IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Baseband Transmission

The transmission of a signal without modulation to a higher frequency, meaning the transmission of raw data as it is, over a dedicated channel. It is commonly used in LAN technologies for short-distance communication.

You will find this term commonly used in Networking, Data Communication

Bash (Bourne Again Shell)

A Unix shell and command language written as a free software replacement for the Bourne shell. Bash has become a de facto standard for shell scripting on most flavors of UNIX, offering powerful programming features to automate tasks and enable system management.

You will find this term commonly used in Software Development, Systems Administration

Batch Processing

A computing process where a group of transactions is collected over a period and processed as a single operation. This method is efficient for large, repetitive data jobs where immediate processing is not critical, commonly used in banking, payroll, and data mining operations.

You will find this term commonly used in General IT, Data Processing

Bayesian Filtering

A technique used for email filtering, spam detection, and other applications involving classification. It makes use of probabilities to predict the category of a piece of information.

You will find this term commonly used in Data Analysis, Cybersecurity

Bayesian Network

A statistical model that represents a set of variables and their conditional dependencies via a directed acyclic graph (DAG). Bayesian networks are used for a variety of purposes, including machine learning, data mining, and prediction.

You will find this term commonly used in AI, Data Analysis

BCP (Business Continuity Planning)

A strategic process that organizations implement to ensure critical business functions can continue during and after a disaster. BCP involves identifying potential threats, determining their impact, and developing policies and procedures to mitigate risks.

You will find this term commonly used in General IT, Security

Beacon

Small wireless devices that transmit signals to nearby portable electronic devices, primarily using Bluetooth technology. Beacons are used in location-based services, such as indoor navigation in malls and airports, to push notifications or advertisements directly to smartphones.

You will find this term commonly used in Networking, IoT

Beacon Frame

A packet sent by a wireless access point (AP) to signal its presence to wireless devices. It contains information about the network, such as its SSID and security settings, helping devices find and connect to the network.

You will find this term commonly used in Networking, Wireless Communication

Beacon Protocol

A network protocol designed for applications that need to broadcast small, critical pieces of information to nearby devices without requiring a paired connection. Beacon protocols are widely used in IoT applications for proximity detection and contextual awareness.

You will find this term commonly used in Networking, IoT

Behavior Specification Language

In software engineering, a language used to define or specify the behaviors of a system in a formal manner. These specifications are crucial for the development, testing, and maintenance of complex systems.

You will find this term commonly used in Software Development, System Design

Behavior-Driven Development (BDD)

A software development approach that encourages collaboration among developers, QA, and non-technical or business participants in a software project. It focuses on obtaining a clear understanding of desired software behavior through discussion with stakeholders.

You will find this term commonly used in Software Development, Agile Methodologies

Behavioral Analysis

A method used in cybersecurity to detect malicious activity by analyzing patterns of behavior rather than relying solely on known signatures. Behavioral analysis can identify anomalies that indicate potential security threats, offering proactive protection against new and evolving attacks.

You will find this term commonly used in Cybersecurity, Data Analysis

Behavioral Analytics

The use of data about people's behavior to understand intent and predict future actions. It's widely used in marketing, cybersecurity, and user experience design.

You will find this term commonly used in Data Analysis, Cybersecurity

Behavioral Biometrics

A field of study that deals with the measurement of patterns in human activities. In cybersecurity, it's used as a form of authentication by analyzing the unique ways in which individuals interact with computer systems and devices.

You will find this term commonly used in Security, Cybersecurity

Behavioral Elicitation Technique

In software engineering and user experience design, techniques used to understand user behavior, preferences, and requirements through observation, interviews, and other methods to inform system design.

You will find this term commonly used in Software Development, UX/UI Design

Benchmark Optimization

The process of improving software or system performance based on the results of benchmark tests, which assess the speed, efficiency, and capability of a system under a series of standardized tasks.

You will find this term commonly used in Performance Optimization, Software Development

Benchmark Testing

The process of running a set of standardized tests on a computer, server, or network to evaluate performance and compare it against reference standards or previous tests.

You will find this term commonly used in Performance Optimization, Testing

Bi-directional Data Sync

The process of synchronizing data in both directions between two or more systems or devices, ensuring consistency and accuracy across different storage locations or platforms.

You will find this term commonly used in Data Management, Software Development

Bi-directional Replication

The process of synchronizing data between two databases in real-time, allowing each database to receive and send updates. This ensures data consistency and availability in distributed database systems.

You will find this term commonly used in Databases, Data Management

Bi-directional Synchronization

The process of keeping data in two or more locations updated through the continuous reciprocal exchange of data. This ensures consistency and accuracy across systems or devices, often used in cloud computing, data backup, and collaborative applications.

You will find this term commonly used in Data Management, Cloud Computing

Bidirectional Charging

Refers to the capability of electric vehicles (EV) and devices to not only draw energy from the grid but also to feed electricity back into the grid. This concept is increasingly relevant in discussions about smart grids and sustainable energy management.

You will find this term commonly used in Emerging Technologies, Sustainability

Big Data

Refers to extremely large datasets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions. Big Data is characterized by its volume, velocity, and variety.

You will find this term commonly used in Data Analysis, General IT

Big Data Visualization

The representation of complex data sets in graphical or visual formats to help users understand, interpret, and derive insights from vast amounts of data. Utilizes tools and technologies designed for big data analytics.

You will find this term commonly used in Data Analysis, Big Data

Binary

A fundamental concept in computing and digital electronics, binary refers to a base-2 numeral system or binary number system, using only two symbols: 0 and 1. It's the core language of computers, representing data and facilitating operations at the most basic level.

You will find this term commonly used in General IT, Software Development

Binary Code

The most basic form of computer code or machine language, consisting of binary numbers (0s and 1s). Computers use binary code to perform various tasks and operations. It is the fundamental representation of data and instructions in computing and digital electronics.

You will find this term commonly used in General IT, Software Development

Binary Compatibility

The ability of software to run on hardware of the same architecture without modification, even if it was compiled with a different compiler or different versions of a compiler. Binary compatibility ensures that applications remain operational across updates and variations in the development environment.

You will find this term commonly used in Software Development, Hardware

Binary Large Object (BLOB)

A collection of binary data stored as a single entity in a database management system. BLOBs are typically used to store large files such as images, audio, and video. Storing BLOBs in databases allows for efficient management and access to multimedia and large data items.

You will find this term commonly used in Data Management, Databases

Binary Large Object (BLOB) Storage

A type of database storage for storing large binary objects such as images, audio files, and video clips. BLOB storage is designed for handling unstructured data efficiently.

You will find this term commonly used in Databases, Data Management

Binary Patching

The process of updating binary files with patches to fix bugs or vulnerabilities without the need for recompiling the source code. It's a quick way to distribute fixes and updates.

You will find this term commonly used in Software Development, Cybersecurity

Binary Release

A distribution of software in a binary format, ready for installation and use without the need for compilation. It's typically specific to a particular platform or operating system.

You will find this term commonly used in Software Development, Deployment

Binary Search

An efficient algorithm for finding an item from a sorted list of items. It works by repeatedly dividing in half the portion of the list that could contain the item, until the possible locations are narrowed down to just one.

You will find this term commonly used in Software Development

Binary Synchronous Communication (Bisync)

A communication protocol developed by IBM to synchronize data transmission over telecommunication networks between two points. It is used for batch file transmission and provides error correction.

You will find this term commonly used in Networking, Data Communication

Binary Translation

The process of translating and executing instructions from one computer architecture to another, enabling software compiled for one CPU architecture to run on another.

You will find this term commonly used in Software Development, Emulation

Bioacoustic Monitoring

The use of technology to capture and analyze sounds within ecosystems to monitor biodiversity and the presence or behavior of species. It's a growing field within environmental science and conservation efforts.

You will find this term commonly used in Emerging Technologies, Environmental IT

Bioinformatics

An interdisciplinary field that develops methods and software tools for understanding biological data. As an intersection of computer science, biology, mathematics, and engineering, bioinformatics focuses on the analysis and interpretation of various types of biological information, such as DNA sequences.

You will find this term commonly used in Data Analysis, Life Sciences

Biometric Authentication

A security process that relies on the unique biological characteristics of an individual to verify their identity. Common methods include fingerprint scanning, facial recognition, and iris scanning. Biometric authentication provides a high level of security for access control and identity verification.

You will find this term commonly used in Security, Cybersecurity

Biometric Authentication Systems

Systems that use unique physiological characteristics, such as fingerprints or iris patterns, to identify and authenticate individuals for access control or security verification.

You will find this term commonly used in Security, Cybersecurity

Biometric Encryption

A process that securely binds a digital key to a biometric or uses a biometric to encrypt data. It ensures that only the matching biometric data can decrypt and retrieve the original information.

You will find this term commonly used in Security, Cybersecurity

Biometric Identification System

A technology-based system that identifies individuals based on unique biological traits, such as fingerprints, facial features, iris patterns, or voice recognition. Widely used in security and access control systems.

You will find this term commonly used in Security, Biometrics

Biometric Verification System

A security system that compares biometric data captured in real-time to stored, confirmed authentic data in a database. It's used for identity verification to grant access or approve transactions.

You will find this term commonly used in Security, Cybersecurity

BIOS (Basic Input/Output System)

BIOS is a firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs. It's a crucial interface that bridges the operating system and the computer's hardware components.

You will find this term commonly used in Hardware, General IT

BIOS Chip

A chip that contains the BIOS (Basic Input/Output System) firmware on a computer motherboard. It initializes computer hardware and starts the bootloader to load the operating system.

You will find this term commonly used in Hardware, General IT

BIOS Password

A security feature found on motherboard BIOS setups that requires a unique password to grant access to the BIOS system settings. This security measure prevents unauthorized users from making changes to the BIOS settings.

You will find this term commonly used in Hardware, Security

BIOS Update

The process of updating the Basic Input/Output System firmware on a computer's motherboard. This is essential for fixing bugs, adding new features, or improving compatibility with hardware and software, ensuring the system's reliability and performance.

You will find this term commonly used in Hardware, General IT

Bit

The smallest unit of data in computing represented by a binary digit (0 or 1). Bits are foundational to digital communication, signifying the binary choices or states in computing and digital electronics.

You will find this term commonly used in General IT, Hardware

Bit Depth

The number of bits used to represent the color of a single pixel in a bitmapped image or video frame buffer, or the number of bits used for each audio sample in a digital audio stream. Higher bit depth allows for a higher number of possible values and finer detail.

You will find this term commonly used in Multimedia, General IT

Bit Error Rate (BER)

The percentage of bits that have errors relative to the total number of bits received in a transmission, a measure of the quality of a communication channel or system.

You will find this term commonly used in Networking, Telecommunications

Bit Field

A set of adjacent computer memory bits that have been allocated to hold a specific type of data. Bit fields are used in programming to compactly store and manipulate sets of parameters, such as device status flags, efficiently within a single integer variable.

You will find this term commonly used in Software Development, Hardware

Bit Manipulation

The act of algorithmically modifying bits or binary digits within a byte or group of bytes. Bit manipulation is a fundamental aspect of low-level programming, enabling efficient data processing, storage, and communication.

You will find this term commonly used in Software Development, Hardware

Bit Rate

The number of bits that are conveyed or processed per unit of time in telecommunications and computing. High bit rates allow for higher quality audio or video files but also require more storage space and bandwidth to transmit.

You will find this term commonly used in Multimedia, Networking

What's Your
Career Path?
Certified Ethical Hacker Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 51 Min
icons8-video-camera-58
807 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
12 Hrs 18 Min
icons8-video-camera-58
207 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Black Friday

70% off

Our Most popular LIFETIME All-Access Pass