IT Glossary - W - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Wireless Markup Language (WML)

A markup language based on XML, designed for creating pages that can be displayed in web browsers on mobile devices.

You will find this term commonly used in Web Development

Wireless Mesh Network

A network structure consisting of interconnected nodes that cooperate to distribute data amongst each other like a mesh.

You will find this term commonly used in Networking

Wireless Network Interface Controller (NIC)

A hardware component that connects a computer to a wireless network.

You will find this term commonly used in Networking/Hardware

Wireless Networking

The use of wireless technology to connect computers and devices to a network.

You will find this term commonly used in Networking

Wireless Presentation System

A system that allows users to share content from their devices to a presentation screen wirelessly, often used in conference rooms and classrooms.

You will find this term commonly used in Networking

Wireless Protocol Analysis

The examination and analysis of wireless protocols to ensure communication is efficient, secure, and compliant with standards.

You will find this term commonly used in Networking

Wireless Security

Measures taken to protect wireless networks and devices from unauthorized access or attacks.

You will find this term commonly used in Cybersecurity

Wireless Sensor Network

A wireless sensor network (WSN) is a network of spatially distributed autonomous sensors that monitor physical or environmental conditions, such as temperature, pressure, or humidity, and communicate wirelessly to collect and analyze data.

You will find this term commonly used in IoT, Environmental Monitoring, Wireless Communication

Wireless Sensor Network (WSN)

A network of interconnected sensors that wirelessly transmit data to a central system for monitoring and analysis.

You will find this term commonly used in Networking

Wireshark

A free and open-source packet analyzer used for network troubleshooting, analysis, software and communications protocol development.

You will find this term commonly used in Networking

Wiring Closet

A small room or cabinet used to house telecommunications equipment, such as switches and patch panels, typically for a local area network.

You will find this term commonly used in Networking

Wizard

A user interface component that guides users through a step-by-step process for completing a task or setting up software.

You will find this term commonly used in General IT

WLAN (Wireless Local Area Network)

A wireless network that connects devices within a limited geographical area, such as a home or office.

You will find this term commonly used in Networking

Word Embedding

A technique in natural language processing where words or phrases are mapped to vectors of real numbers, used in deep learning models.

You will find this term commonly used in AI

Word Processing

The creation, editing, formatting, and printing of text documents using specialized software.

You will find this term commonly used in General IT

Workflow Automation

Workflow automation is the use of technology to automate repetitive tasks, processes, or workflows, reducing manual intervention, streamlining operations, and improving efficiency, accuracy, and consistency of business processes.

You will find this term commonly used in Automation, Business Processes, Software Development

Workflow Engine

Software that manages and executes modeled computer processes. It is a key component in workflow technology and can automate sequences of tasks for process enhancement.

You will find this term commonly used in Workflow Management

Workflow Management

The automation of business processes, ensuring tasks are completed efficiently and in the correct order.

You will find this term commonly used in General IT, Automation

Workflow Optimization

The process of identifying and implementing the most efficient sequence of actions to complete tasks and processes.

You will find this term commonly used in Business Process Management

Workflow Software

Software that automates the flow of tasks in a business process. It is typically used to manage, coordinate, and automate repetitive tasks.

You will find this term commonly used in Business/Management

Workgroup

A collection of computers on a local area network (LAN) that share resources and responsibilities without centralized management.

You will find this term commonly used in Networking

Workspace Virtualization

Technology that allows users to access their desktops, applications, and data from any device, providing a consistent work environment regardless of location.

You will find this term commonly used in Virtualization

Workstation

A high-performance computer used for professional or technical applications, such as graphic design or engineering.

You will find this term commonly used in General IT

World Wide Web (WWW)

An information system on the internet that allows documents to be connected to other documents by hypertext links.

You will find this term commonly used in General IT

World Wide Web Consortium (W3C)

An international community that develops open standards to ensure the long-term growth of the Web.

You will find this term commonly used in Web Standards

Worldwide Interoperability for Microwave Access (WiMAX)

A technology that provides wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access.

You will find this term commonly used in Networking

WORM (Write Once, Read Many)

A type of data storage device that allows information to be written to it once and then read multiple times, preventing subsequent modification.

You will find this term commonly used in Data Storage

WPA (Wi-Fi Protected Access)

A security protocol designed to secure wireless computer networks.

You will find this term commonly used in Cybersecurity

WPA2 (Wi-Fi Protected Access 2)

A security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

You will find this term commonly used in Wireless Security

WPA2-Enterprise

A version of WPA2 used in business and enterprise environments, offering higher security through individual user authentication via RADIUS server.

You will find this term commonly used in Wireless Security

WPA2-Personal

A version of WPA2 designed for home and small office networks, providing good security without the complexity of RADIUS authentication.

You will find this term commonly used in Wireless Security

WPA3 (Wi-Fi Protected Access 3)

The third iteration of the Wi-Fi Protected Access security protocol, providing enhanced security features for wireless networks.

You will find this term commonly used in Security, Networking

Wrapper Class

In programming, a class whose instances are collections of other objects. It allows the grouping of objects as a single unit.

You will find this term commonly used in General IT

Wrapper Function

A function whose main purpose is to call a second function, often used to simplify complex function calls or to adapt them to a specific interface.

You will find this term commonly used in General IT/Programming

Write Amplification

A phenomenon in flash memory and solid-state drives where the actual amount of physical information written is a multiple of the logical amount intended to be written.

You will find this term commonly used in General IT

Write Coalescing

A technique used in computer storage to improve performance by combining multiple write commands into a single larger command before writing to the disk.

You will find this term commonly used in General IT

Write Protection

A physical or software mechanism that prevents modification or deletion of data on a device or medium.

You will find this term commonly used in Cybersecurity

Write-Ahead Logging (WAL)

A method used in databases to ensure data integrity by recording changes to data before it is actually made to the database.

You will find this term commonly used in Databases

Write-Back Cache

A caching technique in which data is written to cache alone and not immediately to the backing storage, improving performance.

You will find this term commonly used in General IT/Networking

Write-Once Memory

A type of non-volatile memory that can be written once and then read many times, used for secure data storage.

You will find this term commonly used in General IT

Write-Once, Run Anywhere (WORA)

A principle of software development that enables code to run on any platform without needing to be rewritten.

You will find this term commonly used in Software Development

Write-Protect

A mechanism that prevents the modification or deletion of data on a device or in a file.

You will find this term commonly used in Data Security

Write-Through Cache

A caching method where operations write data to both the cache and the backing storage, ensuring data consistency.

You will find this term commonly used in General IT/Networking

WYSIWYG

An acronym for "What You See Is What You Get," referring to software that allows content to be edited in a form resembling its appearance when printed or displayed as a finished product.

You will find this term commonly used in General IT, User Interface

WYSIWYG (What You See Is What You Get)

A user interface that allows users to view a document or webpage exactly as it will appear when printed or displayed.

You will find this term commonly used in General IT

WYSIWYG Editor

A system in which content (text and graphics) can be edited in a form closely resembling its appearance when printed or displayed as a finished product, such as in word processors or web content management systems.

You will find this term commonly used in General IT

What's Your
Career Path?
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass