IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Deep Web

The part of the web that is not indexed by standard search engines.

You will find this term commonly used in Security, General IT

Default Gateway

The device that passes traffic from the local subnet to devices on other subnets.

You will find this term commonly used in Networking

Defense in Depth

A strategy that employs a series of mechanisms to slow the advance of an attack aimed at acquiring unauthorized access to information.

You will find this term commonly used in Security, Cybersecurity

Defragmentation

The process of consolidating fragmented files on a user's hard drive.

You will find this term commonly used in General IT

Delay Tolerant Networking (DTN)

An approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity.

You will find this term commonly used in Networking

Delegation

In computing, the process whereby an object or method passes on a task to another object or method. It's often used in reference to security delegation, where a user or process delegates permissions to another user or process.

You will find this term commonly used in General IT, Security

Delete

The operation of removing data from a database or removing a file from a filesystem.

You will find this term commonly used in General IT

Denial of Service (DoS) Attack

An attack meant to shut down a machine or network, making it inaccessible to its intended users by overwhelming it with traffic or sending it information that triggers a crash.

You will find this term commonly used in Security, Cybersecurity

Denormalization

The process of attempting to optimize the read performance of a database by adding redundant data or by grouping data.

You will find this term commonly used in General IT, Networking

Dependency

A state in which one object or process relies on another for its operation or processing.

You will find this term commonly used in General IT

Dependency Graph

A directed graph representing dependencies of several objects towards each other.

You will find this term commonly used in General IT, AI

Dependency Injection

A technique whereby one object supplies the dependencies of another object.

You will find this term commonly used in General IT

Dependency Management

The process of handling the dependencies of software components on other components.

You will find this term commonly used in General IT

Deployment

The activities that make a software system available for use.

You will find this term commonly used in General IT

Deployment Environment

A set of servers where software can be deployed, which could be development, testing, staging, and production.

You will find this term commonly used in General IT

Depth-First Search (DFS)

An algorithm for traversing or searching tree or graph data structures, starting at the root and exploring as far as possible along each branch before backtracking.

You will find this term commonly used in AI, General IT

Descriptive Programming

A programming paradigm that is used in automation testing to perform actions on objects that are not present in the object repository.

You will find this term commonly used in AI, General IT

Design Pattern

A general repeatable solution to a commonly occurring problem in software design.

You will find this term commonly used in General IT, AI

Design Thinking

A method for practical, creative resolution of problems or issues that looks for an improved future result.

You will find this term commonly used in General IT, AI

Desktop Application

Software that runs standalone on a desktop or laptop computer, contrasting with a web-based application, which requires the web browser to run.

You will find this term commonly used in General IT

Desktop Virtualization

A software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.

You will find this term commonly used in Networking, General IT

Detection Algorithm

An algorithm for detecting certain conditions or patterns, especially in the context of software and digital signals.

You will find this term commonly used in AI, Security

Device Driver

Software that tells the operating system and other software how to communicate with a piece of hardware.

You will find this term commonly used in General IT

Device Management

The process of managing the implementation, operation, and maintenance of a physical and/or virtual device.

You will find this term commonly used in General IT, Networking

DevOps

A set of practices that combines software development (Dev) and IT operations (Ops) aiming to shorten the systems development life cycle and provide continuous delivery with high software quality.

You will find this term commonly used in General IT

DevOps Engineer

Bridges the gap between software development and IT operations to streamline development, deployment, and integration processes.

You will find this term commonly used in Software Development, IT Operations

DevOps Toolchain

A set or combination of tools that aid in the delivery, development, and management of applications throughout the software development lifecycle, as coordinated by an organization that uses DevOps practices.

You will find this term commonly used in General IT

DevSecOps

An approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle.

You will find this term commonly used in Security, General IT

DHCP (Dynamic Host Configuration Protocol)

A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network.

You will find this term commonly used in Networking

DHCP Snooping

A security feature on switches that builds a table of DHCP messages and tracks the physical location of hosts.

You will find this term commonly used in Networking, Security

Diagnostics

Tools or processes used to identify and resolve issues in software or hardware.

You will find this term commonly used in General IT

Digital Asset Management (DAM)

Systems and software solutions for organizing, storing, and retrieving rich media and managing digital rights and permissions.

You will find this term commonly used in General IT

Digital Audio Broadcasting (DAB)

A digital radio standard for broadcasting digital audio radio services, used in several countries, especially in Europe.

You will find this term commonly used in Networking

Digital Certificate

A digital form of identification, like a passport, which provides information about the identity of an entity, and is used to manage encryption keys and digital signatures.

You will find this term commonly used in Security, Cybersecurity

Digital Divide

The gap between those who have ready access to computers and the internet, and those who do not.

You will find this term commonly used in General IT, Security

Digital Economy

An economy that is based on digital computing technologies.

You will find this term commonly used in General IT

Digital Ecosystem

A distributed, adaptive, open socio-technical system with properties of self-organization, scalability and sustainability inspired from natural ecosystems.

You will find this term commonly used in General IT, Networking

Digital Footprint

The information about a particular person that exists on the Internet as a result of their online activity.

You will find this term commonly used in Security, Cybersecurity

Digital Forensics

The branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.

You will find this term commonly used in Security, Cybersecurity

Digital Handshake

A virtual agreement or transaction that takes place over digital networks.

You will find this term commonly used in Security, General IT

Digital Identity

An online or networked identity adopted or claimed in cyberspace by an individual, organization, or electronic device.

You will find this term commonly used in Security, Cybersecurity

Digital Identity Verification

The process of using digital methods to prove the authenticity of an individual's claimed identity.

You will find this term commonly used in Security, Cybersecurity

Digital Literacy

The ability to find, evaluate, utilize, share, and create content using information technologies and the internet.

You will find this term commonly used in General IT, Education

Digital Native

A person born or brought up during the age of digital technology and therefore familiar with computers and the Internet from an early age.

You will find this term commonly used in General IT, Education

Digital Nomad

A person who uses telecommunications technologies to earn a living and, more generally, conduct their life in a nomadic manner.

You will find this term commonly used in General IT, Networking

Digital Rights

The rights of participants in digital culture, relating to online privacy, freedom of expression, and the right to use and create digital media.

You will find this term commonly used in Security, Cybersecurity

Digital Rights Management (DRM)

A set of access control technologies for restricting the use of proprietary hardware and copyrighted works.

You will find this term commonly used in Security, General IT

Digital Signal Processing (DSP)

The use of digital processing, such as by computers or more specialized digital signal processors, to perform a wide variety of signal processing operations.

You will find this term commonly used in General IT

Digital Signature

A mathematical scheme for verifying the authenticity of digital messages or documents.

You will find this term commonly used in Security, Cybersecurity

Digital Subscriber Line (DSL)

A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.

You will find this term commonly used in Networking

What's Your
Career Path?
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass