IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Load

Load refers to the amount of traffic or data being transferred through a network at any given moment.

You will find this term commonly used in Networking

Load Average

Load average is a measure of the average system load over a period of time, indicating the amount of computational work being done.

You will find this term commonly used in System Administration

Load Balancer

A device or software that distributes network or application traffic across a number of servers to increase capacity (concurrent users) and reliability of applications.

You will find this term commonly used in Networking, General IT

Load Balancer Health Check

A mechanism used by load balancers to check the status of the servers that it is distributing traffic to. It ensures traffic is only sent to servers that are currently operational.

You will find this term commonly used in Networking, Cloud Computing

Load Balancer Stickiness

A feature of load balancers that maintains user session continuity by directing requests from a specific client to the same server behind the load balancer. It's useful in applications where session state is important.

You will find this term commonly used in Networking, Web Services

Load Balancing

Load balancing is the process of distributing network traffic across multiple servers to ensure no single server is overwhelmed.

You will find this term commonly used in Networking

Load Balancing Algorithm

An algorithm that distributes network or application traffic across multiple servers to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource.

You will find this term commonly used in Networking, General IT

Load Balancing Strategy

Techniques used to distribute workloads across multiple computing resources, such as computers, a computer cluster, network links, CPUs, or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload.

You will find this term commonly used in Networking, Distributed Systems

Load Compiler

A specialized tool or software that translates high-level load specifications into a format that can be executed by load generators for the purpose of performance testing.

You will find this term commonly used in Software Development, Testing

Load Distribution

The process of spreading computational tasks across multiple computing resources, such as processors, servers, or network links, to optimize resource use, maximize throughput, reduce latency, and ensure fault tolerance.

You will find this term commonly used in Distributed Computing, Networking

Load Factor

Load factor is a metric used to measure the utilization or efficiency of a system, typically expressed as a percentage of maximum capacity.

You will find this term commonly used in Performance Evaluation

Load Factor (Hashing)

In the context of hash tables, the load factor is a measure that indicates how full the hash table is. It's the ratio of the number of stored entries to the total number of slots. A higher load factor indicates a fuller table, which may increase the chance of collisions.

You will find this term commonly used in Algorithms, Data Structures

Load Factorization

Load factorization is a technique used in distributed computing to balance the workload among multiple nodes by dividing tasks into smaller units.

You will find this term commonly used in Distributed Computing

Load Generator

A load generator is a software tool or application used to simulate user activity or generate artificial traffic on a system or network for performance testing.

You will find this term commonly used in Testing

Load Profile

Load profile is a representation of a system's resource usage patterns over time, often used for capacity planning or performance optimization.

You will find this term commonly used in Performance Evaluation

Load Shedding

Load shedding is a technique used to manage system overload by temporarily reducing the load on certain components or services.

You will find this term commonly used in System Administration

Load Testing

The process of putting demand on a system or device and measuring its response, often to understand the system's behavior under likely conditions.

You will find this term commonly used in General IT, Security

Local Area Network (LAN)

A LAN is a network that connects computers and devices within a limited area such as a residence, school, or office building.

You will find this term commonly used in Networking

Local Area Network (LAN) Analysis

The process of examining the performance, health, and configuration of a LAN to identify issues, optimize performance, and ensure security. Tools and techniques used in LAN analysis can include packet sniffing, throughput testing, and network mapping.

You will find this term commonly used in Networking, IT Infrastructure

Local Area Network (LAN) Topology

The physical or logical arrangement of network devices in a LAN. Common topologies include star, ring, bus, and mesh, each with its own advantages and suitability for specific network requirements and architectures.

You will find this term commonly used in Networking

Local Coherence

In distributed systems, a consistency model that ensures data remains consistent across multiple nodes within a localized region or segment of the network. This model can be used to improve performance while still maintaining a degree of data integrity.

You will find this term commonly used in Distributed Systems, Networking

Local Optimum

In optimization, a solution that is better than or equal to all nearby solutions but not necessarily the best overall solution. Finding global optima is a key challenge in fields like machine learning and operations research.

You will find this term commonly used in Algorithms, Optimization

Local Storage

Local storage refers to data storage solutions that are directly attached to a computing device, such as hard disk drives or SSDs.

You will find this term commonly used in Storage

Local Variable

A variable that is declared inside a function or block and is only accessible within that function or block. It's used to store temporary information that is not needed outside the function.

You will find this term commonly used in Programming

Localhost

A hostname that means this computer. It is used to access the network services that are running on the host via the loopback network interface.

You will find this term commonly used in Networking, General IT

Localization (L10N)

The process of adapting software for a specific region or language by adding locale-specific components and translating text.

You will find this term commonly used in Software Development

Localization Testing

The process of adapting software for a specific region or language by not just translating the text, but also by adapting the graphical user interface, input methods, and content to meet local needs, followed by testing to ensure the adaptations are correct.

You will find this term commonly used in Software Development, Testing

Location Intelligence

The process of deriving meaningful insight from geospatial data relationships to solve a particular problem. It involves the use of geographic information systems (GIS) and is widely used in marketing, logistics, and urban planning.

You will find this term commonly used in GIS, Business Intelligence

Location Transparency

In distributed computing, the characteristic of a system that allows resources to be accessed without knowledge of their physical or network location. This abstraction allows for easier resource access and management in distributed environments.

You will find this term commonly used in Distributed Computing, Networking

Location-Based Services (LBS)

Services offered through mobile devices based on the device's geographic location, providing relevant information or entertainment. LBS utilize GPS and network data to offer navigation, social networking, or advertising content.

You will find this term commonly used in Mobile Computing, GIS

Lock (Computer Science)

A mechanism used in concurrent programming to prevent simultaneous access to a resource, such as a file or database record.

You will find this term commonly used in General IT, Security

Lock Contention

A situation in concurrent programming where multiple threads or processes attempt to acquire a lock held by another thread, leading to a delay in progress or deadlock. Managing lock contention is crucial for optimizing the performance of concurrent applications.

You will find this term commonly used in Concurrent Programming, Performance Optimization

Lock-Free Programming

A programming approach that avoids locking mechanisms to manage concurrency in multi-threaded applications. It relies on algorithms that ensure system-wide progress without the need for locks, reducing potential bottlenecks.

You will find this term commonly used in Software Development

Locking Mechanisms

In computing, locking mechanisms are used to manage access to resources in a multi-threaded environment, ensuring that only one thread can access the resource at a time to prevent race conditions and ensure data integrity.

You will find this term commonly used in Software Development, Concurrency

Log Analysis

Log analysis involves reviewing and interpreting log files generated by computer systems or applications to identify trends or issues.

You will find this term commonly used in Security

Log File

A file that records events that occur in an operating system or other software runs, often used for troubleshooting purposes.

You will find this term commonly used in General IT, Security

Log File Analysis

The process of examining log files generated by servers, applications, or operating systems to diagnose problems, audit activities, or gather statistical information. It is a critical practice for IT security, system administration, and performance monitoring.

You will find this term commonly used in IT Security, System Administration

Log Management

Log management involves the collection, storage, analysis, and archival of log data generated by computer systems, networks, or applications.

You will find this term commonly used in Security

Log Shipping

A strategy used in database replication and backup, where transaction logs are automatically copied and restored onto a standby server. This helps in maintaining a backup server or setting up a failover cluster.

You will find this term commonly used in Database, Disaster Recovery

Log-Based Recovery

A method in database systems where changes are logged to ensure that in the event of a failure, the database can be recovered to a consistent state by replaying or undoing logged operations. It's essential for ensuring data integrity and availability.

You will find this term commonly used in Databases, Data Recovery

Log-Structured File System

A file system in which data and metadata are written sequentially to a circular log, improving write performance and wear leveling on devices like SSDs. It is designed to handle workloads with heavy write operations.

You will find this term commonly used in Storage, File Systems

Log-Structured Merge-tree (LSM-tree)

A data structure with optimizations for write and read operations, commonly used in database systems and storage engines to manage high volumes of data. It improves performance by batching writes and minimizing random access.

You will find this term commonly used in Databases, Data Structures

Logarithmic Complexity

Describes an algorithm whose performance will increase logarithmically as the size of the data input increases. This is considered very efficient, especially for large datasets, as seen in algorithms like binary search.

You will find this term commonly used in Algorithms, Data Analysis

Logarithmic Time Complexity (O(log n))

A measure of algorithm efficiency such that the time/space required to complete an operation increases logarithmically as the size of the data structures increase. Common in algorithms that break problems in half every iteration, like binary search.

You will find this term commonly used in Algorithms, Programming

Logic Bomb

A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

You will find this term commonly used in Security, Cybersecurity

Logic Gate

A device that performs a basic logical function such as AND, OR, or NOT, used in digital circuits.

You will find this term commonly used in General IT, Hardware

Logic Level

Represents the state of a digital signal, commonly binary high or low states, corresponding to a specific voltage range. Logic levels are fundamental in digital circuits design and interfacing.

You will find this term commonly used in Hardware, Electronics

Logic Programming

A programming paradigm based on formal logic, where program statements express facts and rules about problems within a system of formal logic.

You will find this term commonly used in AI, General IT

Logic Synthesis

The process of converting a high-level description of circuit functionality into a low-level implementation that can be directly fabricated on a chip. It's a key step in the design flow of digital integrated circuits.

You will find this term commonly used in Electronic Design Automation

Logical Address Space

The address space viewed by the process, which may differ from the physical memory addresses due to abstractions, memory management, and virtualization. It allows for safer and more efficient memory utilization by an operating system.

You will find this term commonly used in Operating Systems

What's Your
Career Path?
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Information Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
58 Hrs 1 Min
icons8-video-camera-58
225 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Leadership Mastery: The Executive Information Security Manager

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
95 Hrs 34 Min
icons8-video-camera-58
348 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass