IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Business-IT Alignment

The strategic coordination that ensures business strategy and goals match the IT infrastructure and capabilities of an organization, aiming to maximize value creation.

You will find this term commonly used in IT Management, Strategic Planning

Business-to-Business (B2B)

The exchange of products, services, or information between businesses, rather than between businesses and consumers (B2C).

You will find this term commonly used in E-commerce, Business Management

Business-to-Business (B2B) Integration

The automation and coordination of technology and processes between two or more businesses. B2B integration solutions facilitate the seamless exchange of information and transactions, enhancing collaboration and efficiency across corporate boundaries.

You will find this term commonly used in Networking, Business Management

Business-to-Business Electronic Commerce (B2B EC)

The sale of goods or services between businesses via online portals. B2B EC platforms facilitate transactions between trading partners and streamline purchase processes through electronic means.

You will find this term commonly used in E-commerce, Business Management

Business-to-Consumer (B2C)

Refers to the direct selling of products and services from businesses to end-users or consumers, typically through online channels. B2C strategies focus on personalizing the customer experience and leveraging digital technologies to reach a wider audience.

You will find this term commonly used in E-commerce, Marketing

Business-to-Employee (B2E)

Electronic transactions conducted between a company and its employees, rather than between the company and other businesses or consumers. B2E applications often include portals for HR benefits, training, and internal communications.

You will find this term commonly used in E-commerce, HR Technology

BYOD (Bring Your Own Device)

A policy allowing employees to bring personally owned devices (laptops, tablets, smartphones) to their workplace and use these devices to access privileged company information and applications. BYOD has implications for corporate security and network management.

You will find this term commonly used in Networking, Security

Bypass Switch

A networking device that provides a fail-safe access port for an inline network security appliance, such as a firewall or intrusion detection system. In the event of a device failure or maintenance, the bypass switch ensures continuous network flow by routing traffic around the device.

You will find this term commonly used in Networking, Security

Byte

A byte is a unit of digital information that most commonly consists of eight bits. It's a fundamental measure in computing that represents a single character, such as a letter or symbol, in various encoding systems like ASCII.

You will find this term commonly used in General IT, Hardware

Byte Addressable Memory

A memory architecture where each byte of data can be addressed individually. This allows for the efficient manipulation and storage of data types smaller than the machine's word size.

You will find this term commonly used in Hardware, Software Development

Byte Order Mark (BOM)

A Unicode character used to denote the endianness (byte order) of a text file or stream. Its presence can affect how text data is interpreted and displayed by different software.

You will find this term commonly used in Software Development, Data Formats

Byte Ordering

The order in which bytes are arranged into larger numerical values when stored in memory or when transmitted over digital networks. The two most common byte orders are big-endian and little-endian.

You will find this term commonly used in Software Development, Networking

Byte Serving

The technique of sending portions of a file to a client upon request, allowing for efficient downloading and streaming of large files over the internet. It enables users to access and view content before the entire file is downloaded.

You will find this term commonly used in Networking, Web Development

Byte Swapping

The process of changing the order of bytes within a word of digital data. This is often necessary when transferring data between systems with different endianness (byte order).

You will find this term commonly used in Software Development, Data Formats

Bytecode

A form of instruction set designed for efficient execution by a software interpreter. Unlike machine code, bytecode is platform-independent, typically used in implementing advanced programming languages like Java, allowing for easy transport and execution of code across different systems.

You will find this term commonly used in Software Development, General IT

Bytecode Compilation

The process of compiling source code into bytecode, an intermediate code that can be executed by a virtual machine. This allows for platform-independent execution of programs.

You will find this term commonly used in Software Development, Compilation

Bytecode Interpreter

A program that executes instructions written in bytecode, which is a form of intermediate code more abstract than machine code. Bytecode interpreters read and execute bytecode, translating it into actions or machine code for the computer's CPU to perform.

You will find this term commonly used in Software Development, General IT

Bytecode Linking

The process of combining multiple bytecode files (intermediate representations of compiled source code) into a single executable or library. This step is part of the compilation process, especially in environments like Java Virtual Machine (JVM).

You will find this term commonly used in Software Development, Compilation

Bytecode Optimization

The process of improving the efficiency and performance of bytecode, which is an intermediate representation of code executed by virtual machines. Bytecode optimization techniques include dead code elimination, loop optimization, and inlining, aimed at reducing runtime and resource consumption.

You will find this term commonly used in Software Development, Performance Optimization

Bytecode Verification

The process of checking the correctness of bytecode before it is executed by a Java Virtual Machine (JVM) or similar runtime environment. Bytecode verification ensures that code adheres to certain format specifications and security checks.

You will find this term commonly used in Software Development, Security

Bytecode Virtual Machine

A virtual machine that executes bytecode, which is a form of instruction set designed for efficient execution by a computer interpreter. Used in various programming languages as an intermediate language before final compilation or during runtime.

You will find this term commonly used in Software Development, Virtualization

Byzantine Agreement

A consensus algorithm that is fault-tolerant to the point where it can function correctly even if some of the nodes in the network fail or act maliciously. It's crucial in distributed computing and blockchain technologies for achieving consensus under adverse conditions.

You will find this term commonly used in Distributed Systems, Blockchain

Byzantine Fault Tolerance (BFT)

A property of computer systems that allows them to tolerate the class of failures known as Byzantine faults. BFT systems can continue to operate correctly even if some of the nodes fail in arbitrary ways, ensuring the system's integrity and reliability, particularly in distributed computing environments.

You will find this term commonly used in Distributed Systems, Security

Caching

The process of storing data in a cache, a temporary storage area. Caching allows for the fast retrieval of data, which might otherwise take longer to fetch from the primary storage location. It is widely used in various computing environments to improve application performance and efficiency, from web browsers storing web pages to cloud services and database systems.

You will find this term commonly used in General IT, Software Development

Capacity Planning

The process of determining the production capacity needed by an organization to meet changing demands for its products. In IT, capacity planning involves predicting computing resources required over time to ensure adequate infrastructure performance and efficiency.

You will find this term commonly used in IT Management, Infrastructure

CCNA (Cisco Certified Network Associate)

Validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.

You will find this term commonly used in Networking

CCNP (Cisco Certified Network Professional)

Advanced networking certification that covers in-depth networking concepts and protocols, beyond the CCNA level.

You will find this term commonly used in Networking

CDN (Content Delivery Network)

A geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance by distributing the service spatially relative to end-users. CDNs serve a large portion of the Internet content today, including web objects (text, graphics, and scripts), downloadable objects (media files, software, documents), applications (e-commerce, portals), live streaming media, on-demand streaming media, and social networks.

You will find this term commonly used in Networking, Web Development

CEH (Certified Ethical Hacker)

Demonstrates the ability to find vulnerabilities in computer systems and to prevent hacking.

You will find this term commonly used in Ethical Hacking, Cybersecurity

Certified Blockchain Professional (CBP)

Focuses on the in-depth understanding of blockchain technology and its implementation in real-world scenarios.

You will find this term commonly used in Blockchain

Certified Cloud Security Professional (CCSP)

Focuses on cloud security architecture, design, operations, and service orchestration, provided by (ISC)².

You will find this term commonly used in Cloud Security

Certified Data Professional (CDP)

Offered by the Institute for Certification of Computing Professionals (ICCP), it covers various domains in data management and analytics.

You will find this term commonly used in Data Management, Analytics

Certified Ethical Hacker Master (CEH Master)

Combines the CEH certification with a practical exam that tests the skills in a real-world scenario.

You will find this term commonly used in Cybersecurity, Ethical Hacking

Certified Information Privacy Manager (CIPM)

Offered by the International Association of Privacy Professionals (IAPP), it focuses on managing and navigating privacy in organizations.

You will find this term commonly used in Data Privacy, Compliance

Certified Information Privacy Professional (CIPP)

Offered by the International Association of Privacy Professionals (IAPP), it demonstrates understanding of global privacy and data protection laws and practices.

You will find this term commonly used in Privacy, Data Protection

Certified Kubernetes Administrator (CKA)

Demonstrates the ability to design, build, configure, and expose cloud native applications for Kubernetes, a container-orchestration system.

You will find this term commonly used in Containerization, Cloud Computing

Certified Scrum Product Owner (CSPO)

Focuses on scrum leadership and responsibility in product development to maximize value.

You will find this term commonly used in Agile Development, Product Management

Certified ScrumMaster (CSM)

Validates knowledge of the Scrum methodology and its application in project management and software development.

You will find this term commonly used in Agile Development, Project Management

Certified SonicWall Security Administrator (CSSA)

Validates knowledge in deploying and managing SonicWall firewall appliances and security solutions.

You will find this term commonly used in Network Security

Certified Wireless Network Administrator (CWNA)

Validates the knowledge of wireless network administration, focusing on network security, troubleshooting, and RF fundamentals.

You will find this term commonly used in Networking, Wireless Technologies

CGEIT (Certified in the Governance of Enterprise IT)

Focuses on the governance of IT to support the enterprise in achieving its goals.

You will find this term commonly used in IT Governance

Change Management

The process, tools, and techniques used to manage the people side of change to achieve the required business outcome. In IT, change management involves the systematic approach to dealing with the transition or transformation of IT services, processes, or applications, ensuring that changes are smoothly and successfully implemented to minimize impact on services.

You will find this term commonly used in IT Management

Chatbot

A software application used to conduct an on-line chat conversation via text or text-to-speech, in lieu of providing direct contact with a live human agent. Designed to convincingly simulate the way a human would behave as a conversational partner, chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition.

You will find this term commonly used in AI, Customer Service

CI/CD (Continuous Integration/Continuous Deployment)

Practices in software development designed to improve software quality and expedite the development process. CI involves automating the integration of code changes from multiple contributors into a single software project. CD automates the delivery of applications to selected infrastructure environments. Both practices enable developers to release new changes to customers faster and more safely.

You will find this term commonly used in Software Development

Circuit Switching

A method of implementing a telecommunications network in which a dedicated communication path is established between two nodes for the duration of a communication session. Historically used for traditional telephone networks, circuit switching ensures a constant rate of transmission but is less efficient than packet switching for data.

You will find this term commonly used in Networking, Telecommunications

CISA (Certified Information Systems Auditor)

Recognized as a standard for those who audit, control, monitor, and assess an organizationâs information technology and business systems.

You will find this term commonly used in IT Audit, Control

Cisco

Known for its networking and infrastructure certifications, ranging from entry-level to expert in areas such as networking, security, and collaboration technologies.

You will find this term commonly used in Networking, Security

Cisco Certified CyberOps Associate

Focuses on the skills required for cybersecurity operations, including knowledge of security concepts, monitoring, host-based analysis, network intrusion analysis, and security policies and procedures.

You will find this term commonly used in Cybersecurity

Cisco Certified Internetwork Expert (CCIE)

Ciscoâs highest certification level, validating expert-level skills in network engineering, including design, build, and troubleshooting complex networks.

You will find this term commonly used in Networking

Cisco DevNet Associate

Validates the skills of software developers, DevOps engineers, automation specialists, and other software professionals who develop and maintain applications built on Cisco platforms.

You will find this term commonly used in Network Engineering, Software Development

What's Your
Career Path?
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass