IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Voice-Enabled Technology

Technology that allows users to interact with devices using voice commands.

You will find this term commonly used in AI, User Interface

Voice-to-Text Conversion

The process of converting spoken words into written text, often used in voice recognition and dictation systems.

You will find this term commonly used in AI, Speech Recognition

Voiceprint

A unique digital representation of an individual's voice characteristics used for authentication or identification purposes.

You will find this term commonly used in Security

VoIP (Voice over Internet Protocol)

VoIP is a technology that allows voice communication and multimedia sessions over the internet, instead of traditional telephone lines. It converts voice signals into digital data packets for transmission over IP networks.

You will find this term commonly used in Networking, Telecommunications, General IT

VoiP (Voice over IP)

A technology that enables voice communication over the internet using the Internet Protocol (IP).

You will find this term commonly used in Networking

VoIP Adapter

A device that converts analog voice signals into digital data that can be transmitted over the internet.

You will find this term commonly used in Networking, Telecommunications

VoIP Gateway

A device or software application that converts voice traffic between the public switched telephone network (PSTN) and IP networks.

You will find this term commonly used in Networking

VoIP Phone

A telephone that uses Voice over Internet Protocol (VoIP) technology to make and receive calls over the internet.

You will find this term commonly used in Networking

VoIP Security

VoIP Security refers to the measures and protocols implemented to protect Voice over Internet Protocol (VoIP) systems and networks from various security threats, such as eavesdropping, tampering, and denial-of-service attacks.

You will find this term commonly used in Security, Cybersecurity, Networking

Volatile Function

In programming, a function whose value can change even if the input does not. This term is often used in the context of spreadsheet applications.

You will find this term commonly used in Software Development

Volatile Memory

Memory that requires power to maintain the stored information; it loses its contents when power is turned off.

You will find this term commonly used in General IT, Hardware

Volatile Storage

Storage that loses its data when power is turned off, such as RAM.

You will find this term commonly used in Hardware, Storage

Volatility (in computing)

Refers to the portion of a computer's memory that is temporary and loses its content when the computer is turned off or restarted.

You will find this term commonly used in Hardware, Operating Systems

VolP (Volume of Pages)

Not a standard IT term; possibly a typo or misunderstanding.

You will find this term commonly used in N/A

VolP Priority

A network management technique that gives higher priority to VoIP traffic to ensure call quality over networks.

You will find this term commonly used in Networking, Telecommunications

Voltage Regulator

A Voltage Regulator is an electronic device or circuit that maintains a constant output voltage level despite changes in input voltage or load conditions. It ensures stable and reliable operation of electronic devices and systems.

You will find this term commonly used in Hardware, Electrical Engineering, General IT

VoLTE (Voice over LTE)

A voice communication standard for delivering voice services over 4G LTE networks.

You will find this term commonly used in Networking

Volume Encryption

The process of encrypting an entire volume or disk drive, as opposed to individual files or folders.

You will find this term commonly used in Cybersecurity

Volume Licensing

The practice of selling software licenses in bulk to a specific organization, often with volume discounts.

You will find this term commonly used in General IT, Business Strategy

Volume Shadow Copy Service

A Windows service that creates backup copies of files or volumes, even while they are in use.

You will find this term commonly used in General IT

Volume Shadow Copy Service (VSS)

A Windows service that creates backup copies of files or volumes, even while they are in use.

You will find this term commonly used in General IT

Volume Testing

A type of software testing where the software is subjected to a huge volume of data to test its performance under different volumes of data.

You will find this term commonly used in Software Development, Testing

Volumetric Attack

A type of DDoS attack where the attacker aims to overwhelm the bandwidth of the targeted site or service.

You will find this term commonly used in Cybersecurity

Volumetric Efficiency

In cloud computing, refers to the efficiency with which data storage can be scaled up to meet demand without wasting resources.

You will find this term commonly used in Cloud Computing

Volunteer Computing

A type of distributed computing where volunteers provide computing resources (such as processing power or storage) to support projects, typically for research or public good.

You will find this term commonly used in Distributed Computing

Voronoi Diagram

A partitioning of a plane into regions based on distance to points in a specific subset of the plane, used in various fields including computer graphics and spatial analysis.

You will find this term commonly used in AI, Computational Geometry

Vortex

In computing, a point of convergence or a powerful flow, often used metaphorically to describe highly dynamic systems or processes.

You will find this term commonly used in General IT

VoWiFi (Voice over WiFi)

A technology that allows users to make voice calls over a Wi-Fi network rather than through a traditional cellular network.

You will find this term commonly used in Telecommunications, Networking

VPC (Virtual Private Cloud)

A cloud computing environment that is logically isolated from other virtual networks in the same cloud provider's infrastructure.

You will find this term commonly used in Cloud Computing

VPN (Virtual Private Network)

A secure network connection that enables users to access a private network over a public network, such as the internet.

You will find this term commonly used in Security, Networking

VPN Client

Software applications or devices used to establish secure VPN connections to remote networks or servers.

You will find this term commonly used in Security

VPN Concentrator

A device used to create and manage VPN connections, typically used in large-scale VPN deployments.

You will find this term commonly used in Security

VPN Server

A server that hosts VPN services and enables secure remote access to a private network over the internet.

You will find this term commonly used in Security

VPN Tunnel

A VPN Tunnel is a secure and encrypted connection established between a user's device and a VPN server, through which all data traffic is routed to ensure privacy and security. It creates a secure pathway within a public network, such as the internet.

You will find this term commonly used in Networking, Security, Cybersecurity

VPNaaS (Virtual Private Network as a Service)

A service model that provides virtual private network functionality to users over the internet as a subscription service.

You will find this term commonly used in Security, Networking

VPS (Virtual Private Server)

A virtual machine sold as a service by an Internet hosting service provider.

You will find this term commonly used in Virtualization

VRF (Virtual Routing and Forwarding)

A technology that allows multiple instances of a routing table to coexist within the same router, enabling the creation of virtual networks on shared physical infrastructure.

You will find this term commonly used in Networking

VRRP (Virtual Router Redundancy Protocol)

A networking protocol that provides automatic failover for routers on a LAN, ensuring continuous availability of network services.

You will find this term commonly used in Networking

Vue CLI

A command-line tool for scaffolding Vue.js projects.

You will find this term commonly used in Web Development

Vue.js

An open-source modelâviewâviewmodel front end JavaScript framework for building user interfaces and single-page applications.

You will find this term commonly used in Web Development

VUI Design

The design of voice user interfaces, where the user interacts with the system through voice or speech commands.

You will find this term commonly used in AI, User Interface

Vulkan API

A low-overhead, cross-platform 3D graphics and computing API, providing high-efficiency, cross-platform access to modern GPUs.

You will find this term commonly used in Software Development, Game Development

Vulnerability

A Vulnerability is a weakness or flaw in a system, application, or network that could be exploited by attackers to compromise the security of the system or access sensitive information. Vulnerabilities need to be identified and patched to prevent exploitation.

You will find this term commonly used in Cybersecurity, Security, General IT

Vulnerability Analysis

The process of identifying, quantifying, and prioritizing vulnerabilities in a system.

You will find this term commonly used in Cybersecurity

Vulnerability Assessment

Vulnerability assessment is the process of identifying, evaluating, and prioritizing security vulnerabilities in computer systems, networks, and applications, followed by recommendations for remediation and risk mitigation.

You will find this term commonly used in Cybersecurity, Security, Risk Management

Vulnerability Assessment Tool

Software tools designed to assess the security vulnerabilities of networks or systems.

You will find this term commonly used in Cybersecurity

Vulnerability Coordination

The process of managing the disclosure of vulnerabilities to ensure they are properly reported, fixed, and disclosed.

You will find this term commonly used in Cybersecurity

Vulnerability Database

A database that stores information about identified security vulnerabilities in software and hardware.

You will find this term commonly used in Cybersecurity

Vulnerability Detection

The process of identifying vulnerabilities in software or systems that could be exploited by attackers.

You will find this term commonly used in Cybersecurity

Vulnerability Disclosure

The process of reporting security vulnerabilities to the appropriate parties, such as software vendors or security researchers, to facilitate the development of patches or mitigations.

You will find this term commonly used in Cybersecurity

What's Your
Career Path?
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass