IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

IPv4 Address Exhaustion

The depletion of the available IPv4 address space due to the expansion of the internet, leading to the adoption of IPv6 for a larger address space.

You will find this term commonly used in Networking

IPv4 Fragmentation

The process of breaking down an IPv4 packet into smaller packets when the size of the packet exceeds the maximum transmission unit (MTU) of the route to its destination.

You will find this term commonly used in Networking

IPv4 to IPv6 Transition Technologies

Technologies and strategies used to facilitate the transition from IPv4 to IPv6, addressing the depletion of IPv4 addresses and supporting dual-stack networking.

You will find this term commonly used in Networking

IPv6

The most recent version of the Internet Protocol, designed to replace IPv4, offering an almost unlimited number of IP addresses.

You will find this term commonly used in Networking

IPv6 Address Allocation

The distribution of internet addresses using the IPv6 protocol, which provides a significantly larger pool of addresses compared to IPv4, to accommodate the growing number of devices on the internet.

You will find this term commonly used in Networking

IPv6 Adoption

The process of transitioning from IPv4 to IPv6, involving the update and configuration of network infrastructure to support the newer protocol, addressing the need for a larger address space.

You will find this term commonly used in Networking

IPv6 Leak

The inadvertent leaking of internet traffic over an IPv4 connection while connected to an IPv6 network, often a security concern as it may bypass VPN security.

You will find this term commonly used in Networking, Security

IPv6 Prefix Delegation

A mechanism that allows internet service providers to dynamically assign portions of their IPv6 address space to customers, simplifying address distribution and management.

You will find this term commonly used in Networking

IPv6 Transition Mechanisms

Techniques that allow for the coexistence of IPv4 and IPv6 networks and facilitate the transition to IPv6. Examples include dual-stack, tunneling, and translation methods.

You will find this term commonly used in Networking

IR (Incident Response) Plan

A set of policies and procedures for identifying, investigating, and responding to potential cybersecurity incidents.

You will find this term commonly used in Security, Cybersecurity

IRC (Internet Relay Chat)

An application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model.

You will find this term commonly used in Networking, General IT

IRC Bots

Automated programs that run on Internet Relay Chat (IRC) networks to provide services, information, or to control spam, often used for both legitimate and malicious purposes.

You will find this term commonly used in Networking, Security

IRQ (Interrupt Request)

A hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead.

You will find this term commonly used in Hardware, Operating Systems

ISA (Instruction Set Architecture)

The part of the computer architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO.

You will find this term commonly used in General IT, Development

ISACA (Information Systems Audit and Control Association)

Provides certifications for information systems auditing, governance, risk management, and information security management, including CISA, CRISC, CISM, and CGEIT.

You will find this term commonly used in IT Governance, Risk Management, Information Security

ISAPI (Internet Server Application Programming Interface)

A set of Windows program calls that let you write Web server applications that will run faster than CGI programs, specific to Microsoft's IIS server.

You will find this term commonly used in Web Development

iSCSI (Internet Small Computer Systems Interface)

An IP-based storage networking standard for linking data storage facilities. It provides block-level access to storage devices by carrying SCSI commands over a TCP/IP network.

You will find this term commonly used in Networking, Storage

ISDN (Integrated Services Digital Network)

An international communications standard for sending voice, video, and data over digital telephone lines or normal telephone wires. It was widely used before the emergence of broadband internet.

You will find this term commonly used in Networking

ISDN Adapter

A device that enables the connection of computers to an Integrated Services Digital Network (ISDN) for digital transmission of voice and data over ordinary telephone copper wires.

You will find this term commonly used in Networking, Telecommunications

ISDN Terminal Adapter

A device used to connect ISDN lines to computers or other digital devices, converting digital signals to suit the ISDN network for data transmission.

You will find this term commonly used in Networking, Hardware

ISMS (Information Security Management System)

A systematic approach to managing sensitive company information so that it remains secure. It includes people, processes, and IT systems by applying a risk management process.

You will find this term commonly used in Security, Cybersecurity

ISO (International Organization for Standardization)

An independent, non-governmental international organization that develops standards to ensure the quality, safety, and efficiency of products, services, and systems.

You will find this term commonly used in General IT, Security

ISO 27001

An international standard on how to manage information security.

You will find this term commonly used in Security, Cybersecurity

ISO Image

A file format that contains the complete content and structure of a CD, DVD, or Blu-ray disc, used for distribution or backup of disc content.

You will find this term commonly used in General IT, Data Management

ISO/IEC 27002

An international standard offering guidelines and best practices for organizational information security standards and information security management practices including the selection, implementation, and management of controls.

You will find this term commonly used in Security, Cybersecurity

ISO/IEC Standards

A series of frameworks and guidelines designed to help organizations ensure that they meet customer and other stakeholder needs within statutory and regulatory requirements related to a product or service.

You will find this term commonly used in General IT, Security

ISP (Internet Service Provider)

Companies that provide consumers and businesses access to the Internet.

You will find this term commonly used in Networking, General IT

Issue Management

The process of identifying, tracking, and resolving issues, bugs, or defects in software development and project management to ensure smooth project progress and product quality.

You will find this term commonly used in General IT, Project Management

Issue Tracking System

Software that manages and maintains lists of issues, as needed by an organization. Issue tracking systems are commonly used in collaborative software development projects.

You will find this term commonly used in Software Development, Management

IT (Information Technology)

The use of computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data.

You will find this term commonly used in General IT

IT Asset Disposal (ITAD)

The business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner, ensuring data privacy and environmental considerations.

You will find this term commonly used in IT Management, Security

IT Asset Management (ITAM)

The process of ensuring an organization's assets are accounted for, deployed, maintained, upgraded, and disposed of when the time comes.

You will find this term commonly used in General IT, Management

IT Audit

The examination and evaluation of an organization's information technology infrastructure, policies, and operations to assess compliance with regulatory standards and to identify risks and security threats.

You will find this term commonly used in IT Governance, Security

IT Benchmarking

The process of comparing one's business processes and performance metrics to industry bests or best practices from other industries to identify areas for improvement.

You will find this term commonly used in General IT, IT Management

IT Capacity Planning

The process of determining the IT infrastructure and resources required to meet future workload demands and performance requirements, ensuring efficient and cost-effective operation.

You will find this term commonly used in IT Management, General IT

IT Change Management

A systematic approach to managing all changes made to IT infrastructure, including standardized methods and procedures for efficient and prompt handling, minimizing the impact of change-related incidents.

You will find this term commonly used in IT Service Management, IT Governance

IT Chargeback System

A financial management tool used by IT departments to charge other departments for utilizing IT services or resources, promoting accountability and efficient resource use.

You will find this term commonly used in IT Management, General IT

IT Compliance

The process of adhering to legal, regulatory, and company standards and guidelines related to an organization's IT infrastructure and processes.

You will find this term commonly used in Security, IT Governance

IT Compliance Audit

An evaluation of an organization's adherence to regulatory guidelines and standards in its IT operations, focusing on security, data protection, and risk management practices.

You will find this term commonly used in IT Governance, Security

IT Configuration Management

The process of maintaining information about IT assets and settings, ensuring that configurations are in a desired, consistent state and documented accurately.

You will find this term commonly used in IT Service Management, IT Governance

IT Consultant

Offers advice, expertise, and solutions to organizations to help them improve their IT infrastructure and systems.

You will find this term commonly used in IT Management, Consulting

IT Contingency Planning

The process of developing a plan to restore IT systems and operations in the event of a disruption or disaster, ensuring business continuity.

You will find this term commonly used in IT Governance, Security

IT Continuity Planning

The process of developing strategies for maintaining essential IT operations during and after a disaster or disruption, part of business continuity planning.

You will find this term commonly used in IT Governance, Security

IT Cost Optimization

The practice of achieving the best possible balance between IT costs and IT performance, including re-evaluating, reducing, and controlling spending on IT services and infrastructure.

You will find this term commonly used in IT Management, General IT

IT Dashboard

A graphical representation that provides a real-time overview of key performance indicators (KPIs) and metrics within an IT department or project, aiding in decision-making and performance monitoring.

You will find this term commonly used in General IT, IT Management

IT Dashboard Analytics

The use of data visualization and analysis tools on IT dashboards to monitor, analyze, and report on IT performance metrics and operations.

You will find this term commonly used in IT Management, Data Analysis

IT Demand Management

The process of understanding, anticipating, and influencing customer demand for IT services, ensuring that the IT organization can provide sufficient capacity to meet service levels.

You will find this term commonly used in IT Service Management, General IT

IT Deming Cycle

A continuous quality improvement model consisting of a logical sequence of four repetitive steps for continuous improvement: Plan, Do, Check, Act.

You will find this term commonly used in IT Management, General IT

IT Disaster Recovery Planning (IT DRP)

The process of creating a documented, structured approach with instructions for responding to unplanned incidents that can disrupt IT services and operations, aiming to restore normal operations as quickly as possible.

You will find this term commonly used in IT Governance, Security

IT Due Diligence

The investigation and evaluation of an organization's IT infrastructure and operations, typically conducted before a business merger, acquisition, or partnership to assess risks and value.

You will find this term commonly used in IT Governance, IT Management

What's Your
Career Path?
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass