IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

IEEE (Institute of Electrical and Electronics Engineers)

A professional association dedicated to advancing technological innovation and excellence for the benefit of humanity.

You will find this term commonly used in General IT, Engineering

IEEE 802.11

A set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in various frequencies, including but not limited to 2.4, 5, and 60 GHz frequency bands.

You will find this term commonly used in Networking, Wireless Technology

IGP (Interior Gateway Protocol)

A type of protocol used within a single autonomous system for routing purposes, facilitating data transmission within the network. Examples include RIP, OSPF, and EIGRP.

You will find this term commonly used in Networking

IL (Intermediate Language)

A low-level, high-level programming language used as the output of a compiler and the input to a virtual machine runtime, common in environments like .NET's Common Language Runtime.

You will find this term commonly used in Software Development

ILM (Information Lifecycle Management)

Policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective IT infrastructure from the time information is conceived through its final disposition.

You will find this term commonly used in Data Management, General IT

Image Processing

A method to perform operations on an image in order to enhance it or extract useful information. It involves techniques that apply mathematical operations to images for various applications like enhancement, analysis, and reconstruction.

You will find this term commonly used in Computer Vision, AI

Image Recognition

The ability of software to identify objects, places, people, writing, and actions in images. It involves machine learning and pattern recognition algorithms to interpret the visual world.

You will find this term commonly used in AI, Machine Learning

IMAP (Internet Message Access Protocol)

A standard email protocol that stores email messages on a mail server but allows the end user to view and manipulate them as though they were stored locally on the end user's computing device(s).

You will find this term commonly used in Networking

Immutable Data

Data that cannot be modified after it has been created. This concept is often used in software development and database management to ensure data integrity and security.

You will find this term commonly used in Software Development, Security

Immutable Infrastructure

An approach to managing services and software deployments on IT resources wherein components are replaced rather than changed. This approach aims for system consistency and reliability.

You will find this term commonly used in Cloud Computing, General IT

Immutable Object

An object whose state cannot be modified after it is created, enhancing predictability and thread safety in code.

You will find this term commonly used in Software Development, General IT

Impact Printer

A type of printer that operates by striking an ink ribbon against paper, commonly used for multipart forms.

You will find this term commonly used in Hardware, Peripheral Devices

Impedance Mismatch

A problem in software development where there is a conflict between the database model and the programming language model.

You will find this term commonly used in Software Development, Database Management

Impersonation Attack

A form of unauthorized access where an attacker pretends to be another user or device to steal data, gain access to systems, or spread malware.

You will find this term commonly used in Security, Cybersecurity

Implementation Phase

The stage in a project where the system is developed, tested, and installed.

You will find this term commonly used in Software Development, Project Management

Implicit Authentication

A security approach that continuously authenticates users based on their actions and behaviors, such as typing patterns or device handling characteristics, rather than explicit authentication mechanisms like passwords.

You will find this term commonly used in Security, Cybersecurity

Implicit Conversion

Automatic type conversion by the compiler, also known as type coercion.

You will find this term commonly used in Programming, Software Development

Implicit Grant

A simplified authorization flow in OAuth that allows clients to obtain access tokens directly from the authorization server.

You will find this term commonly used in Security, Web Development

Implicit Intent

In Android development, an intent that does not name a specific component, but instead declares an action to perform, allowing a component from another app to handle it.

You will find this term commonly used in Development, Mobile Development

Implicit Security

Security measures that are built into systems and processes by design, providing protection without requiring explicit action by users or administrators.

You will find this term commonly used in Security, Cybersecurity

Implicit Type Conversion

Also known as type coercion, it's the automatic or implicit conversion of values from one data type to another (e.g., from int to float). It's a feature in many programming languages to ease the development process.

You will find this term commonly used in Software Development

Import Library

A file used in software development that specifies the functions that are to be imported from a DLL.

You will find this term commonly used in Software Development, Windows Programming

In-Memory Computing

Technology that allows the processing of data stored in RAM, rather than in traditional databases. It enables faster data processing and analysis.

You will find this term commonly used in General IT, Databases

Incident Forensics

The investigation of security incidents with the goal of uncovering how a breach occurred, the extent of the damage, and how similar incidents can be prevented in the future.

You will find this term commonly used in Security, Cybersecurity

Incident Management

The process responsible for managing the lifecycle of all incidents to ensure that normal service operation is restored as quickly as possible and the business impact is minimized.

You will find this term commonly used in General IT, Security

Incident Response

A set of procedures developed by an organization to respond to and manage a cyberattack. An incident response plan aims to reduce damage, recover data, and prevent future breaches.

You will find this term commonly used in Security, Cybersecurity

Increment Operator

A programming operator that increases the value of a variable by a fixed amount, usually one.

You will find this term commonly used in Programming, Software Development

Incremental Backup

A type of backup that only saves the changes made to the data since the last backup. This method is more efficient than full backups because it reduces the amount of time and storage space required.

You will find this term commonly used in Data Management, Security

Independent Component Analysis (ICA)

A computational method for separating a multivariate signal into additive, independent non-Gaussian signals.

You will find this term commonly used in AI, Data Analysis

Index

In databases, an index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure.

You will find this term commonly used in Databases, General IT

Index Fund

While not directly an IT term, in the context of tech companies, it refers to a type of mutual fund or exchange-traded fund designed to follow certain preset rules so that the fund can track a specified basket of underlying investments.

You will find this term commonly used in Financial Technology

Index Optimization

The process of improving database index efficiency by selecting the appropriate index types, configuring index properties, and organizing data to speed up query response times and reduce storage requirements.

You will find this term commonly used in Databases, General IT

Index Scan

A database operation that reads through an index to find records, used when a query cannot take full advantage of an index to directly retrieve data.

You will find this term commonly used in Data Management, Development

Indexing

The process of organizing data in a database in a way that improves speed and efficiency of information retrieval.

You will find this term commonly used in Databases, General IT

Indicator of Compromise (IoC)

Artifacts observed on a network or in an operating system that with high confidence indicate a computer intrusion.

You will find this term commonly used in Security, Cybersecurity

Indirect Addressing

A method in computer programming where the address of the data is held in an instruction code, allowing the program to manipulate addresses and values stored in variables.

You will find this term commonly used in Software Development

Indirect Dependency

A software dependency that is not directly tied to the current software project but is a dependency of a directly used library or package.

You will find this term commonly used in Software Development, Dependency Management

Individual Contributor

An employee who contributes to the team or project without having management responsibilities.

You will find this term commonly used in General IT, Human Resources

Inductive Charging

A type of wireless power transfer. It uses electromagnetic fields to transfer energy between two objects through electromagnetic induction. Useful in charging devices like smartphones and electric toothbrushes without cords.

You will find this term commonly used in Hardware, Mobile Technology

Industrial Internet

A term coined to describe the integration and linking of big data, analytical tools, and wireless networks with physical and industrial equipment, or otherwise known as the Industrial Internet of Things (IIoT).

You will find this term commonly used in IoT, Industrial Automation

Inference Engine

A component of an expert system that applies logical rules to the knowledge base to deduce new information or make decisions, often used in AI applications to simulate human reasoning.

You will find this term commonly used in AI, Machine Learning

InfiniBand

A high-speed communications standard used in high-performance computing and data centers. It offers high throughput and very low latency for data transfer between computer servers and storage systems.

You will find this term commonly used in Networking, Data Center Technology

Infinite Loop

A loop that runs indefinitely because the loop condition is never falsified.

You will find this term commonly used in Programming, Software Development

Informatics

The study of computational systems, especially those for data storage and retrieval.

You will find this term commonly used in General IT, Data Science

Information Architecture

The structure of information, focusing on organizing, structuring, and labeling content in an effective and sustainable way. This is used in websites, online communities, and software to help improve usability.

You will find this term commonly used in Web Development, UX/UI Design

Information Assurance

Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

You will find this term commonly used in Security, Cybersecurity

Information Broker

A person or company that collects and sells personal or corporate information to third parties, often used for marketing, research, or surveillance purposes.

You will find this term commonly used in Data Management, Security

Information Cascade

A phenomenon where individuals in a group or network make decisions sequentially, with each person's decision influenced by the decisions of earlier individuals, sometimes leading to rapid convergence on suboptimal choices or beliefs.

You will find this term commonly used in Social Media, Behavioral Economics

Information Entropy

A measure of the uncertainty or randomness in a data set, used in information theory.

You will find this term commonly used in Information Theory, Security

Information Governance

The set of multi-disciplinary structures, policies, procedures, processes, and controls implemented to manage information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental, and operational requirements.

You will find this term commonly used in Data Management, IT Governance

What's Your
Career Path?
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass