IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Hash Object

In programming, a hash object is a data structure that implements an associative array, a structure that can map keys to values, using a hash function to compute an index into an array of buckets.

You will find this term commonly used in Software Development

Hash Partitioning

A partitioning method used in databases where a hash function is used to distribute rows across multiple partitions.

You will find this term commonly used in Databases

Hash Rate

The speed at which a compute is completing an operation in the Bitcoin code. A higher hash rate is better when mining as it increases the opportunity of finding the next block and receiving the reward.

You will find this term commonly used in Cryptocurrency

Hash Rate Efficiency

A measure of the amount of hash operations a cryptocurrency miner can perform per unit of power consumed, indicating the efficiency of the mining hardware.

You will find this term commonly used in Cryptocurrency, Blockchain

Hash Rate Optimization

The process of adjusting and improving the efficiency of the computational operations in cryptocurrency mining to maximize the rate of hash calculations.

You will find this term commonly used in Cryptocurrency, Blockchain

Hash Table

A data structure that implements an associative array abstract data type, a structure that can map keys to values using a hash function to compute an index into an array of buckets or slots.

You will find this term commonly used in Data Structures, Programming

Hash Table Overflow

A situation that occurs when a hash table data structure reaches its capacity and cannot accommodate new entries, potentially leading to performance degradation.

You will find this term commonly used in Programming, Data Structures

Hash-Based Routing

In web development, a routing strategy that uses the hash portion of the URL (the part of the URL that follows the # symbol) to keep track of the application state.

You will find this term commonly used in Web Development

Hashing

The process of converting a given key into another value. A hash function is used to generate the new value according to a mathematical algorithm.

You will find this term commonly used in Security, Cryptography

Hashing Algorithm

A function that converts an input into a fixed-size string of bytes, typically used for security purposes in creating hash values or digests.

You will find this term commonly used in Cryptography

Hashing Power

The computing power used by the network to process transactions and secure the blockchain, often measured in hashes per second.

You will find this term commonly used in Cryptocurrency, Blockchain

Hashing Space

The range of values that a hash function can output, which is determined by the size of the hash value it produces.

You will find this term commonly used in Cryptography

Hashing Utility

Software tools that generate a hash value based on input data. Hashing utilities are used for various purposes, including data integrity verification, password storage, and digital signatures.

You will find this term commonly used in Security, Cybersecurity

HCI (Human-Computer Interaction)

The study of how people interact with computers and to design technologies that let humans interact with computers in novel ways.

You will find this term commonly used in General IT, User Experience

HDMI (High-Definition Multimedia Interface)

A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device.

You will find this term commonly used in Hardware, Multimedia

Header

In networking, a unit of information that precedes a data object. In programming, it often refers to a section of source code file that declares the interfaces to other files or objects.

You will find this term commonly used in Networking, Programming

Header Compression

A technique used in data transmission to reduce the size of the packet headers in order to improve efficiency over networks with limited bandwidth.

You will find this term commonly used in Networking

Header File

In programming, a file containing C declarations and macro definitions to be shared between several source files.

You will find this term commonly used in Programming

Header Injection

A form of web security vulnerability in which an attacker can supply input that manipulates the headers sent in HTTP requests or responses.

You will find this term commonly used in Web Development, Security

Header Injection Attack

A type of attack in which malicious users can inject arbitrary HTTP headers into a server's response, leading to potential security vulnerabilities such as web cache poisoning or cross-site scripting (XSS).

You will find this term commonly used in Security, Web Development

Header Manipulation

In networking and web development, the practice of altering headers in data packets or HTTP requests to achieve a specific goal, such as bypassing security measures or manipulating the behavior of a system.

You will find this term commonly used in Security, Web Development

Header Tag

In HTML, a tag used to define headings in a document, ranging from H1 (most important) to H6 (least important).

You will find this term commonly used in Web Development

Header Tag Optimization

The practice of optimizing the HTML header tags (H1, H2, H3, etc.) on a webpage for search engine optimization (SEO) purposes.

You will find this term commonly used in Web Development, SEO

Headerless Packet

Refers to data packets sent over a network without standard protocol headers, which might be used in specific contexts to reduce overhead or for custom protocol implementations.

You will find this term commonly used in Networking

Headless Browser

A web browser without a graphical user interface, used for automated testing and web scraping.

You will find this term commonly used in Web Development, Testing

Headless CMS

A content management system that provides backend management capabilities but does not dictate the frontend presentation layer, allowing developers to use any technology stack for the frontend.

You will find this term commonly used in Web Development, Content Management

Headless Technology

Software architecture or devices that operate without a graphical user interface, allowing control and management via command-line interfaces or network connections.

You will find this term commonly used in Software Development, Web Development

Heap

A type of data structure that is often used to implement priority queues, consisting of a complete binary tree that satisfies the heap property.

You will find this term commonly used in Data Structures, Programming

Heap Corruption

A type of vulnerability that occurs when a program incorrectly manages memory allocations and deallocations, potentially leading to code execution attacks.

You will find this term commonly used in Security, Software Development

Heap Memory

An area of dynamically allocated memory that a program manages directly via calls to functions (or methods) provided by its memory manager.

You will find this term commonly used in Programming

Heap Overflow

A type of buffer overflow that occurs in the heap data area. It can be exploited in various ways, such as executing arbitrary code or causing a program crash.

You will find this term commonly used in Security, Software Development

Heartbeat

A periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a system.

You will find this term commonly used in Networking, Systems Design

Heat Sink

A passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid medium, often air or a liquid coolant, where it is dissipated away from the device.

You will find this term commonly used in Hardware, Computing

Help Desk Technician

Provides technical support and troubleshooting services to end-users facing issues with hardware or software.

You will find this term commonly used in IT Support, Customer Service

Heterogeneous Computing

A type of computing environment that uses processors or cores of different types, combining the capabilities of various hardware components to improve performance or efficiency.

You will find this term commonly used in Computing, Hardware

Heuristic

In computing, a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.

You will find this term commonly used in Algorithms, AI

Heuristic Analysis

A method of detecting viruses by examining code for suspicious properties rather than relying on a virus signature database.

You will find this term commonly used in Security, Antivirus

Heuristic Evaluation

A method used in user interface design to evaluate a user interface's usability. It involves reviewers examining the interface and judging its compliance with recognized usability principles.

You will find this term commonly used in UX/UI Design, General IT

Hex Editor

A software application that allows for manipulation of the fundamental binary data that constitutes a computer file.

You will find this term commonly used in Software Development

Hexadecimal

A base-16 number system that is used extensively in computing. It uses sixteen distinct symbols, 0â9 to represent values zero to nine, and AâF to represent values ten to fifteen.

You will find this term commonly used in Programming

Hibernate

A power-saving state designed primarily for laptops. While in hibernate mode, the current state of the system is saved to the hard disk, allowing the system to be completely powered off.

You will find this term commonly used in Operating Systems

Hibernate Query Language (HQL)

An object-oriented query language, similar to SQL, but instead of operating on tables and columns, HQL works with persistent objects and their properties.

You will find this term commonly used in Databases, Programming

HIDS (Host-based Intrusion Detection System)

A system that monitors important operating system files and detects when an intruder tampers with them.

You will find this term commonly used in Security, Cybersecurity

Hierarchical Database

A database model that organizes data in a tree-like structure, where each record has a single parent or root.

You will find this term commonly used in Databases

Hierarchical Network Design

A structured approach to network design that divides the network into discrete layers, each with specific functions and roles, to simplify management, improve scalability, and enhance performance.

You will find this term commonly used in Networking

Hierarchical Query

A type of database query that is designed to work with data stored in a hierarchical relationship, such as parent-child relationships in a tree structure.

You will find this term commonly used in Databases

Hierarchical Storage Management (HSM)

An automated data storage system that moves data between high-cost and low-cost storage media depending on the data's demand and usage.

You will find this term commonly used in Data Storage

Hierarchy of Needs in UX

A theory in user experience design that prioritizes user needs in layers, from the most basic functions to the highest user expectations.

You will find this term commonly used in User Experience, Design

Hierarchy Visualization

A method or tool used to visually represent the structure of data or systems in a hierarchical format, often through tree diagrams or similar graphical representations.

You will find this term commonly used in Data Analysis, UX/UI Design

High Availability

Refers to systems that are durable and likely to operate continuously without failure for a long time. The term is typically used in the context of computers and networks.

You will find this term commonly used in Networking, Systems Design

What's Your
Career Path?
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass