IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Data Fabric

An architecture and set of data services that provide consistent capabilities across a choice of endpoints spanning on-premises and multiple cloud environments.

You will find this term commonly used in General IT, Networking

Data Federation

The process of integrating data from disparate sources in a virtual database so it can be accessed and analyzed as if it were a single database.

You will find this term commonly used in General IT, Networking

Data Federation Technology

The capability to create a virtual database that aggregates data from multiple sources without moving or copying the data.

You will find this term commonly used in Networking, General IT

Data Filtering

The process of selecting a subset of data from a larger dataset, based on a set of criteria.

You will find this term commonly used in General IT, AI

Data Flow Diagram

A graphical representation of the flow of data through an information system.

You will find this term commonly used in General IT, AI

Data Fusion

The process of integrating multiple data sources to produce more consistent, accurate, and useful information than that provided by any individual data source.

You will find this term commonly used in AI, General IT

Data Governance

The overall management of the availability, usability, integrity, and security of the data employed in an organization.

You will find this term commonly used in General IT, Security

Data Governance Framework

A set of guidelines and standards for data management and usage, ensuring data quality, compliance, and security across an organization.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Harmonization

The process of bringing together data of varying file formats, naming conventions, and columns, and transforming it into one cohesive dataset with a unified view.

You will find this term commonly used in General IT, AI

Data Hierarchy

The systematic organization of data, often in a hierarchical form, based on a structure of data elements and their relationships.

You will find this term commonly used in General IT

Data Hygiene

The collective processes conducted to ensure the cleanliness of data.

You will find this term commonly used in General IT, AI

Data Imputation

The process of replacing missing data with substituted values in order to maintain the integrity of a dataset for analysis.

You will find this term commonly used in AI, General IT

Data Inconsistency

The presence of differing data about the same object in different places.

You will find this term commonly used in General IT, Security

Data Index

A data structure that improves the speed of data retrieval operations on a database at the cost of additional writes and storage space to maintain the structure.

You will find this term commonly used in General IT

Data Ingestion

The process of obtaining and importing data for immediate use or storage in a database.

You will find this term commonly used in General IT, AI

Data Ingestion Pipeline

The collection of processes and technologies involved in capturing, processing, and storing data for further use or analysis.

You will find this term commonly used in General IT, AI

Data Insight

The understanding and actionable information that can be derived from data analysis.

You will find this term commonly used in AI, General IT

Data Integration

The process of combining data from different sources into a single, unified view.

You will find this term commonly used in Networking, General IT

Data Integrity

The maintenance of, and the assurance of the accuracy and consistency of, data over its entire lifecycle.

You will find this term commonly used in Security, Cybersecurity, General IT

Data Interaction

The ways in which users query, visualize, and interact with data within applications or software environments.

You will find this term commonly used in General IT, AI

Data Interchange Standard

A standard that defines a specific format for exchanging data between software applications or within an organization.

You will find this term commonly used in General IT, Networking

Data Interoperability

The ability of different systems, devices, and applications to connect and communicate in a coordinated way, share data, and use the information that has been exchanged.

You will find this term commonly used in General IT, Networking

Data Isolation

The process of keeping data separate to prevent unauthorized access or accidental sharing of sensitive information.

You will find this term commonly used in Security, Cybersecurity

Data Journalism

The practice of gathering and analyzing large datasets to support and convey news stories in a compelling and understandable manner.

You will find this term commonly used in General IT, AI

Data Lake

A storage repository that holds a vast amount of raw data in its native format until it is needed.

You will find this term commonly used in General IT, AI

Data Lake Analytics

The process of analyzing data stored in a data lake, often using big data processing tools and techniques.

You will find this term commonly used in AI, General IT

Data Lakehouse

A new data management architecture that combines the elements of data lakes and data warehouses.

You will find this term commonly used in General IT, AI

Data Leakage

The unauthorized transmission of data from within an organization to an external destination or recipient.

You will find this term commonly used in Security, Cybersecurity

Data Lifecycle

The series of stages through which data goes, from initial creation or acquisition to retirement or deletion.

You will find this term commonly used in General IT, Security

Data Lifecycle Management (DLM)

The process of managing the flow of an information system's data from creation and initial storage to the time when it becomes obsolete and is deleted.

You will find this term commonly used in General IT, Security

Data Lineage

The process of understanding, recording, and visualizing data as it flows from data sources to consumption.

You will find this term commonly used in General IT, AI

Data Literacy

The ability to read, understand, create, and communicate data as information.

You will find this term commonly used in General IT, Education

Data Loading

The process of transferring data from one system or format into another, typically into a database or data warehouse.

You will find this term commonly used in General IT

Data Localization

The practice of storing data on any device that is physically present within the borders of a specific country, which is required by law in some jurisdictions.

You will find this term commonly used in Security, Cybersecurity

Data Lock-In

The difficulty of transferring data and services from one provider or platform to another, due to proprietary formats, technologies, or contractual restrictions.

You will find this term commonly used in General IT, Security

Data Loss

The process by which data is lost to the user, either by data corruption, data erasure, or data becoming inaccessible.

You will find this term commonly used in Security, Cybersecurity

Data Loss Prevention (DLP)

A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

You will find this term commonly used in Security, Cybersecurity

Data Management Platform (DMP)

A centralized computing system for collecting, integrating, managing, and analyzing large sets of structured and unstructured data from disparate sources.

You will find this term commonly used in General IT, AI

Data Manipulation Language (DML)

The subset of SQL used to add, update, or delete data in a database.

You will find this term commonly used in General IT

Data Mapping

The process of creating data element mappings between two distinct data models.

You will find this term commonly used in General IT, AI

Data Mart

A subset of a data warehouse focused on a particular line of business, department, or subject area.

You will find this term commonly used in General IT, Networking

Data Masking

The process of hiding original data with modified content (characters or other data).

You will find this term commonly used in Security, Cybersecurity

Data Mesh

A decentralized approach to data architecture and organizational design.

You will find this term commonly used in General IT, AI

Data Migration

The process of selecting, preparing, extracting, and transforming data and permanently transferring it from one computer storage system to another.

You will find this term commonly used in General IT

Data Minimization

The principle of collecting no more personal data than necessary.

You will find this term commonly used in Security, Cybersecurity

Data Mining

The process of discovering patterns and knowledge from large amounts of data.

You will find this term commonly used in AI, General IT

Data Model

An abstract model that organizes data elements and standardizes how they relate to one another and to the properties of real-world entities.

You will find this term commonly used in General IT, AI

Data Modeling

The process of creating a data model for the data to be stored in a database.

You will find this term commonly used in General IT, AI

Data Monetization

The process of using data to increase revenue, which includes direct selling of data or using data to improve business processes and decision making.

You will find this term commonly used in General IT, Business

Data Munging

Also known as data wrangling, the process of cleaning and unifying complex and messy data sets for easy access and analysis.

You will find this term commonly used in AI, General IT

What's Your
Career Path?
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass