IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Transient Fault

A fault in a system that occurs briefly and then disappears, making it difficult to detect and fix.

You will find this term commonly used in Hardware/Software

Transient State

In computing, a transient state refers to a temporary condition of a system or process. This term is often used in relation to network connections, virtual machines, and in programming during the initialization or cleanup processes.

You will find this term commonly used in General IT, Software Development

Transistor

A semiconductor device used to amplify or switch electronic signals and electrical power. Transistors are one of the basic building blocks of modern electronics.

You will find this term commonly used in Electronics, Hardware

Transistor Logic

A system of implementing logical functions using the properties of transistors.

You will find this term commonly used in Hardware

Translation Lookaside Buffer (TLB)

A memory cache that stores recent translations of virtual memory to physical memory addresses.

You will find this term commonly used in Hardware

Transparency

In computing, transparency refers to a system's ability to hide the complexity of its processes from its users. For example, distributed systems strive for location transparency, where users don't need to know the physical location of resources.

You will find this term commonly used in General IT, Systems Design

Transparency (in Computing)

The quality of a system or system component being invisible to the user or not requiring the user to be aware of its complexity or inner workings.

You will find this term commonly used in General IT

Transparency in Algorithms

The principle that algorithms should be understandable and their actions predictable to those affected by their decisions.

You will find this term commonly used in AI/Ethics

Transpiler

A type of compiler that transforms source code written in one programming language into another programming language. Transpilers are often used to convert newer versions of programming languages into versions compatible with older environments.

You will find this term commonly used in Software Development

Transpiler (or Source-to-Source Compiler)

A type of compiler that takes the source code of a program written in one programming language and produces the equivalent source code in another language.

You will find this term commonly used in Software Development

Transport Layer

The fourth layer in the OSI model of computer networking. The transport layer is responsible for the transfer of data between end systems or hosts and is where session management, segmentation, and error checking occur.

You will find this term commonly used in Networking

Transport Protocol

A protocol that delivers data across a network, such as TCP or UDP.

You will find this term commonly used in Networking

Traversal Algorithm

An algorithm used to visit all the nodes of a graph or tree data structure.

You will find this term commonly used in Algorithms

Tree

A widely used abstract data type (ADT) or data structure that simulates a hierarchical tree structure, with a root value and subtrees of children, represented as a set of linked nodes.

You will find this term commonly used in Data Structures

Tree Structure

A hierarchical structure that simulates a tree with a single root and branches out to leaves. In computing, it is used in data structures, algorithms, and file systems to organize data.

You will find this term commonly used in Software Development, Algorithms

Tree Topology

A network topology in which all the nodes are connected to a central node in a hierarchy that resembles a tree structure. This topology combines the characteristics of linear bus and star topologies.

You will find this term commonly used in Networking

Tree Traversal

The process of visiting (checking and/or updating) each node in a tree data structure, exactly once. Such traversals are classified by the order in which the nodes are visited. The most common types are in-order, pre-order, and post-order traversal.

You will find this term commonly used in Algorithms, Data Structures

Treemap

A visual representation of hierarchical data using nested rectangles.

You will find this term commonly used in Data Visualization

Trello

A web-based, Kanban-style, list-making application and is a subsidiary of Atlassian.

You will find this term commonly used in Project Management, Collaboration

Trend Analysis

The practice of collecting data and attempting to spot a pattern, often used in data analysis and forecasting.

You will find this term commonly used in Data Science

Tri-band

A term used in wireless communications to denote capabilities or devices that operate over three different frequencies or bands. It is often used in the context of Wi-Fi routers and mobile phones.

You will find this term commonly used in Networking, Wireless Communications

Triangulation

In computing, a method for determining the location of a point by forming triangles to it from known points.

You will find this term commonly used in GIS/Location Services

Trickle Charging

A charging process that maintains a full charge by applying a small amount of current.

You will find this term commonly used in Hardware

Trigger (in Databases)

A procedural code that is automatically executed in response to certain events on a particular table or view in a database.

You will find this term commonly used in Databases

Trim Command (in SSD)

A command that enables an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped internally.

You will find this term commonly used in Hardware

Triple DES

A symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. It is a method of increasing the security of DES by applying it three times to each data block.

You will find this term commonly used in Security, Cybersecurity

Triple Fault

A condition in a CPU that occurs when an exception is generated while trying to call an exception handler.

You will find this term commonly used in Hardware

Triple Play Services

In telecommunications, triple play service is a marketing term for the provisioning of the three services: high-speed Internet access, television, and telephone over a single broadband connection.

You will find this term commonly used in Networking, Telecommunications

Triple Store

A type of database used for storing and retrieving data in the form of triples, using the subject-predicate-object model. This is often used in storing, querying, and managing RDF (Resource Description Framework) data.

You will find this term commonly used in Databases, Web Development

Triple-DES (3DES)

An encryption algorithm that applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. It was developed to overcome the limitations of DES by increasing the encryption level through multiple encryptions.

You will find this term commonly used in Security, Cryptography

Trivial File Transfer Protocol (TFTP)

A simple, lightweight version of the File Transfer Protocol (FTP) that allows files to be transferred from one computer to another over a network. TFTP is used for transferring small files across networks, such as when booting a computer from a network.

You will find this term commonly used in Networking

Trojan

A type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.

You will find this term commonly used in Cybersecurity

Trojan Horse

Malicious software disguised as legitimate programs or files, which, when executed, perform unauthorized actions on a computer system.

You will find this term commonly used in Cybersecurity

Trolley Problem (in AI Ethics)

A thought experiment in ethics and AI that highlights the dilemma of programming moral decisions into autonomous machines.

You will find this term commonly used in AI Ethics

True Color

A method of representing and storing graphical image information in an RGB color model where each color is represented by 24 bits.

You will find this term commonly used in Graphics

TrueType

A standard for digital type fonts that was developed by Apple Computer, and is widely used in both Windows and Macintosh operating systems.

You will find this term commonly used in Graphics/Typography

Trunk Port

In networking, a trunk port is a port on a switch that is configured to carry traffic for multiple VLANs. It is used to route traffic between switches and routers in a network, allowing devices in different VLANs to communicate with each other.

You will find this term commonly used in Networking

Trunking

In networking, trunking is the practice of using a single communication link to carry multiple VLANs or network traffic. It is used to efficiently manage network traffic and simplify the network infrastructure.

You will find this term commonly used in Networking

Trust Anchor

A set of trusted keys used in digital security to verify the legitimacy of digital certificates and signatures.

You will find this term commonly used in Cybersecurity

Trust Management

In computer security, a broad approach to policies and mechanisms for ensuring the security of applications and electronic transactions, managing the trust relationships inherent in those processes.

You will find this term commonly used in Cybersecurity

Trust Relationship

In security, a trust relationship is the link established between two domains that allows users in one domain to access resources in the other domain.

You will find this term commonly used in Security, Networking

Trusted Computing Base (TCB)

The set of all hardware, firmware, and/or software components that are critical to a system's security.

You will find this term commonly used in Security

Trusted Execution Environment (TEE)

A secure area of a main processor. It guarantees code and data loaded inside to be protected with respect to confidentiality and integrity, thus establishing a secure execution environment for sensitive and trusted code.

You will find this term commonly used in Security, Mobile Computing

Trusted Platform Module (TPM)

A specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. It is used to enhance network security.

You will find this term commonly used in Security, Hardware

TTL (Time to Live)

A mechanism that limits the lifespan or the number of hops that data packets can take before they are discarded by a network router. TTL is used in networking to prevent data packets from circulating indefinitely.

You will find this term commonly used in Networking

TTL (Transistor-Transistor Logic)

A class of digital circuits built from transistors. It is used in the design of digital devices. It is notable for being a widespread integrated circuit (IC) family used in many applications such as computers, industrial controls, etc.

You will find this term commonly used in Hardware, Electronics

TTY (Teletypewriter)

Originally a device for sending typed messages over telephony networks. In computing, TTY has become a shorthand for terminal devices or terminal emulators, which provide an interface to the Unix shell.

You will find this term commonly used in General IT, Unix/Linux Systems

TUI (Terminal User Interface)

A type of user interface that allows users to interact with the computer through a command-line or text-based interface.

You will find this term commonly used in User Interface Design

TUI (Text User Interface)

An interface that uses text characters and symbols, rather than graphics, to interact with the computer.

You will find this term commonly used in User Interface Design

Tunneling Protocol

A protocol that allows for the secure passage of data from one network to another through a public network.

You will find this term commonly used in Networking

What's Your
Career Path?
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass