A scientific discipline that uses advanced computing capabilities to understand and solve complex problems. It involves the development of models and simulations to study phenomena where theoretical or experimental approaches alone are insufficient or impractical.
You will find this term commonly used in Science, Computer Science
An interdisciplinary field that uses computational methods and tools to analyze and model social phenomena. By applying algorithms and simulations, researchers can study complex social systems, predict human behavior, and understand the dynamics of social networks.
You will find this term commonly used in Social Sciences, Computer Science
A problem-solving process that involves expressing problems and their solutions in ways that a computer could also execute. It includes logical analysis, algorithmic thinking, and the understanding of computer science concepts such as abstraction and decomposition. Computational thinking is fundamental in developing computer applications, but it is also applied across various disciplines to solve problems with precision and creativity.
You will find this term commonly used in General IT, Education
The inclusion of problem-solving techniques that leverage the principles of computer science in educational curricula, aiming to teach students to approach problems in a systematic and logical way, similar to how software algorithms are designed. Computational thinking skills include decomposition, pattern recognition, abstraction, and algorithmic thinking.
You will find this term commonly used in Education, Computer Science
A set of computers connected together for the purpose of sharing resources. The most common resource shared today is a connection to the Internet. Other shared resources can include a printer or a file server. The Internet itself can be considered a computer network.
You will find this term commonly used in Networking
A field of artificial intelligence that trains computers to interpret and understand the visual world. By using digital images from cameras and videos and deep learning models, computers can accurately identify and classify objects, and then react to what they "see".
You will find this term commonly used in AI, Machine Learning
The use of computer software to facilitate the creation, modification, analysis, or optimization of a design. CAD software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. It can be used to design objects in virtual 3D space or on flat surfaces.
You will find this term commonly used in Engineering, Design
The use of computer software to assist in the translation process. CAT tools support translators by providing functionalities such as translation memory, terminology management, and automated translation, thereby improving efficiency and consistency.
You will find this term commonly used in Software Development, Language
A form of computing in which several computations are executed during overlapping time periods—concurrently—instead of sequentially. This programming paradigm is essential in various applications, including network servers, web applications, and real-time systems, where tasks are performed simultaneously to improve efficiency and performance.
You will find this term commonly used in Software Development
A term used to describe a user who accesses a system or software at the same time as other users. In IT, managing concurrent users effectively is crucial for ensuring that systems can handle multiple requests without performance degradation, particularly in web applications, databases, and networks.
You will find this term commonly used in Networking, Software Development
The process of tracking changes in IT environments to ensure that configurations remain in a known and authorized state. Monitoring helps identify unintended or unauthorized changes (drift) that could compromise system integrity or security.
You will find this term commonly used in IT Management, Security
The process of systematically handling changes to a system in a way that it maintains integrity over time. Configuration management in IT involves the detailed recording and updating of information that describes an enterprise's hardware and software. This practice is crucial for understanding the state of IT infrastructure, ensuring compliance with specific standards, and facilitating disaster recovery.
You will find this term commonly used in IT Management
A cloud service model that allows users to manage and deploy containers, orchestrate container management, and scale applications through containerized architecture on cloud platforms. CaaS providers offer a managed container environment where developers can easily deploy applications without managing the underlying infrastructure.
You will find this term commonly used in Cloud Computing, Software Development
The comprehensive management of containerized applications from development and deployment to operation and scaling. It encompasses the creation, deployment, scaling, updating, and termination of containers, ensuring that they meet performance, security, and compliance requirements throughout their lifecycle.
You will find this term commonly used in Software Development, Cloud Computing
An architectural approach that uses containers to encapsulate individual microservices, improving scalability, portability, and efficiency. This architecture facilitates the development, deployment, and management of applications composed of loosely coupled, independently deployable microservices.
You will find this term commonly used in Software Development, Microservices
The automated arrangement, coordination, and management of computer containers in a microservices architecture. Tools like Kubernetes, Docker Swarm, and Mesos are used for container orchestration, enabling the scaling, deployment, and management of containers across clusters of servers. This technology is crucial for DevOps practices and for the deployment of scalable and highly available applications.
You will find this term commonly used in Software Development
The use of tools and software to automatically manage, scale, and deploy containers in a cloud environment. Automation in container orchestration simplifies operations, enhances scalability, and improves reliability and availability of applications by managing container lifecycles, networking, and service discovery without manual intervention.
You will find this term commonly used in DevOps, Cloud Computing
A repository for storing container images. It allows developers to pull and push container images for use in their applications. Container registries are an essential part of the containerization process and DevOps practices, enabling version control, artifact management, and secure storage of containers.
You will find this term commonly used in Software Development
A set of guidelines and strategies for securing containerized applications and infrastructure. This includes securing the container runtime environment, managing container images securely, implementing network policies for containers, and monitoring container activity for anomalies.
You will find this term commonly used in Cloud Computing, Security
A lightweight alternative to full machine virtualization that involves encapsulating an application in a container with its own operating environment. This method enables developers to create and deploy applications faster and more securely. Containerization supports CI/CD in software development, allowing for the continuous integration and deployment of applications.
You will find this term commonly used in Software Development
The set of practices and tools designed to protect containerized applications and infrastructure from threats and vulnerabilities. Security considerations for containerization include image security, container orchestration security, network security, and runtime protection.
You will find this term commonly used in Security, Cloud Computing
An API designed to support the delivery and management of content across digital channels. Content delivery APIs are used to programmatically interact with content management systems (CMS) for the retrieval, manipulation, and presentation of content in web and mobile applications.
You will find this term commonly used in Web Development, Software Development
Servers located at the edge of a network that deliver web content to users based on their geographic location. Edge servers are part of a CDN and help to reduce latency, increase content delivery speed, and improve the user experience by caching content closer to where users are located.
You will find this term commonly used in Networking, Web Development
The process of enhancing the performance and efficiency of a CDN, which distributes content from the original site to multiple, geographically dispersed servers. Optimization can involve adjusting caching rules, selecting optimal server locations, and using data analytics to predict and manage traffic loads, all aimed at improving website speed and user experience.
You will find this term commonly used in Networking, Web Development
A system that provides the necessary infrastructure to create, manage, and deploy content on the web. Unlike a Content Management System (CMS), which is more out-of-the-box ready, a CMF provides more flexibility and is aimed at developers, offering the building blocks to create a custom CMS tailored to specific needs.
You will find this term commonly used in Web Development, Software Development
An added layer of security used by web developers to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. CSP is implemented by specifying directives that dictate sources of content that browsers are allowed to load on a webpage.
You will find this term commonly used in Security, Web Development
The process of storing and restoring the state (context) of a CPU so that multiple processes can share a single CPU resource. Context switching allows for multitasking by enabling a single CPU to manage the execution of multiple processes by switching between them.
You will find this term commonly used in Operating Systems, Hardware
A security approach that continuously verifies the identity of a user based on behavioral and environmental factors, rather than relying on a single login session. This method provides a more dynamic and potentially more secure form of authentication.
You will find this term commonly used in Security, Cybersecurity
The ongoing process of tracking and verifying that IT systems and business operations adhere to regulatory standards, industry best practices, and internal policies. Continuous compliance monitoring helps organizations detect compliance gaps in real time and address them promptly to avoid penalties and reduce risk.
You will find this term commonly used in IT Management, Security
The practice of automating the configuration and management of computers and software within an IT environment. CCA tools enable IT professionals to maintain consistent settings and software states across large-scale infrastructure, improving security and efficiency.
You will find this term commonly used in IT Management, DevOps
A backup and recovery method that automatically captures every version of data modification. This allows users or administrators to restore data to any point in time, ensuring that no data is lost in the event of a failure or mistake. CDP is particularly useful for critical data that changes frequently.
You will find this term commonly used in IT Management, Data Recovery
A software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time. It aims at building, testing, and releasing software with greater speed and frequency.
You will find this term commonly used in Software Development
The process and technology used to detect compliance and risk issues associated with an organization's financial and operational environment. The strategy focuses on monitoring company processes and controls with the aim of identifying significant issues as soon as possible and enabling better risk management and decision-making.
You will find this term commonly used in Security, IT Management
The practice of using automated tools and processes to continuously monitor network traffic, devices, and services for unusual activity that could indicate a security threat or operational issue. This approach enables organizations to detect and respond to issues in real-time, improving the overall security posture and network performance.
You will find this term commonly used in Networking, Security
The ongoing process of ensuring that software development processes and products meet or exceed predefined quality standards and customer expectations. Continuous quality assurance integrates quality checks and testing throughout the software development lifecycle to identify and address issues early, improving the overall quality of the final product.
You will find this term commonly used in Software Development, Quality Assurance
The process of executing automated tests as part of the software delivery pipeline to obtain immediate feedback on the business risks associated with a software release candidate. Continuous testing helps teams to assess the quality of their software at every stage of development and deployment, reducing bugs and improving performance.
You will find this term commonly used in Software Development, Testing
In computer science, control flow refers to the order in which individual statements, instructions, or function calls are executed or evaluated within a program. It is a fundamental concept that allows software developers to dictate the logic and operations of their programs through structures like loops, conditionals, and branches.
You will find this term commonly used in Software Development
A user interface that mimics human conversation, allowing users to interact with software through text or voice-based inputs in a natural and intuitive way. CUIs are commonly implemented in chatbots and virtual assistants.
You will find this term commonly used in AI, User Experience
Often referred to as the "brain" of the computer, the CPU performs most of the calculations which enable a computer to function. It executes commands from a computer's hardware and software, performing arithmetic and logic operations that process data.
You will find this term commonly used in Hardware, General IT
A small-sized type of volatile computer memory that provides high-speed data access to the processor and stores frequently used computer programs, applications, and data. CPU cache helps speed the process of data exchange by storing instances of programs and data routinely accessed by the processor, reducing the need to access slower main memory.
You will find this term commonly used in Hardware, General IT
The process of automatically adjusting the clock speed of a CPU based on the actual need, to conserve power and reduce heat generation. Throttling is used in various computing devices to prevent overheating and to extend battery life in portable devices.
You will find this term commonly used in Hardware, Operating Systems
Focuses on risk management and the design, implementation, monitoring, and maintenance of IS controls.
You will find this term commonly used in Risk Management
A technology for managing all your company's relationships and interactions with customers and potential customers. The goal is straightforward: Improve business relationships to grow your business. A CRM system helps companies stay connected to customers, streamline processes, and improve profitability.
You will find this term commonly used in Business, Marketing
The practice of securely sharing data across different security domains, organizational boundaries, or IT environments. This involves implementing controls and protocols to ensure that data can be exchanged safely and in compliance with applicable regulations and policies.
You will find this term commonly used in Data Management, Security
A security mechanism that provides controlled interfaces to enable the transfer of information between networks or systems operating under different security policies. CDSs are used in military and government IT environments to ensure that sensitive information is shared securely and in compliance with all applicable security regulations.
You will find this term commonly used in Security, Networking
The deployment and configuration of systems that enable the secure transfer of information across different security domains, typically in military and government environments. Implementation of CDS ensures that sensitive information can be shared securely and in compliance with organizational policies and regulatory requirements.
You will find this term commonly used in Security, Information Sharing
The practice of bringing together IT professionals from different specialties or departments to work on shared projects or solve complex problems. This collaboration fosters innovation, accelerates project timelines, and leverages diverse expertise to improve technology solutions and business outcomes.
You will find this term commonly used in IT Management, Team Collaboration
A software development approach that involves team members with different functional expertise working together towards a common goal. This approach is designed to foster innovation, accelerate development timelines, and enhance product quality by leveraging diverse perspectives and skills.
You will find this term commonly used in Software Development, Management
A group of people with different functional expertise working toward a common goal. In IT, cross-functional teams often include developers, operations staff, quality assurance testers, and business analysts, working together to develop, deploy, and maintain software systems in a more collaborative and efficient manner.
You will find this term commonly used in Management, Software Development
A security feature that prevents a document from loading any cross-origin resources that do not explicitly grant the document permission (using CORP or CORS). COEP is part of a set of security measures that aim to mitigate certain types of cross-origin attacks, enhancing web application security.
You will find this term commonly used in Web Development, Security
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.