IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

File Allocation Table (FAT)

A file system architecture used in many operating systems for storing file directories and metadata. FAT is simple and widely compatible but has limitations in terms of maximum disk size and file size.

You will find this term commonly used in Operating Systems, Storage

File Allocation Techniques

The methods used by operating systems to allocate space on a filesystem for files. This can include methods like contiguous allocation, linked allocation, and indexed allocation, each with its own advantages and disadvantages in terms of speed, space efficiency, and fragmentation.

You will find this term commonly used in Operating Systems, Storage

File Carving

The process of extracting files from a digital storage medium based on content, typically used in digital forensics to recover deleted files.

You will find this term commonly used in Cybersecurity, Digital Forensics

File Descriptor

An abstract indicator used to access a file or other input/output resource, such as a pipe or network socket. File descriptors form part of the POSIX API and are an integral part of Unix and Linux systems programming.

You will find this term commonly used in Operating Systems, General IT

File Encryption

The process of using a cryptographic algorithm to transform readable data (plaintext) into a form that hides its original content (ciphertext), ensuring that only authorized parties can access it.

You will find this term commonly used in Security, Privacy

File Handle

An abstract indicator (or token) used for accessing a file or other data resource. It is used by operating systems to allow applications to manipulate and track the use of files and other resources.

You will find this term commonly used in General IT, Operating Systems

File Integrity Check

A security process that uses cryptographic hashes to verify the integrity and authenticity of files, detecting any unauthorized changes.

You will find this term commonly used in Cybersecurity

File Integrity Monitoring (FIM)

A security process that involves the real-time monitoring and analysis of files to detect unauthorized changes. This can help in early detection of tampering, data breaches, or compliance issues with critical system and configuration files.

You will find this term commonly used in Security, Cybersecurity

File Level Storage

A storage architecture where data is stored and organized as files within folders, similar to how data is stored on a personal computer's file system.

You will find this term commonly used in Data Management, Storage

File Locking

A mechanism that prevents simultaneous access to a file by multiple processes to avoid data corruption or inconsistency.

You will find this term commonly used in General IT, Data Management

File Signature

A unique sequence of bytes used to identify or verify the content and format of a file. File signatures, often found in the file header, help in determining the file type regardless of the file extension, enhancing security and data management strategies.

You will find this term commonly used in Security, General IT

File Synchronization

The process of ensuring that files in two or more locations are updated through certain rules. In cloud computing and data management, file synchronization is used to consistently maintain copies of files across multiple devices or cloud storage services, ensuring data consistency and accessibility.

You will find this term commonly used in Cloud Computing, Data Management

File System

The method and data structures that an operating system uses to keep track of files on a disk or partition; the way files are organized on the disk.

You will find this term commonly used in General IT, Storage

File System Clustering

A method of using multiple servers to manage file system storage, enhancing performance and reliability by distributing file system services.

You will find this term commonly used in Storage, High Availability

File System Hierarchy

The organization of directories and files in a hierarchical structure within an operating system. It defines the way files are stored, organized, and accessed on a storage device.

You will find this term commonly used in Operating Systems, Storage

File System Permissions

Rules in a file system that determine who can access files and directories, and what actions they can perform (read, write, execute). Permissions are crucial for maintaining system security and ensuring that only authorized users can access or modify files.

You will find this term commonly used in Operating Systems, Security

File Transfer Protocol (FTP)

A standard network protocol used for the transfer of computer files between a client and server on a computer network.

You will find this term commonly used in Networking, Web Technologies

File Transfer Protocol Secure (FTPS)

An extension of the File Transfer Protocol (FTP) that adds support for the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) cryptographic protocols to ensure secure file transfers.

You will find this term commonly used in Networking, Security

File Versioning

The practice of keeping multiple versions of a file within a file system. This allows users to access, restore, or analyze previous versions of a file, providing a safety net for data recovery and change tracking.

You will find this term commonly used in Software Development, Storage

Filesystem Hierarchy Standard (FHS)

A set of requirements and guidelines for file and directory placement under UNIX-like operating systems. The FHS helps maintain consistency and organization within the system, making it easier for users and programs to find files.

You will find this term commonly used in Operating Systems

Filter Bubble

A phenomenon where algorithms selectively guess what information a user would like to see based on the user's past behavior and preferences, potentially isolating the user from contrasting viewpoints.

You will find this term commonly used in AI, General IT

Fingerprinting (Digital)

The process of identifying unique attributes or characteristics of a software, device, or network for the purposes of identification or security assessment.

You will find this term commonly used in Cybersecurity, Digital Forensics

Finite Element Analysis (FEA)

A computational technique used to simulate how a product reacts to real-world forces, vibration, heat, and other physical effects. While not exclusively an IT term, FEA software is crucial in designing and testing components, including those in IT hardware.

You will find this term commonly used in Hardware, Software Development

Finite State Machine

A computational model used to design computer programs and sequential logic circuits. It is a mathematical model of computation that transitions through a series of states based on inputs.

You will find this term commonly used in Software Development, AI

Fintech

A term used to describe the new tech that seeks to improve and automate the delivery and use of financial services. At its core, fintech is utilized to help companies, business owners, and consumers better manage their financial operations.

You will find this term commonly used in General IT, Software Development

Firewall

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

You will find this term commonly used in Security, Networking

Firewall as a Service (FWaaS)

A new type of a next-generation firewall. It comes with the flexibility of being a cloud service and combines the benefits of an on-premises firewall with the simplicity and cost-effectiveness of a cloud service.

You will find this term commonly used in Cloud Computing, Security

Firewall Auditing

The process of reviewing and analyzing the effectiveness of firewall rules and policies to ensure they are properly securing the network while allowing legitimate traffic. Firewall auditing helps identify misconfigurations and outdated rules.

You will find this term commonly used in Security, Networking

Firewall Bypass

Techniques or technologies that enable communication to and from a protected network to evade or circumvent firewall rules and policies.

You will find this term commonly used in Cybersecurity

Firewall Configuration

The process of setting up firewall rules and policies to manage and control the flow of inbound and outbound network traffic. Firewall configuration is critical for defining what traffic is allowed or blocked to protect the network from unauthorized access and threats.

You will find this term commonly used in Security, Networking

Firewall Configuration Management

The ongoing process of managing and maintaining the optimal settings and policies of a firewall to protect network resources. This includes regularly updating firewall rules, monitoring performance, and ensuring the firewall is effectively securing the network against threats.

You will find this term commonly used in Networking, Security

Firewall Inspection

A process where incoming and outgoing network traffic is monitored and analyzed by a firewall to detect and block potentially harmful data packets based on a set of security rules. This can include deep packet inspection (DPI), which examines the data part (and possibly the header) of the packet.

You will find this term commonly used in Security, Networking

Firewall Log Analysis

The process of examining logs produced by firewalls to monitor and analyze network traffic for signs of suspicious activity or unauthorized access attempts. Firewall log analysis is crucial for network security and compliance.

You will find this term commonly used in Security, Networking

Firewall Penetration Testing

The practice of testing a firewall's security by simulating attacks to identify vulnerabilities and configuration issues. It helps in assessing the effectiveness of firewall policies and the overall security posture of a network.

You will find this term commonly used in Security, Networking

Firewall Policy Management

The process of creating, modifying, and enforcing rules and policies within a firewall to control access to network resources. Effective firewall policy management is crucial for protecting a network from unauthorized access and threats.

You will find this term commonly used in Security, Networking

Firewall Rule

A specific instruction or condition configured in a firewall to manage the traffic over a network. Firewall rules can allow, block, or prompt for user authorization depending on the criteria set, such as IP addresses, port numbers, and protocols, to enhance network security.

You will find this term commonly used in Networking, Security

Firewall Ruleset Optimization

The process of adjusting the set of rules in a firewall to improve performance, security, and management efficiency.

You will find this term commonly used in Cybersecurity, Networking

Firewall Whitelisting

A security measure where a firewall is configured to allow only specified traffic through, based on a list of approved services, IP addresses, or domains. This is considered a more restrictive approach compared to blacklisting, which blocks specified traffic.

You will find this term commonly used in Networking, Security

Firmware

A specific class of computer software that provides the low-level control for a device's specific hardware. Firmware can be thought of as "semi-permanent" software that is tightly bound to the hardware it controls.

You will find this term commonly used in Hardware, General IT

Firmware Analysis

The process of examining the software that provides low-level control for a device's specific hardware to understand its functionalities or find vulnerabilities.

You will find this term commonly used in Cybersecurity, Embedded Systems

Firmware Compatibility

The degree to which a piece of firmware can work with other systems, devices, or previous versions of itself. Compatibility issues can arise when hardware is updated or when trying to integrate devices from different manufacturers.

You will find this term commonly used in Hardware, Software Development

Firmware Decompilation

The process of reverse engineering firmware binaries to their source code or a higher-level representation to understand or modify their behavior.

You will find this term commonly used in Cybersecurity, Reverse Engineering

Firmware Development Kit (FDK)

A set of tools, libraries, and resources provided by hardware manufacturers to facilitate the development of firmware for their devices. FDKs often include compilers, debuggers, and documentation to assist developers in creating efficient and functional firmware.

You will find this term commonly used in Hardware, Software Development

Firmware Engineering

The process of designing, implementing, and testing firmware, which is the software programmed into the read-only memory of a hardware device. Firmware engineering involves both software development skills and an understanding of the hardware it will control.

You will find this term commonly used in Hardware, Software Development

Firmware Hacking

The act of modifying or exploiting the firmware of devices to unlock features not intended by the manufacturer or to embed malicious code.

You will find this term commonly used in Cybersecurity

Firmware Over-the-Air (FOTA)

A technology that enables manufacturers to update firmware remotely over the network (typically the internet). FOTA is widely used in mobile devices, IoT devices, and automotive systems to deploy updates without requiring physical access to the device.

You will find this term commonly used in IoT, Mobile Technology

Firmware Update

The process of installing newer firmware versions on a device, which can provide new features, fix bugs, or improve performance. This process is critical for maintaining the security and reliability of hardware devices.

You will find this term commonly used in Hardware, Security

Firmware Versioning

The practice of assigning unique version numbers or identifiers to different releases of firmware. Versioning helps in tracking and managing updates, enhancements, or bug fixes to the firmware installed on hardware devices.

You will find this term commonly used in Hardware, Software Development

Firmware Virtualization

A technology that allows firmware functionalities to be abstracted and run in a virtual environment, enabling the development and testing of firmware in a controlled and flexible setting without the need for physical hardware.

You will find this term commonly used in Hardware, Software Development

Fixed Function Hardware

Hardware that is designed to perform a specific function or set of functions, unlike programmable logic devices.

You will find this term commonly used in Hardware Development, Embedded Systems

What's Your
Career Path?
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass