IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

HTML Form

A section of a document containing normal content, markup, special elements called controls (checkboxes, radio buttons, menus, etc.), and labels on those controls.

You will find this term commonly used in Web Development

HTML Injection

A type of security vulnerability in which an attacker can inject HTML code into a webpage viewed by other users, potentially leading to cross-site scripting (XSS) attacks.

You will find this term commonly used in Security, Web Development

HTML Parsing

The process of converting HTML documents into a structured format that a computer can understand and manipulate.

You will find this term commonly used in Web Development

HTML5

The latest major revision of the HTML standard, offering new features for presenting content on the World Wide Web.

You will find this term commonly used in Web Development

HTML5 Canvas

An HTML element used to draw graphics and animations directly on a web page via scripting (usually JavaScript).

You will find this term commonly used in Web Development

HTML5 WebSockets

A technology providing full-duplex communication channels over a single TCP connection, enabling web applications to maintain a persistent connection with a server for real-time data transfer.

You will find this term commonly used in Web Development, Networking

HTTP (HyperText Transfer Protocol)

The protocol used for transmitting hypermedia documents, such as HTML. It is the foundation of any data exchange on the Web.

You will find this term commonly used in Networking, Web Development

HTTP Authentication

A method for a web server to secure restricted resources by requiring user verification, using headers to authenticate requests.

You will find this term commonly used in Web Development, Security

HTTP Basic Authentication

A method for an HTTP user agent to provide a user name and password when making a request. It is a simple authentication scheme built into the HTTP protocol.

You will find this term commonly used in Web Development, Security

HTTP Caching

The mechanism by which HTTP responses are stored for re-use, reducing the need to send the same data multiple times over the network.

You will find this term commonly used in Web Development, Networking

HTTP Compression

A capability that can be built into web servers and web clients to improve transfer speed and bandwidth utilization.

You will find this term commonly used in Web Development, Networking

HTTP Cookie

A small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.

You will find this term commonly used in Web Development, Security

HTTP Flood

A type of Distributed Denial of Service (DDoS) attack where the attacker sends numerous HTTP GET or POST requests to a web server, intending to overwhelm it and make it unavailable to handle legitimate requests.

You will find this term commonly used in Security, Cybersecurity

HTTP Flood Attack

A type of Distributed Denial of Service (DDoS) attack where the attacker exploits seemingly legitimate HTTP GET or POST requests to attack a web server or application.

You will find this term commonly used in Security, Networking

HTTP Header

Part of the header section of request and response messages in the HTTP protocol that defines the operating parameters of an HTTP transaction.

You will find this term commonly used in Web Development, Networking

HTTP Interceptors

Functions that are used to intercept and possibly modify HTTP requests and responses in a web application, often used for logging, authentication, or other purposes.

You will find this term commonly used in Web Development

HTTP Method

A request method used in HTTP to indicate the desired action to be performed for a given resource. Common methods include GET, POST, PUT, DELETE, and PATCH.

You will find this term commonly used in Web Development

HTTP Monitoring

The process of checking and logging HTTP traffic between a client and server for analysis or troubleshooting.

You will find this term commonly used in Networking, Web Development

HTTP Pipeline

A feature that allows multiple HTTP requests to be sent on a single TCP connection without waiting for the corresponding responses.

You will find this term commonly used in Networking, Web Development

HTTP Pipelining

A technique in which multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses.

You will find this term commonly used in Web Development, Networking

HTTP Proxy

A server that acts as an intermediary for requests from clients seeking resources from other servers.

You will find this term commonly used in Networking, Security

HTTP Redirect

A way to redirect web browsers and search engines from one URL to another.

You will find this term commonly used in Web Development, SEO

HTTP Response Splitting

A web application vulnerability that occurs when unvalidated user input is included in HTTP headers, potentially allowing an attacker to inject additional HTTP headers or even arbitrary content into the responses.

You will find this term commonly used in Security, Web Development

HTTP Status Code 404

A standard response code in HTTP indicating that the client was able to communicate with the server, but the server could not find the requested information.

You will find this term commonly used in Web Development

HTTP Status Codes

Codes that are issued by a server in response to a client's request made to the server. It includes codes from various categories like informational responses, successful responses, redirects, client errors, and server errors.

You will find this term commonly used in Web Development

HTTP Strict Transport Security (HSTS)

A web security policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking.

You will find this term commonly used in Web Development, Security

HTTP Tunneling

A technique used to encapsulate non-HTTP traffic over HTTP protocols, enabling communication through networks or firewalls that block non-HTTP traffic.

You will find this term commonly used in Networking, Security

HTTP/2

The second major version of the HTTP network protocol, used by the World Wide Web. It focuses on performance improvements over HTTP/1.x.

You will find this term commonly used in Networking

HTTP/2 Multiplexing

A feature of HTTP/2 that allows multiple request and response messages to be in flight at the same time over a single TCP connection, improving web performance.

You will find this term commonly used in Web Development, Networking

HTTP/2 Push

A feature of the HTTP/2 protocol that allows a server to send resources to a web browser before the browser requests them.

You will find this term commonly used in Web Development, Networking

HTTP/2 Server Push

A feature of HTTP/2 where a server can send resources to a client before the client requests them, effectively pushing data to the client and potentially improving load times.

You will find this term commonly used in Networking, Web Development

HTTP/3

The upcoming third major version of the HTTP protocol, featuring improved performance and security enhancements over HTTP/2.

You will find this term commonly used in Networking

HTTPS (HTTP Secure)

An extension of HTTP used for secure communication over a computer network, widely used on the Internet.

You will find this term commonly used in Networking, Security

HTTPS (HyperText Transfer Protocol Secure)

An extension of HTTP that is used for secure communication over a computer network, and is widely used on the Internet.

You will find this term commonly used in Networking, Security

HTTPS Everywhere

A browser extension that encrypts your communications with many major websites, making your browsing more secure.

You will find this term commonly used in Web Development, Security

HTTPS Inspection

The process of decrypting and examining HTTPS traffic with the goal of identifying malicious traffic or enforcing policies.

You will find this term commonly used in Security, Networking

Hub

A common connection point for devices in a network. Hubs are used to connect segments of a LAN.

You will find this term commonly used in Networking

Hue

In digital arts and computer graphics, a color property that defines a specific color on the color wheel.

You will find this term commonly used in Multimedia, Design

Human-Centered Design

An approach to systems design and development that makes human perspectives and needs the focal point of the entire process.

You will find this term commonly used in User Experience, Design

Human-Readable Format

A representation of data or information that can be naturally read by humans. In contrast, machine-readable data is in a format that can be easily processed by a computer.

You will find this term commonly used in General IT, Data Representation

Hybrid App

A mobile app that combines elements of both native apps and web applications. Hybrid apps are essentially web apps that have been put in a native app shell.

You will find this term commonly used in Mobile Development

Hybrid App Development

The creation of mobile apps that run on multiple platforms, such as iOS and Android, from a single codebase, typically using web technologies.

You will find this term commonly used in Mobile Development

Hybrid Application Framework

A framework used in mobile development that allows for the development of applications that can run on multiple platforms using the same codebase.

You will find this term commonly used in Mobile Development

Hybrid Cloud

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party, public cloud services with orchestration between the two platforms.

You will find this term commonly used in Cloud Computing

Hybrid Cloud Computing

A cloud computing environment that uses a mix of on-premises, private cloud, and third-party, public cloud services with orchestration between the two platforms. It allows for greater flexibility and more deployment options.

You will find this term commonly used in Cloud Computing, General IT

Hybrid Cloud Management

The process of managing the integration and operation of a hybrid cloud, which combines public and private cloud infrastructures to allow data and applications to be shared between them.

You will find this term commonly used in Cloud Computing, IT Management

Hybrid Cloud Storage

A storage solution that combines public cloud storage and private cloud storage with data mobility between the two environments.

You will find this term commonly used in Cloud Computing, Storage

Hybrid Cryptography

A cryptosystem that combines two or more encryption schemes, including both symmetric and asymmetric algorithms, to secure data transmission.

You will find this term commonly used in Cryptography, Security

Hybrid Cryptosystem

A cryptographic system that combines the best features of both symmetric and asymmetric encryption to secure data transmission.

You will find this term commonly used in Security, Cryptography

Hybrid Disk

Also known as a solid-state hybrid drive (SSHD), it combines the features of an HDD (hard disk drive) and an SSD (solid-state drive) in one unit, aiming to offer a balance between high speed and large storage capacity.

You will find this term commonly used in Hardware, Data Storage

What's Your
Career Path?
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass