IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Least Privilege

A principle in computer security in which users are given the minimum levels of access â or permissions â needed to perform their duties.

You will find this term commonly used in Security, Cybersecurity

Least Privilege Principle

The least privilege principle is a security concept that advocates granting users only the minimum level of access or permissions required to perform their tasks.

You will find this term commonly used in Security

Least Recently Used (LRU)

LRU is a caching algorithm that evicts the least recently used items from a cache when the cache is full.

You will find this term commonly used in Algorithms

Least Significant Bit (LSB)

LSB is the bit position in a binary number representing the smallest value, often used in digital signal processing or cryptography.

You will find this term commonly used in Hardware/Security

Least Squares Regression

Least squares regression is a statistical method used to find the best-fitting line through a set of data points by minimizing the sum of the squares of the differences between observed and predicted values.

You will find this term commonly used in Data Analysis

LED (Light Emitting Diode)

A semiconductor light source that emits light when current flows through it. LEDs are used in a wide range of applications, including indicator lights, digital displays, and increasingly, general-purpose lighting.

You will find this term commonly used in Hardware, Electronics

LED Display

A display technology that uses light-emitting diodes to create images. LED displays are used in a wide range of applications, from small indicators to large outdoor advertising screens, because of their brightness, energy efficiency, and longevity.

You will find this term commonly used in Hardware, Display Technology

Left-Hand-Side (LHS) Operator

In programming, the left-hand side of an assignment statement, which identifies the memory location or variable that will receive the value of the right-hand side expression. It's fundamental in understanding how values are assigned and stored in programming.

You will find this term commonly used in Programming

Legacy Code

Legacy code refers to outdated or obsolete software code that is still in use but may be difficult to maintain or update.

You will find this term commonly used in Software Development

Legacy Code Refactoring

The process of restructuring existing computer code without changing its external behavior to improve nonfunctional attributes of the software. Refactoring legacy code is often undertaken to reduce complexity, improve readability, or make the code more maintainable.

You will find this term commonly used in Software Development

Legacy System

A legacy system is an outdated or obsolete computer system, software application, or technology that continues to be used.

You will find this term commonly used in General IT

Legal Tech

Technology used to support, enhance, and automate the practice of law. Legal tech includes software and tools for document management, legal research, case management, and more, aimed at law firms, courts, and legal departments.

You will find this term commonly used in Information Technology, Legal Industry

Legend

In the context of data visualization, a legend is a small area on a chart, graph, or map that explains the symbols, colors, or patterns used to represent the data.

You will find this term commonly used in Data Visualization

Legend in Data Visualization

An explanatory component of charts or graphs that helps decode the meanings of symbols, colors, or patterns used to represent data. It's essential for making data visualizations understandable and accessible to a wider audience.

You will find this term commonly used in Data Visualization

Level of Detail (LOD)

In computer graphics, a technique for increasing efficiency by decreasing the complexity of a 3D model representation as it moves away from the viewer or according to other metrics. It helps manage rendering load and improve performance.

You will find this term commonly used in Computer Graphics, Gaming

Leverage

Leverage refers to the strategic use of resources or technologies to gain a competitive advantage.

You will find this term commonly used in General IT

Leveraged Buyout (LBO)

A financial transaction in which a company is purchased with a combination of equity and significant amounts of borrowed money.

You will find this term commonly used in Finance/IT

Lexical Analysis

The process of converting a sequence of characters into a sequence of tokens (strings with an assigned and thus identified meaning).

You will find this term commonly used in Programming

Lexical Analyzer

A program or part of a program that performs lexical analysis. It processes an input sequence of characters and produces a sequence of symbols called lexical tokens. It's a fundamental part of compilers and interpreters.

You will find this term commonly used in Programming, Compiler Design

Lexical Closure

A function that retains access to variables from its enclosing scope even after the outer function has completed execution. Closures are powerful features of functional programming languages and enable techniques like data encapsulation.

You will find this term commonly used in Programming

Lexical Scope

A type of scope that defines how variable names are resolved in nested functions: outer variables can be accessed by inner functions.

You will find this term commonly used in Programming

Lexical Scoping

A convention determining how variable names are resolved in nested functions: inner functions contain the scope of their enclosing (outer) functions. It's crucial for understanding the visibility and lifetime of variables in programming languages.

You will find this term commonly used in Programming

Lexical Variable

A variable defined in a lexical scope, which is a region of a program where the variable is defined and beyond which the variable cannot be accessed. Lexical variables help manage variable visibility and lifetimes in block-structured programming languages.

You will find this term commonly used in Programming

Lexicon

In natural language processing, a lexicon is a dictionary's language data that includes its vocabulary and information regarding how those words are used.

You will find this term commonly used in Natural Language Processing

Library

A library is a collection of precompiled routines, functions, and classes that can be used to develop software applications.

You will find this term commonly used in Programming

Library (Computing)

A collection of non-volatile resources used by computer programs, often for software development.

You will find this term commonly used in General IT, Software Development

Library Management System (LMS)

Software used to manage the operations of a library, including cataloging, search, circulation, and inventory management.

You will find this term commonly used in Information Systems

Library Science

The study of how information resources are organized, categorized, stored, retrieved, and disseminated. It includes the management of digital information and the development of information systems and services.

You will find this term commonly used in Information Science, Data Management

Library Versioning

The practice of assigning unique versions to software libraries to indicate changes or updates. This helps in dependency management, ensuring compatibility between different software components and facilitating effective maintenance and updates.

You will find this term commonly used in Software Development

License

A license is a legal agreement that grants permission to use a software product under specified terms and conditions.

You will find this term commonly used in General IT

License Auditing

The process of conducting a systematic review of software licenses within an organization to ensure compliance with software licenses agreements. This includes verifying that the number of installations does not exceed the number of licenses purchased.

You will find this term commonly used in IT Management, Compliance

License Compliance

The adherence to the terms and conditions laid out in software licenses. This includes proper use, distribution, and modification of software, often reviewed during audits to avoid legal and security issues.

You will find this term commonly used in Software Development, Legal

License Key

A data string that verifies authorized software product access. This type of software security helps prevent software piracy and gives organizations the ability to control their software.

You will find this term commonly used in Software Development, Security

License Management

License management involves tracking, controlling, and optimizing the usage of software licenses within an organization.

You will find this term commonly used in General IT

Lidar (Light Detection and Ranging)

A surveying method that measures distance to a target by illuminating the target with laser light and measuring the reflected light with a sensor.

You will find this term commonly used in Hardware/Automation

Life Cycle Assessment (LCA)

A technique to assess environmental impacts associated with all the stages of a product's life from raw material extraction through materials processing, manufacture, distribution, use, repair and maintenance, and disposal or recycling.

You will find this term commonly used in Sustainability, IT Management

Lifecycle Hook

In software development, a feature that allows the execution of custom code at certain points within the lifecycle of a component or application, often used in frameworks like Angular or React.

You will find this term commonly used in Software Development

LIFO (Last In, First Out)

LIFO is a method of data storage and retrieval where the last item to be stored is the first one to be retrieved.

You will find this term commonly used in Data Structures

LIFO Buffer (Last In, First Out)

A type of data storage scheme that stores and retrieves data using a last-in, first-out approach.

You will find this term commonly used in Data Structures

Light Field Camera

A camera that captures information about the light field emanating from a scene; that is, the intensity of light in a scene, and also the direction that the light rays are traveling in space. This technology enables advanced imaging features like refocusing.

You will find this term commonly used in Hardware, Imaging Technology

Light Pen

An input device that allows users to point to displayed objects or draw on a screen by detecting the light. It's historically significant in computer graphics and user interface design, though less common in modern computing environments.

You will find this term commonly used in Human-Computer Interaction

Lightweight

Lightweight refers to software or protocols that consume minimal system resources or bandwidth.

You will find this term commonly used in General IT

Lightweight Cryptography

Cryptographic algorithms and protocols that are designed to be efficient enough to run on resource-constrained devices like RFID tags, sensors, and small IoT devices. It aims to ensure security without overwhelming limited processing capabilities.

You will find this term commonly used in Security, Cryptography

Lightweight Directory Access Protocol (LDAP) Integration

The process of connecting and synchronizing a system or application with an LDAP directory for user and group management. This allows for centralized authentication, authorization, and user management in enterprise environments.

You will find this term commonly used in Security, Systems Administration

Lightweight Process

A thread or execution context that requires fewer resources to create and terminate compared to a traditional heavyweight process. Often used to improve the performance of applications by minimizing system resource usage.

You will find this term commonly used in Operating Systems, Software Development

Lightweight Protocol

A lightweight protocol is a network protocol designed to minimize overhead and resource usage, often used in IoT devices or constrained environments.

You will find this term commonly used in Networking

Line Coding

A method of converting digital data to digital signals. Line coding involves the representation of a digital signal on a transmission line. This process is fundamental in data communication as it affects signal integrity and efficiency.

You will find this term commonly used in Telecommunications, Networking

Line Conditioning

A process used in telecommunications to improve the quality of the line or signal, including noise reduction and error correction techniques.

You will find this term commonly used in Networking

Line of Code (LOC)

Line of code (LOC) is a metric used to measure the size or complexity of a software program by counting the number of lines of code.

You will find this term commonly used in Software Development

Linear Programming

A mathematical method for determining a way to achieve the best outcome in a given mathematical model for some list of requirements represented as linear relationships.

You will find this term commonly used in Operations Research/Computer Science

What's Your
Career Path?
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass