IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Application Programming Interface (API) Design

The process of planning and creating the endpoints, data structures, and protocols for APIs, focusing on making them efficient, easy to use, and secure, while ensuring they meet the needs of both the developers who will use them and the applications they will serve.

You will find this term commonly used in Software Development, Web Services

Application Programming Interface (API) Economy

The economic value and business models that emerge from the use and exchange of APIs, enabling companies to extend services, reach new customers, and innovate by leveraging external and internal APIs.

You will find this term commonly used in Business Strategy, Digital Transformation

Application Programming Interface (API) Key

An API Key is a unique identifier used to authenticate a user, developer, or calling program to an API, often part of the API security mechanisms to control access and track API usage.

You will find this term commonly used in Software Development, Security

Application Programming Interface (API) Management

The process of creating, publishing, maintaining, and securing APIs in a scalable environment, often involving the use of API gateways, documentation tools, and analytics to manage the lifecycle of APIs.

You will find this term commonly used in Web Development, API Strategy

Application Programming Model

An Application Programming Model defines the methods and data structures that developers should use to build applications on a specific platform or system, guiding the creation of consistent and efficient software.

You will find this term commonly used in Software Development

Application Release Automation

The use of tools and processes to automate the deployment of applications across various stages of the development lifecycle, ensuring consistent and reliable releases.

You will find this term commonly used in DevOps, Continuous Delivery

Application Release Management

The process of managing, planning, scheduling, and controlling a software build through different stages and environments, including testing and deploying software releases.

You will find this term commonly used in DevOps, Software Deployment

Application Scalability

The ability of an application to handle increased loads by adapting its resource usage without compromising performance, typically through scaling out (adding more resources) or scaling up (upgrading existing resources).

You will find this term commonly used in Cloud Computing, Software Development

Application Security

Application Security encompasses measures taken to improve the security of an application often by finding, fixing, and preventing security vulnerabilities.

You will find this term commonly used in Security, Cybersecurity

Application Security Framework

A structured set of guidelines and best practices designed to help developers build more secure software applications, addressing common security threats and vulnerabilities from the outset of the development process.

You will find this term commonly used in Cybersecurity, Software Development

Application Security Testing (AST)

AST involves methods and tools used to find security vulnerabilities in applications, either in the development phase or after deployment, to ensure the application's resistance to attacks.

You will find this term commonly used in Security, Software Development

Application Segmentation

The practice of dividing application components into separate segments or microservices, often to improve scalability, manageability, and security by isolating critical functions and reducing the attack surface.

You will find this term commonly used in Microservices, Application Design

Application Service Agreement (ASA)

A contract or agreement between a service provider and a customer that specifies the services to be provided, service level targets, and responsibilities of both parties, particularly for software applications and cloud services.

You will find this term commonly used in IT Service Management, Contracts

Application Service Architecture (ASA)

A framework for designing software applications with a focus on separating functions into individual services that can be independently developed, deployed, and managed.

You will find this term commonly used in Software Architecture, Cloud Computing

Application Service Environment (ASE)

ASE is a hosting environment within a cloud service that provides a fully isolated and dedicated environment for securely running applications at scale, often including features for load balancing, auto-scaling, and integrated security.

You will find this term commonly used in Cloud Computing, IT Infrastructure

Application Service Management

The practice of managing and optimizing the delivery of software applications and services to ensure performance, availability, and user satisfaction.

You will find this term commonly used in IT Service Management, Operations

Application Service Mapping

The process of creating a visual representation of the relationships and dependencies between applications, services, and underlying infrastructure components, facilitating understanding, and management of IT services.

You will find this term commonly used in IT Service Management, Operations

Application Service Provider (ASP)

An ASP is a business providing computer-based services to customers over a network, such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).

You will find this term commonly used in Cloud Computing, Services

Application Service Provider (ASP) Model

A business model that delivers software applications and related services over the internet, allowing customers to access and use software without installing it locally, typically on a subscription basis.

You will find this term commonly used in Cloud Computing, Software as a Service

Application Stack

An Application Stack refers to a set of software subsystems or components needed to create a complete platform such that no additional software is needed to support applications.

You will find this term commonly used in Software Development, IT Infrastructure

Application Stack Decomposition

The process of breaking down a monolithic application stack into its component parts, often as part of a strategy to adopt microservices or to improve system modularity and scalability.

You will find this term commonly used in Software Architecture, Microservices

Application Threat Modeling

A methodology used to identify, assess, and mitigate security threats and vulnerabilities in application design and architecture, typically during the early stages of development.

You will find this term commonly used in Security, Software Development

Application Virtualization

Application Virtualization allows applications to run in environments that do not suit the native app by abstracting the underlying hardware or software. This enables compatibility and mobility.

You will find this term commonly used in General IT, Cloud Computing

Application Vulnerability Assessment

The systematic examination of applications for vulnerabilities, including security flaws, weaknesses, and potential threats, to identify and mitigate risks before they can be exploited by attackers.

You will find this term commonly used in Cybersecurity, Application Security

Application-Specific Standard Product (ASSP)

A semiconductor device used for a specific application that is produced for multiple users and sold to more than one company.

You will find this term commonly used in Electronics, Hardware

Architectural Pattern

A general, reusable solution to a commonly occurring problem within a given context in software architecture, providing a template for how to solve a problem that can be used in many different situations.

You will find this term commonly used in Software Architecture, Design

Architecture Description

Architecture Description refers to the process and documentation of the fundamental structures and behaviors of a system or ecosystem, enabling understanding and analysis of its system architecture.

You will find this term commonly used in General IT, Development

ARKit

ARKit is a development framework by Apple that allows developers to create augmented reality (AR) experiences for iPhone and iPad, providing tools for visual inertial odometry, environmental understanding, and 3D asset rendering.

You will find this term commonly used in AI, Mobile Development

ARP (Address Resolution Protocol)

ARP is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address, used in IPv4 networks.

You will find this term commonly used in Networking

ARP Spoofing

ARP Spoofing, or ARP Poisoning, is a technique used in cyber attacks to send fake ARP messages over a local area network, enabling attackers to intercept, modify, or stop data in transit by linking their MAC address with the IP address of another host.

You will find this term commonly used in Security, Cybersecurity

ARPA (Advanced Research Projects Agency)

ARPA, now DARPA (Defense Advanced Research Projects Agency), is a research and development agency of the U.S. Department of Defense responsible for the development of emerging technologies for use by the military.

You will find this term commonly used in General IT

Array Programming

Array Programming involves programming languages and techniques optimized for the manipulation of arrays or matrices, simplifying tasks in scientific computing, data analysis, and machine learning.

You will find this term commonly used in Software Development, Data Science

Artificial General Intelligence (AGI)

The hypothetical intelligence of a machine that has the capacity to understand or learn any intellectual task that a human being can, often considered the holy grail of artificial intelligence research.

You will find this term commonly used in AI, Machine Learning

Artificial Neural Network (ANN)

A computing system inspired by the biological neural networks that constitute animal brains, capable of learning tasks by considering examples without being programmed with task-specific rules.

You will find this term commonly used in AI, Machine Learning

Artificial Reality

A term often used interchangeably with virtual reality or augmented reality, referring to technologies that create immersive, computer-generated environments or enhance real-world environments with digital overlays.

You will find this term commonly used in Virtual Reality, Augmented Reality

As-a-Service (XaaS)

As-a-Service, or XaaS, refers to the delivery of anything as a service, encompassing SaaS (Software as a Service), IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and other cloud-based services.

You will find this term commonly used in Cloud Computing

ASIC (Application-Specific Integrated Circuit)

An ASIC is a microchip designed for a specific application, ranging from audio processing to managing a cellphone call, offering higher performance and lower power consumption than general-purpose processors.

You will find this term commonly used in Hardware, Networking

ASIC Design

ASIC Design involves creating a custom integrated circuit for a specific use rather than for general-purpose use, optimizing performance and reducing power consumption.

You will find this term commonly used in Hardware

Asset Discovery

Asset Discovery is the process of identifying the assets within an organization's network, including hardware and software components, to manage, secure, and optimize the assets effectively.

You will find this term commonly used in IT Management, Security

Asset Intelligence

The collection, processing, and analysis of data related to IT assets to provide insights into usage, performance, and lifecycle management, supporting strategic decision-making and operational efficiency.

You will find this term commonly used in IT Asset Management, Business Intelligence

Asset Lifecycle Management

The process of optimizing the life cycle of physical assets from acquisition to disposal, aiming to maximize value while minimizing costs and risks associated with asset ownership and operation.

You will find this term commonly used in IT Asset Management, Operations

Asset Management Platform

Software solutions designed to manage and optimize the lifecycle of IT assets, from procurement to disposal, including tracking, maintenance, and financial management of hardware and software assets.

You will find this term commonly used in IT Asset Management, Software

Asset Management Software

Asset Management Software is a tool that helps organizations track, manage, and optimize their assets, including hardware, software, and intellectual property, throughout the asset lifecycle.

You will find this term commonly used in IT Management

Asset Performance Management

The practice of using data analysis, monitoring, and optimization techniques to improve the reliability and availability of physical assets, reducing operational costs and extending asset lifespans.

You will find this term commonly used in IT Management, Operations

Asset Tagging

The practice of attaching identification tags or labels to assets, including hardware and software, to facilitate tracking, management, and accountability within an organization.

You will find this term commonly used in IT Asset Management, Security

Asset Tracking Solutions

Systems and technologies used for monitoring and managing the location, status, and condition of assets over time, often involving RFID, GPS, or barcode technology, to optimize asset utilization and prevent loss.

You will find this term commonly used in IT Asset Management, Operations

Asymmetric Digital Subscriber Line (ADSL)

ADSL is a type of DSL broadband communications technology used for connecting to the internet, allowing more data to be sent over existing copper telephone lines compared to traditional modem lines.

You will find this term commonly used in Telecommunications, Networking

Asymmetric Encryption

Asymmetric Encryption, or public key cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner, for secure communication.

You will find this term commonly used in Security, Cybersecurity

Asymmetric Encryption Algorithms

Cryptographic algorithms that use two different keys for encryption and decryption, one public key for encrypting messages and one private key for decrypting them, facilitating secure communication over insecure channels.

You will find this term commonly used in Cryptography, Security

Asymmetric Key Algorithm

Asymmetric Key Algorithms use a pair of distinct yet related cryptographic keys for encryption and decryption; one key encrypts the data, and the other key decrypts it, facilitating secure communication over insecure channels.

You will find this term commonly used in Security, Cryptography

What's Your
Career Path?
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass