IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Hybrid Encryption

A form of encryption that combines the convenience of a public-key encryption scheme with the efficiency of a symmetric key encryption scheme.

You will find this term commonly used in Security, Cryptography

Hybrid Encryption System

A cryptographic system that combines the convenience of a public-key encryption system with the efficiency of a symmetric key encryption system.

You will find this term commonly used in Security, Cryptography

Hybrid Fiber-Coaxial (HFC)

A telecommunications industry term for a network that incorporates both optical fiber and coaxial cable to create a broadband network.

You will find this term commonly used in Networking

Hybrid Integration Platform

A platform that combines cloud-based systems and on-premises, the traditional method of integration.

You will find this term commonly used in Cloud Computing, Integration

Hybrid IT

A computing environment that uses a mix of on-premise, private cloud, and public cloud services with orchestration between the two platforms.

You will find this term commonly used in Cloud Computing

Hybrid Logical Clock (HLC)

A type of logical clock used in distributed systems to ensure a partial ordering of events with improved accuracy over traditional logical clocks while maintaining causality.

You will find this term commonly used in Distributed Systems

Hybrid Network Topology

A network structure that combines two or more different network topologies, such as star, ring, bus, or mesh, to form a single network.

You will find this term commonly used in Networking

Hybrid Networking

A type of computer network that uses different types of transmission technologies, protocols, or architectures.

You will find this term commonly used in Networking

Hybrid Routing

A routing method that combines characteristics of both static routing and dynamic routing, often used in large, complex networks.

You will find this term commonly used in Networking

Hybrid SIM Slot

A smartphone feature that allows a user to insert either two SIM cards or one SIM card and one microSD card, but not both types of cards simultaneously.

You will find this term commonly used in Mobile Technology

Hybrid Virtualization

Combines hardware-assisted virtualization and software emulation to offer a balanced approach for virtualizing complex computing environments. It offers flexibility and improved performance for specific applications.

You will find this term commonly used in Virtualization

Hyper-converged Infrastructure (HCI)

A software-defined IT infrastructure that virtualizes all of the elements of conventional "hardware-defined" systems. HCI includes, at a minimum, virtualized computing (a hypervisor), virtualized SAN (storage area network) and virtualized networking.

You will find this term commonly used in Networking, Virtualization

Hyper-Threading

Intelâs proprietary technology that allows a single microprocessor to act like two separate processors to the operating system and the application programs that use it.

You will find this term commonly used in Hardware, Computing

Hyper-V

A virtualization product from Microsoft that allows the creation of virtualized computing environments.

You will find this term commonly used in Virtualization

Hyperlink

A reference to data that the reader can directly follow either by clicking or by hovering. It points to a whole document or to a specific element within a document.

You will find this term commonly used in Web Development

Hyperlink Spoofing

A form of fraud where a link presented to a user is misleading, directing the user to an unintended and possibly malicious website.

You will find this term commonly used in Security, Web Development

Hypermedia

An extension of the term hypertext, hypermedia is a nonlinear medium of information that includes graphics, audio, video, plain text, and hyperlinks.

You will find this term commonly used in Web Development, Multimedia

Hypermedia API

An API that uses hypermedia (links) as part of the application's interface, allowing clients to dynamically navigate the actions available to them.

You will find this term commonly used in Web Development, APIs

Hyperscale Computing

The ability of an architecture to scale appropriately as increased demand is added to the system. This involves not just the ability to scale up, but to scale efficiently.

You will find this term commonly used in Cloud Computing, Distributed Computing

Hyperscale Data Center

A type of data center architecture designed to scale for massive computing power and efficiency in the face of exponential data growth.

You will find this term commonly used in Cloud Computing, Data Center Management

Hyperscale Network Architecture

A design methodology for networks that can scale exponentially and swiftly to meet demand in hyperscale data centers or cloud environments.

You will find this term commonly used in Networking, Cloud Computing

Hyperspace

In computing, often refers to an abstraction of storage or computing resources, implying a vast or virtually infinite space.

You will find this term commonly used in Cloud Computing, Virtualization

Hypertext

Text displayed on a computer or other electronic device with references (hyperlinks) to other text that the reader can immediately access.

You will find this term commonly used in Web Development

Hypertext Application

A web application that uses HTML and other web technologies to create interactive or dynamic web pages.

You will find this term commonly used in Web Development

Hypertext Preprocessor (PHP)

A popular general-purpose scripting language that is especially suited to web development. It is fast, flexible, and pragmatic, powering everything from your blog to the most popular websites in the world.

You will find this term commonly used in Web Development

Hypertext System

A system used for storing and retrieving text in which certain words or phrases are hyperlinked to other texts within the system.

You will find this term commonly used in Web Development

Hypertext Transfer Protocol Secure (HTTPS)

An extension of HTTP that is used for secure communication over a computer network, widely used on the Internet.

You will find this term commonly used in Networking, Security

Hyperthreading Technology

A form of simultaneous multithreading technology introduced by Intel, allowing a single microprocessor to act as if it were two separate processors to the operating system and the application programs.

You will find this term commonly used in Hardware, Computing

Hypervisor

Software, firmware, or hardware that creates and runs virtual machines (VMs) by separating the physical hardware from the operating system.

You will find this term commonly used in Virtualization

Hypervisor Network

A virtualized network overlay that operates under the control of a hypervisor, allowing virtual machines to communicate.

You will find this term commonly used in Virtualization, Networking

Hypervisor Network Security

Security measures and protocols implemented at the hypervisor level to protect virtual machines and their host systems from network-based threats.

You will find this term commonly used in Security, Virtualization

Hypervisor Type 1

A software layer that runs directly on bare metal as a lightweight operating system to control hardware and to monitor guest operating systems.

You will find this term commonly used in Virtualization

Hypervisor Type 2

A software layer that runs within a conventional operating-system environment, allowing it to host guest operating systems.

You will find this term commonly used in Virtualization

Hypervisor-Level Attack

A cyberattack targeting the hypervisor of virtualized environments, aiming to exploit vulnerabilities and gain control over the host system or virtual machines.

You will find this term commonly used in Security, Virtualization

Hz (Hertz)

The unit of frequency in the International System of Units (SI) that is defined as one cycle per second. It is used to measure the clock speeds of computers and the frequency of other electronic components.

You will find this term commonly used in Hardware, Computing

IaaS (Infrastructure as a Service)

A form of cloud computing that provides virtualized computing resources over the internet.

You will find this term commonly used in Cloud Computing

IaaS Cloud Providers

Companies that offer Infrastructure as a Service (IaaS), providing customers with cloud-based alternatives to on-premise infrastructure, allowing businesses to purchase resources on-demand.

You will find this term commonly used in Cloud Computing, Networking

IAM (Identity and Access Management)

A framework of policies and technologies ensuring that the right users have the appropriate access to technology resources.

You will find this term commonly used in Security, Cybersecurity

IAPP (International Association of Privacy Professionals)

Specializes in certifications for privacy and data protection, offering credentials for privacy professionals worldwide.

You will find this term commonly used in Privacy, Data Protection

iBeacon

A protocol developed by Apple that allows mobile apps to listen for signals from beacons in the physical world and react accordingly, often used for location-based content and services.

You will find this term commonly used in Mobile Development, Networking

ICMP (Internet Control Message Protocol)

A network protocol used by network devices to diagnose network communication issues.

You will find this term commonly used in Networking

ICMP Flood

A type of Denial-of-Service (DoS) attack where the attacker overwhelms the target with ICMP Echo Request (ping) packets, typically to disrupt service.

You will find this term commonly used in Security, Cybersecurity

IDE (Integrated Development Environment)

A software application that provides comprehensive facilities to computer programmers for software development, including a code editor, compiler, debugger, and sometimes a GUI builder.

You will find this term commonly used in Software Development

IDE (Integrated Drive Electronics)

A standard interface for connecting storage devices like hard drives and optical drives to the motherboard.

You will find this term commonly used in Hardware, Storage

Identity Columns

In database management, columns in a table that are used for storing unique identifiers automatically generated by the database system. These are often used as primary keys.

You will find this term commonly used in Data Management, Development

Identity Federation

A system of trust that extends authentication and authorization across multiple IT systems and organizations. It allows users to access multiple systems with one set of credentials, streamlining the login process across cloud services.

You will find this term commonly used in Security, Cloud Computing

Identity Management Systems

Frameworks and solutions designed to manage individual identities, their authentication, authorization, roles, and privileges within or across system and enterprise boundaries.

You will find this term commonly used in Security, Cybersecurity

Identity Provider (IdP)

A system that creates, maintains, and manages identity information for principals and provides authentication services to relying applications within a federation or distributed network.

You will find this term commonly used in Security, Cybersecurity

Identity Verification

The process of ensuring that a person is who they claim to be, often involving the verification of various credentials such as usernames, passwords, biometric data, or other identification methods.

You will find this term commonly used in Security, Cybersecurity

IDS (Intrusion Detection System)

A device or software application that monitors a network or systems for malicious activity or policy violations.

You will find this term commonly used in Security, Cybersecurity

What's Your
Career Path?
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass