecture used primarily in the field of natural language processing (NLP).

You will find this term commonly used in AI

Transformer Networks

A type of deep learning model that relies on self-attention mechanisms to draw global dependencies between input and output, widely used in the field of natural language processing (NLP).

You will find this term commonly used in AI

Transient Fault

A fault in a system that occurs briefly and then disappears, making it difficult to detect and fix.

You will find this term commonly used in Hardware/Software

Transient State

In computing, a transient state refers to a temporary condition of a system or process. This term is often used in relation to network connections, virtual machines, and in programming during the initialization or cleanup processes.

You will find this term commonly used in General IT, Software Development

Transistor

A semiconductor device used to amplify or switch electronic signals and electrical power. Transistors are one of the basic building blocks of modern electronics.

You will find this term commonly used in Electronics, Hardware

Transistor Logic

A system of implementing logical functions using the properties of transistors.

You will find this term commonly used in Hardware

Translation Lookaside Buffer (TLB)

A memory cache that stores recent translations of virtual memory to physical memory addresses.

You will find this term commonly used in Hardware

Transparency

In computing, transparency refers to a system's ability to hide the complexity of its processes from its users. For example, distributed systems strive for location transparency, where users don't need to know the physical location of resources.

You will find this term commonly used in General IT, Systems Design

Transparency (in Computing)

The quality of a system or system component being invisible to the user or not requiring the user to be aware of its complexity or inner workings.

You will find this term commonly used in General IT

Transparency in Algorithms

The principle that algorithms should be understandable and their actions predictable to those affected by their decisions.

You will find this term commonly used in AI/Ethics

Transpiler

A type of compiler that transforms source code written in one programming language into another programming language. Transpilers are often used to convert newer versions of programming languages into versions compatible with older environments.

You will find this term commonly used in Software Development

Transpiler (or Source-to-Source Compiler)

A type of compiler that takes the source code of a program written in one programming language and produces the equivalent source code in another language.

You will find this term commonly used in Software Development

Transport Layer

The fourth layer in the OSI model of computer networking. The transport layer is responsible for the transfer of data between end systems or hosts and is where session management, segmentation, and error checking occur.

You will find this term commonly used in Networking

Transport Protocol

A protocol that delivers data across a network, such as TCP or UDP.

You will find this term commonly used in Networking

Traversal Algorithm

An algorithm used to visit all the nodes of a graph or tree data structure.

You will find this term commonly used in Algorithms

Tree

A widely used abstract data type (ADT) or data structure that simulates a hierarchical tree structure, with a root value and subtrees of children, represented as a set of linked nodes.

You will find this term commonly used in Data Structures

Tree Structure

A hierarchical structure that simulates a tree with a single root and branches out to leaves. In computing, it is used in data structures, algorithms, and file systems to organize data.

You will find this term commonly used in Software Development, Algorithms

Tree Topology

A network topology in which all the nodes are connected to a central node in a hierarchy that resembles a tree structure. This topology combines the characteristics of linear bus and star topologies.

You will find this term commonly used in Networking

Tree Traversal

The process of visiting (checking and/or updating) each node in a tree data structure, exactly once. Such traversals are classified by the order in which the nodes are visited. The most common types are in-order, pre-order, and post-order traversal.

You will find this term commonly used in Algorithms, Data Structures

Treemap

A visual representation of hierarchical data using nested rectangles.

You will find this term commonly used in Data Visualization

Trello

A web-based, Kanban-style, list-making application and is a subsidiary of Atlassian.

You will find this term commonly used in Project Management, Collaboration

Trend Analysis

The practice of collecting data and attempting to spot a pattern, often used in data analysis and forecasting.

You will find this term commonly used in Data Science

Tri-band

A term used in wireless communications to denote capabilities or devices that operate over three different frequencies or bands. It is often used in the context of Wi-Fi routers and mobile phones.

You will find this term commonly used in Networking, Wireless Communications

Triangulation

In computing, a method for determining the location of a point by forming triangles to it from known points.

You will find this term commonly used in GIS/Location Services

Trickle Charging

A charging process that maintains a full charge by applying a small amount of current.

You will find this term commonly used in Hardware

Trigger (in Databases)

A procedural code that is automatically executed in response to certain events on a particular table or view in a database.

You will find this term commonly used in Databases

Trim Command (in SSD)

A command that enables an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally.

You will find this term commonly used in Hardware

Triple DES

A symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. It is a method of increasing the security of DES by applying it three times to each data block.

You will find this term commonly used in Security, Cybersecurity

Triple Fault

A condition in a CPU that occurs when an exception is generated while trying to call an exception handler.

You will find this term commonly used in Hardware

Triple Play Services

In telecommunications, triple play service is a marketing term for the provisioning of the three services: high-speed Internet access, television, and telephone over a single broadband connection.

You will find this term commonly used in Networking, Telecommunications

Triple Store

A type of database used for storing and retrieving data in the form of triples, using the subject-predicate-object model. This is often used in storing, querying, and managing RDF (Resource Description Framework) data.

You will find this term commonly used in Databases, Web Development

Triple-DES (3DES)

An encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. It was developed to overcome the limitations of DES by increasing the encryption level through multiple encryptions.

You will find this term commonly used in Security, Cryptography

Trivial File Transfer Protocol (TFTP)

A simple, lightweight version of the File Transfer Protocol (FTP) that allows files to be transferred from one computer to another over a network. TFTP is used for transferring small files across networks, such as when booting a computer from a network.

You will find this term commonly used in Networking

Trojan

A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.

You will find this term commonly used in Cybersecurity

Trojan Horse

Malicious software disguised as legitimate programs or files, which, when executed, perform unauthorized actions on a computer system.

You will find this term commonly used in Cybersecurity

Trolley Problem (in AI Ethics)

A thought experiment in ethics and AI that highlights the dilemma of programming moral decisions into autonomous machines.

You will find this term commonly used in AI Ethics

What's Your
Career Path?
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass