IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Data Verification

The process of checking that data is accurate and consistent with the original source or with what was expected.

You will find this term commonly used in Security, General IT

Data Versioning

The practice of keeping multiple versions of datasets or data elements to track changes over time, often for purposes of analysis, testing, or historical reference.

You will find this term commonly used in General IT, AI

Data Virtualization

The process of integrating data from disparate sources, locations, and formats to create a single stream of data without replicating it.

You will find this term commonly used in Networking, General IT

Data Visibility

The degree to which data and data processes are accessible and understandable to stakeholders, often related to governance and transparency.

You will find this term commonly used in General IT, Business

Data Visualization

The graphical representation of information and data.

You will find this term commonly used in General IT, AI

Data Visualization Specialist

Creates graphical representations of data to help end users understand complex information more easily.

You will find this term commonly used in Data Science, Visualization

Data Volume

The quantity of data generated or processed, often discussed in the context of big data challenges and storage capacities.

You will find this term commonly used in General IT, AI

Data Vortex

A complex, potentially chaotic data environment where data from various sources is constantly moving and changing, making it difficult to manage or analyze.

You will find this term commonly used in AI, General IT

Data Vulnerability

The susceptibility of data to unauthorized access, breaches, or other forms of exposure that compromise privacy or security.

You will find this term commonly used in Security, Cybersecurity

Data Warehouse

A system used for reporting and data analysis, and is considered a core component of business intelligence.

You will find this term commonly used in General IT, Networking

Data Warehousing

The electronic storage of a large amount of information by a business, in a manner that is secure, reliable, easy to retrieve, and easy to manage.

You will find this term commonly used in General IT, Networking

Data Wrangling

The process of cleaning, structuring and enriching raw data into a desired format for better decision making in less time.

You will find this term commonly used in General IT, AI

Data-driven Decision Making

Making decisions based on data analysis rather than intuition or observation alone.

You will find this term commonly used in General IT, Business

Database (DB)

A structured set of data held in a computer, especially one that is accessible in various ways.

You will find this term commonly used in General IT, Networking

Database Administration

The function of managing and maintaining database management systems (DBMS) software.

You will find this term commonly used in General IT, Security

Database Administration (DBA)

The function of managing and maintaining database management systems (DBMS) software.

You will find this term commonly used in General IT

Database Administrator (DBA)

Manages and maintains database systems to ensure security, integrity, and performance.

You will find this term commonly used in Database Management

Database as a Service (DBaaS)

A cloud service model that provides users with access to a database without the need for setting up physical hardware, installing software, or configuring for performance.

You will find this term commonly used in Networking, General IT

Database Caching

A technology used to increase the speed of data retrieval by storing a copy of datasets in a temporary storage space known as a cache.

You will find this term commonly used in General IT, Networking

Database Clustering

The use of two or more servers, or nodes, with a database management system software that is designed to store and deliver the database services.

You will find this term commonly used in General IT, Networking

Database Index

A data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure.

You will find this term commonly used in General IT

Database Indexing

A data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure.

You will find this term commonly used in General IT

Database Management

The process of defining, manipulating, retrieving and managing data in databases.

You will find this term commonly used in General IT

Database Management System (DBMS)

A software package designed to define, manipulate, retrieve, and manage data in a database.

You will find this term commonly used in General IT, Networking

Database Migration

The process of moving databases from one platform to another, which may involve converting the database to a new format or adapting it to new software.

You will find this term commonly used in General IT

Database Mirroring

A solution for increasing the availability of a SQL Server database by copying its data to a secondary database.

You will find this term commonly used in General IT, Networking

Database Normalization

The process of structuring a relational database in accordance with a series of so-called normal forms in order to reduce data redundancy and improve data integrity.

You will find this term commonly used in General IT

Database Query

A request for data or information from a database table or combination of tables.

You will find this term commonly used in General IT, AI

Database Schema

The structure of a database described in a formal language supported by the database management system (DBMS).

You will find this term commonly used in General IT

Database Security

Measures that ensure that the data stored in a database is protected from compromise and that the data management operations are performed securely.

You will find this term commonly used in Security, Cybersecurity

Database Server

A server that provides database services to other computer programs or computers, as defined by the client-server model.

You will find this term commonly used in Networking, General IT

Database Sharding

A type of database partitioning that separates very large databases the into smaller, faster, more easily managed parts called data shards.

You will find this term commonly used in Networking, General IT

Database Snapshot

A read-only, static view of a database (usually for backup or reporting purposes) that reflects the data at a particular point in time.

You will find this term commonly used in General IT, Networking

Database Transaction

A unit of work performed within a database management system (or similar system) against a database, and treated in a coherent and reliable way independent of other transactions.

You will find this term commonly used in General IT

Datacenter Networking

The network infrastructure, tools, and methodologies used to connect and manage resources and data flow within and between data centers.

You will find this term commonly used in Networking, General IT

Datagram

A basic transfer unit associated with a packet-switched network, which is a small packet of information that travels through a network independently of other datagrams.

You will find this term commonly used in Networking

DDoS Attack (Distributed Denial of Service Attack)

An attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

You will find this term commonly used in Security, Cybersecurity

Debugging

The process of finding and resolving defects or problems within a computer program that prevent correct operation.

You will find this term commonly used in General IT

Debugging Tool

Software for testing and debugging programs and applications.

You will find this term commonly used in General IT

Decentralized Application (DApp)

An application that runs on a distributed computing system.

You will find this term commonly used in General IT, Security

Decentralized Autonomous Organization (DAO)

An organization represented by rules encoded as a computer program that is transparent, controlled by the organization members and not influenced by a central government.

You will find this term commonly used in Security, Cybersecurity

Decentralized Finance (DeFi)

Financial software built on blockchain technology that enables peer-to-peer transactions without the need for traditional financial intermediaries.

You will find this term commonly used in Security, Cybersecurity

Decentralized Identifier (DID)

A new type of identifier that enables verifiable, self-sovereign digital identities. DIDs are fully under the control of the DID subject, independent from any centralized registry, identity provider, or certificate authority.

You will find this term commonly used in Security, Cybersecurity

Decentralized Network

A network structure in which some functions and decisions are decentralized to individual or local units.

You will find this term commonly used in Networking, Security

Decision Support System (DSS)

An information system that supports business or organizational decision-making activities.

You will find this term commonly used in General IT, AI

Decryption

The process of converting encrypted data back into its original form, so it can be understood.

You will find this term commonly used in Security, Cybersecurity

Deep Fake

Synthetic media in which a person in an existing image or video is replaced with someone else's likeness using artificial neural networks.

You will find this term commonly used in AI, Security

Deep Learning

A subset of machine learning in artificial intelligence (AI) that has networks capable of learning unsupervised from data that is unstructured or unlabeled.

You will find this term commonly used in AI

Deep Linking

The use of a hyperlink that links to a specific, generally searchable or indexed, piece of web content.

You will find this term commonly used in General IT, Networking

Deep Packet Inspection (DPI)

A form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point.

You will find this term commonly used in Networking, Security

What's Your
Career Path?
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass