IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Kubernetes Ingress

An API object that manages external access to the services in a Kubernetes cluster, typically HTTP, allowing fine-grained control over the traffic routing and SSL/TLS termination.

You will find this term commonly used in Cloud Computing, Network Management

Kubernetes Master

The controlling unit in a Kubernetes cluster that makes global decisions about the cluster (such as scheduling), as well as detecting and responding to cluster events.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Namespace

A way to divide cluster resources between multiple users via a mechanism known as namespacing, essentially segmenting the cluster for resource management and access control.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Network Policies

A set of rules that dictate how pods can communicate with each other and with other network endpoints. Kubernetes Network Policies provide a way to implement network segmentation and isolation within a cluster.

You will find this term commonly used in Cloud Computing, Network Security

Kubernetes Node

A worker machine in Kubernetes, where containers are deployed. Each node contains the services necessary to run Pods and is managed by the master components.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Operator

An application-specific controller for Kubernetes that extends its functionality to more easily manage complex stateful applications on behalf of a Kubernetes user.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Persistent Volume

An object in Kubernetes that represents a piece of storage in the cluster, independent of the lifecycle of individual Pods, allowing data to persist across Pod restarts.

You will find this term commonly used in Cloud Computing, Data Management

Kubernetes Pod

The smallest deployable unit in Kubernetes, which can contain one or more containers that are scheduled on the same host and share the same network namespace, IP address, and storage.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Pod Networking

The networking model and implementations used in Kubernetes to provide communication between Pods within the same cluster, as well as between Pods and external resources.

You will find this term commonly used in Cloud Computing, Networking

Kubernetes Secrets

Objects in Kubernetes that store sensitive data, such as passwords, OAuth tokens, and ssh keys, offering a more secure option for managing confidential information than putting it directly into the pod configuration.

You will find this term commonly used in Cloud Computing, Security

Kubernetes Service

An abstraction layer which defines a logical set of Pods and a policy by which to access them, often used to enable external network access to a set of services within a cluster.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes StatefulSet

A Kubernetes workload API object used for managing stateful applications. It manages the deployment and scaling of a set of Pods and provides guarantees about the ordering and uniqueness of these Pods.

You will find this term commonly used in Cloud Computing, DevOps

Kubernetes Volume

A directory, possibly with data in it, accessible to containers in a pod in a Kubernetes cluster, allowing data to persist beyond the lifetime of a single container.

You will find this term commonly used in Cloud Computing, Data Management

Kudos

A term often used in professional and technical communities to express praise or recognition for a job well done.

You will find this term commonly used in Workplace Culture, Social Networking

KVM (Kernel-based Virtual Machine)

An open-source virtualization technology built into Linux, allowing a user to turn Linux into a hypervisor that runs multiple, isolated virtual environments called virtual machines (VMs).

You will find this term commonly used in Virtualization, Cloud Computing

KVM (Keyboard, Video, Mouse)

A hardware device that allows a user to control multiple computers from a single keyboard, monitor, and mouse setup, often used in data centers and IT environments to manage servers.

You will find this term commonly used in Hardware, IT Infrastructure

KVM Switch

A hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice.

You will find this term commonly used in Hardware, Network Infrastructure

Kyber

A post-quantum cryptographic algorithm designed to be secure against the potential future threat posed by quantum computers.

You will find this term commonly used in Security, Cryptography

L-value and R-value

In programming languages, l-value refers to memory location which identifies an object that persists beyond a single expression. R-value refers to data value that is stored at some address in memory. These concepts are crucial in understanding expressions and assignments.

You will find this term commonly used in Programming

L2TP (Layer 2 Tunneling Protocol)

L2TP is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.

You will find this term commonly used in Networking/Security

Lambda Architecture

A data-processing architecture designed to handle massive quantities of data by taking advantage of both batch- and stream-processing methods. It's structured to balance latency, throughput, and fault-tolerance.

You will find this term commonly used in Big Data, Data Processing

Lambda Calculus

A formal system in mathematical logic and computer science for expressing computation based on function abstraction and application using variable binding and substitution. It's foundational in the study of functional programming languages.

You will find this term commonly used in Theoretical Computer Science

Lambda Expressions

Anonymous functions defined in many programming languages that allow for the creation of inline functions with a short syntax. They are particularly useful in functional programming and for operations that require simple functions as parameters, like map and filter.

You will find this term commonly used in Programming

Lambda Function

An anonymous function used for creating small, one-off functions in programming languages like Python.

You will find this term commonly used in Programming

LAMP (Linux, Apache, MySQL, PHP/Perl/Python)

A model of web service stacks, named as an acronym of the names of its original four open-source components. The LAMP components are largely interchangeable and not limited to the original selection.

You will find this term commonly used in General IT, Web Development

LAMP Stack

LAMP stack is a popular open-source web development platform that uses Linux as the operating system, Apache as the web server, MySQL as the database management system, and PHP as the scripting language.

You will find this term commonly used in Web Development

LAN (Local Area Network)

A network that connects computers and devices in a limited geographical area such as a home, school, or office building, using network media.

You will find this term commonly used in Networking

LAN Emulation

LAN emulation (LANE) is a technique used in ATM networks to emulate the behavior of a traditional LAN over an ATM infrastructure.

You will find this term commonly used in Networking

LAN Management

LAN management involves the administration, monitoring, and maintenance of a local area network (LAN) to ensure its optimal performance and security.

You will find this term commonly used in Networking

LAN Party

A LAN party is a gathering of people with computers or compatible game consoles, where a local area network (LAN) connection is established between the devices.

You will find this term commonly used in Gaming/Networking

LAN Segmentation

LAN segmentation involves dividing a local area network (LAN) into multiple smaller segments to improve performance or security.

You will find this term commonly used in Networking

LAN Switching

The process of forwarding packets between devices on the same local area network (LAN) based on MAC addresses. This technology allows for the segmentation of networks into smaller, more efficient components, improving overall network performance and security.

You will find this term commonly used in Networking

Landing Page

A web page that serves as the entry point for a website or a particular section of a website, often used in marketing to capture leads.

You will find this term commonly used in Web Development

Landmark Detection

A technology in computer vision and image processing that identifies and locates key points on objects or faces within an image. This technique is widely used in applications like facial recognition, augmented reality, and robotics for navigation and interaction.

You will find this term commonly used in Computer Vision, Artificial Intelligence

Language Integrated Query (LINQ)

A Microsoft .NET Framework component that adds native data querying capabilities to .NET languages using a syntax reminiscent of SQL but integrated into the programming languages.

You will find this term commonly used in Programming, Database

Language Model

In natural language processing, a statistical model that predicts the likelihood of a sequence of words. These models are foundational for tasks such as speech recognition, text generation, and machine translation.

You will find this term commonly used in Natural Language Processing

Language Processing

The ability of a computer to understand, interpret, and generate human language, including tasks such as speech recognition, natural language understanding, and text generation. It's a key area of artificial intelligence research.

You will find this term commonly used in Artificial Intelligence, NLP

Language Processor

Software that translates computer programs written in a high-level language into machine code.

You will find this term commonly used in Software Development

Language Server Protocol (LSP)

A protocol used between an editor or IDE and a language server that provides programming language-specific features like autocomplete, go to definition, or hover tips without the editor needing to understand the nuances of the language.

You will find this term commonly used in Software Development

Laser Printer

A printer that uses a laser beam to transfer text and images to paper. Known for high-quality prints and speed.

You will find this term commonly used in Hardware

Latch

A type of digital logic circuit used to store one bit of data, consisting of a basic form of memory. Latches are used in various types of electronic devices for controlling the flow of data.

You will find this term commonly used in Hardware, Electronics

Latch-Up

A type of short circuit which can occur in an integrated circuit (IC), leading to the failure of the device. It is typically caused by the triggering of a parasitic structure within the IC by a high current.

You will find this term commonly used in Hardware, Electronics

Latency

The delay before a transfer of data begins following an instruction for its transfer. In networking, it's the time taken for a packet to be transferred across a network.

You will find this term commonly used in Networking, General IT

Latency Compensation

Techniques used in online gaming and real-time applications to minimize the effects of latency, ensuring a more responsive experience for users. This includes predicting user actions or adjusting the state of the game or application based on network delays.

You will find this term commonly used in Networking, Application Development

Latency Optimization

Latency optimization is the process of reducing delays in data transmission to improve network performance.

You will find this term commonly used in Networking

Latent Dirichlet Allocation (LDA)

A generative statistical model that allows sets of observations to be explained by unobserved groups, helping to understand why parts of the data are similar. It is particularly used in natural language processing for document classification and topic modeling.

You will find this term commonly used in Machine Learning, Data Analysis

Latent Semantic Analysis (LSA)

A technique in natural language processing of analyzing relationships between a set of documents and the terms they contain.

You will find this term commonly used in AI/Natural Language Processing

Lateral Movement

A technique used in cybersecurity breaches where attackers move through a network searching for key data and assets after gaining initial access. It's a critical stage in cyber attacks aiming to find and exfiltrate sensitive information.

You will find this term commonly used in Security, Cybersecurity

Law of Demeter

A software design guideline for developing software, particularly object-oriented programs, to promote loose coupling.

You will find this term commonly used in Software Engineering

Layer

A layer refers to a level within a network protocol stack where certain functionality is implemented.

You will find this term commonly used in Networking

What's Your
Career Path?
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass