IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Tunnelling

The process of sending a network protocol or application through another network protocol, thereby encapsulating a protocol within another protocol.

You will find this term commonly used in Networking

Tuple

In the context of databases and programming, a tuple is an ordered list of elements. In relational databases, a tuple is essentially a row that contains data for a single record.

You will find this term commonly used in Databases, Software Development

Tuple Space

A repository of tuples (ordered lists of elements) that can be accessed concurrently.

You will find this term commonly used in Parallel Computing

Turing Award

An annual prize given by the Association for Computing Machinery (ACM) to an individual selected for contributions of lasting and major technical importance to the computer field. Often regarded as the "Nobel Prize of Computing."

You will find this term commonly used in General IT, Achievements

Turing Completeness

A characteristic of a system of data-manipulation rules (such as a computer's instruction set, a programming language, or a cellular automaton) that indicates the system can simulate any Turing machine.

You will find this term commonly used in Software Development, Theory

Turing Machine

A mathematical model of computation that defines an abstract machine, which manipulates symbols on a strip of tape according to a table of rules. It is used to understand the limits of what can be computed.

You will find this term commonly used in Computer Science, Theory

Turing Test

A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. Proposed by Alan Turing in 1950 as a measure of a machine's intelligence.

You will find this term commonly used in AI, Machine Learning

Turnkey Solution

A type of solution that is designed to be easily implemented into a current business, system, or process without the need for significant modification or customization.

You will find this term commonly used in General IT, Business Solutions

Turnstile (Concurrency)

A synchronization mechanism used to control access to a resource by multiple threads in computing.

You will find this term commonly used in Software Development

Tux

The name of the Linux kernel mascot, a penguin.

You will find this term commonly used in General IT

TV Tuner Card

A device that allows a computer to receive television signals for viewing TV programs on a computer.

You will find this term commonly used in Hardware

TV White Space

The unused broadcasting frequencies in the wireless spectrum. TV white spaces are unused and underutilized frequencies in the television broadcasting bands that can be used to deliver broadband and other services.

You will find this term commonly used in Networking, Wireless Communications

Twilio

A cloud communications platform as a service (PaaS) company that allows software developers to programmatically make and receive phone calls, send and receive text messages, and perform other communication functions using its web service APIs.

You will find this term commonly used in Cloud Computing, Communications

Twisted Pair

A type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility. Commonly used in telephony and network cabling to reduce crosstalk between pairs.

You will find this term commonly used in Networking

Twisted Pair Cable

A type of wiring where two conductors are twisted together to cancel out electromagnetic interference from external sources, improving reliability. It's widely used in telecommunications and computer networks for Ethernet connections.

You will find this term commonly used in Networking

Twitter Bootstrap

A free and open-source CSS framework directed at responsive, mobile-first front-end web development. It contains CSS- and (optionally) JavaScript-based design templates for typography, forms, buttons, navigation, and other interface components.

You will find this term commonly used in Web Development, Design

Two-Factor Authentication (2FA)

A security process that requires users to provide two different authentication factors (e.g., password and SMS code) to verify their identity.

You will find this term commonly used in Security, Cybersecurity

Two-Phase Commit

A type of atomic commitment protocol that ensures a distributed transaction either commits (completes successfully) on all involved systems or rolls back (fails) on all involved systems, maintaining system integrity.

You will find this term commonly used in Databases, Networking

Two-Phase Commit (2PC)

A distributed algorithm that ensures all parts of a transaction commit if and only if all are ready to commit, ensuring data consistency across a distributed system.

You will find this term commonly used in Databases/Networking

Two-Sided Market

A market platform that enables interactions between two distinct user groups that provide each other with network benefits. This concept is often relevant in e-commerce and online services where buyers and sellers interact.

You will find this term commonly used in E-commerce, Business Strategy

Two-Step Verification

A security process in which users provide two distinct forms of identification before accessing their account. It's a form of multi-factor authentication intended to provide an additional layer of security.

You will find this term commonly used in Cybersecurity

Two-Tier Architecture

A type of client-server system architecture where the client interacts directly with the server, often used in reference to web applications where the client is a web browser and the server hosts the web app.

You will find this term commonly used in Software Development, Web Development

Two-Way Binding

In web development, a form of data binding that allows for mutual data exchange between the UI and the model such that a change in one reflects immediately in the other.

You will find this term commonly used in Web Development

Twofish

A symmetric key block cipher that is a contender for the Advanced Encryption Standard.

You will find this term commonly used in Cybersecurity

Type Checking

The process of verifying and enforcing the constraints of typesâdata types, at compile time or runtime. This ensures that the operations being performed on data are compatible with the data type.

You will find this term commonly used in Software Development

Type Conversion

The process of converting a value from one data type to another.

You will find this term commonly used in Programming

Type Erasure

A technique used in generic programming to enforce type constraints at compile time but not at runtime.

You will find this term commonly used in Software Development

Type Inference

The ability of a programming language to automatically deduce the type of an expression at compile time. Type inference allows the programmer to omit certain type annotations while the compiler infers the types.

You will find this term commonly used in Software Development

Type Safety

The extent to which a programming language discourages or prevents type errors. Type-safe languages aim to ensure that operations are performed on compatible types, reducing bugs and enhancing code reliability.

You will find this term commonly used in Software Development

Type System

The collection of rules that assign a property called a type to the various constructs of a computer program, such as variables, expressions, functions or modules.

You will find this term commonly used in Programming

TypedArray

An object in JavaScript that provides a mechanism for accessing raw binary data. TypedArrays are used in web applications that require high-performance and efficient data manipulation, such as audio processing, graphics, and large data processing.

You will find this term commonly used in Web Development, Programming

TypeScript

A programming language developed and maintained by Microsoft. It is a strict syntactical superset of JavaScript, and adds optional static typing to the language.

You will find this term commonly used in Software Development

TypeScript Definition

Files in TypeScript (.d.ts files) that contain type information about an existing JavaScript codebase. These definitions allow TypeScript developers to use existing JavaScript libraries as if they were TypeScript libraries.

You will find this term commonly used in Software Development

Typo Squatting

The practice of registering domain names that are misspellings of popular websites in order to redirect traffic or phish for user information. Typo squatting exploits the likelihood of typographical errors made by Internet users.

You will find this term commonly used in Cybersecurity, Web Security

Typographic Ligature

A single glyph created from the fusion of two or more letters.

You will find this term commonly used in Typography/Graphics

Tyranny of the Rocket Equation

An adage referring to the exponential nature of the rocket equation, impacting payload capacity.

You will find this term commonly used in General IT/Aerospace

U2F (Universal 2nd Factor)

An open authentication standard that strengthens and simplifies two-factor authentication using specialized USB or NFC devices.

You will find this term commonly used in Security, Cybersecurity

U2F Protocol

A standard that enables the use of physical security tokens for two-factor authentication, designed to enhance the security of online services.

You will find this term commonly used in Cybersecurity

U2R (User to Root)

An attack type where an attacker starts out with access to a normal user account on the system and is able to exploit vulnerability to gain root access to the system.

You will find this term commonly used in Security, Cybersecurity

UAC (User Account Control)

A technology and security infrastructure introduced with Microsoft's Windows Vista. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges.

You will find this term commonly used in Security, Cybersecurity

UART (Universal Asynchronous Receiver-Transmitter)

A computer hardware device for asynchronous serial communication in which the data format and transmission speeds are configurable.

You will find this term commonly used in Hardware, Networking

UAT (User Acceptance Testing)

The last phase of the software testing process, during which actual software users test the software to make sure it can handle required tasks in real-world scenarios.

You will find this term commonly used in Software Development, Quality Assurance

Ubiquitous Computing

Ubiquitous Computing refers to the concept of integrating computing capabilities into everyday objects and environments, making them smart and interconnected to enhance user experiences and automate tasks.

You will find this term commonly used in Internet of Things (IoT), General IT, Emerging Technologies

Ubiquitous Language

A term used in Domain-Driven Design (DDD) for a body of language used by all team members to connect all the activities of the team with the software.

You will find this term commonly used in Software Development, Design

Ubuntu

A popular distribution of the Linux operating system, known for its ease of use and community support.

You will find this term commonly used in Operating Systems

UDD (User-Driven Development)

A development methodology that focuses on involving the user in the development process to create more user-friendly software.

You will find this term commonly used in Software Development

UDDI (Universal Description, Discovery, and Integration)

A platform-independent, XML-based registry for businesses to list themselves on the Internet and a mechanism to register and locate web service applications.

You will find this term commonly used in Networking, Software Development

UDP (User Datagram Protocol)

A communications protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups.

You will find this term commonly used in Networking

UDP Flood

A type of Denial of Service (DoS) attack in which the attacker sends a large number of UDP packets to a random port on a remote host.

You will find this term commonly used in Security, Cybersecurity

UEFI (Unified Extensible Firmware Interface)

A specification for a software program that connects a computer's firmware to its operating system (OS). It is designed to replace BIOS.

You will find this term commonly used in General IT, Hardware

What's Your
Career Path?
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass