IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

ERP (Enterprise Resource Planning)

ERP systems integrate various functions like finance, HR, manufacturing, and supply chain into a single system, streamlining processes and information across the organization. This enhances decision-making and efficiency by providing a cohesive view of business operations.

You will find this term commonly used in General IT, Business Management

Error Budget

A concept in site reliability engineering (SRE) that quantifies the allowable downtime or error rate for a service within a specific period, promoting a balance between innovation and reliability.

You will find this term commonly used in IT Management, Site Reliability Engineering

Error Code

A numerical or alphanumeric code that is used to determine the nature of an error within a system and to suggest a possible solution. Error codes are used by software developers to debug and fix issues.

You will find this term commonly used in Software Development, IT Support

Error Correcting Code Memory (ECC Memory)

A type of computer data storage that can detect and correct the most common kinds of internal data corruption. ECC memory is used in high-end servers where data corruption cannot be tolerated.

You will find this term commonly used in Hardware, Data Management

Error Detection and Correction

Techniques used in telecommunications and computing to detect and correct errors in data transmission and storage. This includes methods like parity checks, checksums, and more sophisticated algorithms.

You will find this term commonly used in Networking, Data Management

Error Handling

The process of responding to and managing errors in a program. It is a critical part of software development and ensures that programs can deal with unexpected issues gracefully.

You will find this term commonly used in Software Development

Error Handling in Software Testing

The process of identifying, managing, and responding to errors or exceptions that occur during the execution of software tests, aiming to ensure that software behaves gracefully under unexpected conditions.

You will find this term commonly used in Software Development, QA

Error Log

A record of critical errors encountered by the operating system, applications, or servers, used by IT professionals and developers to diagnose and troubleshoot problems.

You will find this term commonly used in IT Management, Software Development

Error Reporting

The process of detecting, collecting, and reporting errors encountered in software or hardware, to help developers or technicians diagnose and fix issues.

You will find this term commonly used in Software Development, IT Support

Escalation Management

The process within IT service management that ensures timely and efficient resolution of critical incidents and problems by escalating them to higher levels of expertise, following predefined procedures and policies.

You will find this term commonly used in IT Service Management

Escalation Policy

A procedural plan in IT service management that defines how to increase the visibility and priority of unresolved tickets or issues. It ensures that critical problems are addressed by higher levels of authority in a timely manner.

You will find this term commonly used in IT Service Management, Security

Escrow

In IT, a service that holds the source code of software in trust for the software developer and the licensee, ensuring the licensee access to the source code if the developer is unable to support the software.

You will find this term commonly used in Software Development

Escrow Service in Software

A service that holds a copy of the source code of software applications on behalf of a licensee and the licensor. In the event the licensor fails to maintain and support the software, the licensee can access the source code.

You will find this term commonly used in Software Development, Legal

Ethereum

A decentralized, open-source blockchain system that features smart contract functionality. It provides a platform for creating and executing blockchain applications, including decentralized finance (DeFi) apps.

You will find this term commonly used in Blockchain, Cryptocurrency

Ethernet

Ethernet is a standard communication protocol embedded in software and hardware devices, used for building local area networks (LANs). It facilitates data exchange by specifying how network devices format and transmit data so other devices on the same network can recognize, receive, and process it.

You will find this term commonly used in Networking

Ethernet Cable

A type of network cable used for wired networks that connects devices such as computers, routers, and switches within a local area network (LAN).

You will find this term commonly used in Networking

Ethernet Frame

A data packet defined by the IEEE Ethernet standard for local area network (LAN) technology. It contains the source and destination address, data, and a frame check sequence for error detection.

You will find this term commonly used in Networking, Data Communication

Ethernet Over HDMI (EoH)

A feature that allows HDMI cables to carry Ethernet data along with video and audio, enabling connected devices to share an internet connection without the need for separate network cables.

You will find this term commonly used in Networking, Home Entertainment

Ethernet Over Power (EoP)

Ethernet Over Power (EoP) technology allows networks to run through electrical wiring, enabling devices to connect to a network using existing power outlets. It's useful in situations where conventional network cabling is not feasible.

You will find this term commonly used in Networking

Ethernet Switch

A network switch that operates at the data link layer of the OSI model to create a network. It connects devices in a LAN and uses packet switching to receive, process, and forward data to the destination device.

You will find this term commonly used in Networking

Ethical Hacker

A security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Ethical hackers help organizations identify security vulnerabilities to prevent unauthorized access by malicious hackers.

You will find this term commonly used in Cybersecurity

Ethical Hacking

The practice of bypassing system security to identify potential data breaches and threats in a network. The purpose of ethical hacking is to improve the security of the network by fixing vulnerabilities found during testing.

You will find this term commonly used in Cybersecurity

ETL (Extract, Transform, Load)

ETL is a process in data warehousing responsible for pulling data out of the source systems and placing it into a data warehouse. ETL involves extracting data, transforming it to fit operational needs, and then loading it into the end target database or data warehouse. It's crucial in data integration strategies, ensuring data accuracy and consistency.

You will find this term commonly used in Data Management

ETL (Extract, Transform, Load) Tools

Software tools used in data warehousing that allow for the extraction of data from various sources, its transformation into a format suitable for analysis, and its loading into a final target database.

You will find this term commonly used in Data Management, Software Development

ETL Pipeline

The process of extracting data from various sources, transforming it into a format suitable for analysis, and then loading it into a final destination, such as a data warehouse. ETL stands for Extract, Transform, Load.

You will find this term commonly used in Data Management, Software Development

Event Loop

A programming construct that waits for and dispatches events or messages in a program. It's a core concept in asynchronous and event-driven programming paradigms.

You will find this term commonly used in Software Development

Event Loop Model

A programming model where operations are executed based on events, typically in non-blocking systems or applications. It allows for handling high volumes of asynchronous actions without the need for multiple threads.

You will find this term commonly used in Software Development, Asynchronous Programming

Event Management

In ITSM (IT Service Management), event management involves monitoring and managing events that occur through the IT infrastructure to ensure that normal service operation is maintained.

You will find this term commonly used in IT Service Management

Event Processing

The method of tracking and analyzing streams of information (events) about things that happen (also called event streams), and deriving a conclusion from them to process and analyze real-time data.

You will find this term commonly used in Software Development, Data Analysis

Event Sourcing

A design pattern in which changes to the state of an application are stored as a sequence of events. This allows for complex business processes to be managed, audited, and replayed.

You will find this term commonly used in Software Development, Data Management

Event Stream Processing (ESP)

The technology that enables the real-time processing of continuous streams of data from multiple sources. ESP is used in various applications, such as monitoring financial transactions, social media streams, and sensor data in IoT devices.

You will find this term commonly used in Data Processing, Real-Time Analysis

Event Viewer

A component of Microsoft's Windows OS that lets administrators and users view the event logs on a local or remote machine, providing a way to audit and review events and troubleshoot issues.

You will find this term commonly used in General IT

Event-Based Integration

A method of integrating software applications and systems where communication is triggered by events rather than by direct calls between components. This approach can enhance system scalability and responsiveness.

You will find this term commonly used in Software Development, System Integration

Event-Driven Architecture

Event-Driven Architecture (EDA) is a software design pattern in which decoupled applications can asynchronously publish and subscribe to events via an event bus. This architecture enables highly scalable, flexible systems that are responsive to real-time data changes and are often used in microservices architectures.

You will find this term commonly used in Software Development, Networking

Event-Driven Architecture (EDA)

A software architecture pattern promoting the production, detection, consumption of, and reaction to events. This architecture enables applications to be more responsive and scalable.

You will find this term commonly used in Software Development, IT Management

Event-Driven Infrastructure

An IT infrastructure setup that responds to events or changes in the environment or system. This approach allows for more dynamic and automated responses to operational activities, improving efficiency and flexibility.

You will find this term commonly used in IT Management, Software Development

Event-Driven Programming

A programming paradigm in which the flow of the program is determined by events such as user actions (mouse clicks, key presses) or messages from other programs/threads.

You will find this term commonly used in Software Development

Event-Driven Service Architecture

An architectural style that promotes the production, detection, consumption of, and reaction to events, allowing services within an architecture to communicate and function based on event triggers rather than linear sequences of processes.

You will find this term commonly used in Software Development, IT Architecture

Eventual Consistency

A consistency model used in distributed computing where updates to a distributed database may not be immediately visible to all nodes, but all nodes will eventually become consistent over time.

You will find this term commonly used in Distributed Systems, Data Management

Evolutionary Algorithm

A subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm. An evolutionary algorithm uses mechanisms inspired by biological evolution, such as reproduction, mutation, recombination, and selection.

You will find this term commonly used in AI, Machine Learning

Evolutionary Computation

A subfield of artificial intelligence (AI) involving algorithms inspired by biological evolution, such as reproduction, mutation, selection, and crossover, to solve problems.

You will find this term commonly used in AI, Machine Learning

Evolutionary Database Design

A method of database design that allows for incremental changes and evolution of the database schema over time, facilitating agile software development practices and continuous integration/deployment cycles.

You will find this term commonly used in Database Design, Agile Development

Evolutionary Software Development

A method of software development that emphasizes the gradual growth and change of software capabilities over time, rather than attempting to deliver a complete system at once. It aligns with agile methodologies.

You will find this term commonly used in Software Development, Agile Methodologies

Exabyte

An exabyte is a unit of information or computer storage equal to one quintillion bytes (or a billion gigabytes). This term is often used in the context of big data and computing to describe large volumes of data.

You will find this term commonly used in Data Management, General IT

Exabyte (EB)

A unit of information or computer storage equal to one quintillion bytes (or, in SI, 1,000^6 or 10181018 bytes). Exabytes are used to measure massive data volumes, such as in large data centers.

You will find this term commonly used in Data Management

Exabyte Computing

Computing or data storage systems capable of handling exabyte volumes of data. An exabyte equals one billion gigabytes (GB), showcasing the scale of big data and the need for advanced data management solutions.

You will find this term commonly used in Big Data, Data Management

Exabyte Storage

A measure of data storage capacity that is equal to one quintillion bytes, or 1,000 petabytes. Exabyte-scale storage is used to describe the massive volume of data generated and stored by large-scale computing applications.

You will find this term commonly used in Data Management, Hardware

Exascale Computing

Exascale computing refers to computing systems capable of at least one exaFLOPS, or a billion billion (quintillion) calculations per second. This represents a significant milestone in computing capability, enabling the processing of massive datasets and complex simulations in fields like climate research, astrophysics, and materials science.

You will find this term commonly used in General IT, High-performance Computing

Exception Handling

Exception handling in software development is the process of responding to the occurrence of exceptions â anomalous or exceptional conditions requiring special processing â during the execution of a program. It is a critical part of robust software design, allowing programs to deal with unexpected issues effectively and safely.

You will find this term commonly used in Software Development

Exception Handling in Programming

A programming language construct or mechanism designed to handle the occurrence of exceptions, which are anomalous or exceptional conditions requiring special processing during program execution.

You will find this term commonly used in Software Development

What's Your
Career Path?
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass